CVE-2024-26146

Rack is a modular Ruby web server interface. Carefully crafted headers can cause header parsing in Rack to take longer than expected resulting in a possible denial of service issue. Accept and Forwarded headers are impacted. Ruby 3.2 has mitigations for this problem, so Rack applications using Ruby 3.2 or newer are unaffected. This vulnerability is fixed in 2.0.9.4, 2.1.4.4, 2.2.8.1, and 3.0.9.1.
References
Link Resource
https://discuss.rubyonrails.org/t/possible-denial-of-service-vulnerability-in-rack-header-parsing/84942 Vendor Advisory
https://github.com/rack/rack/commit/30b8e39a578b25d4bdcc082c1c52c6f164b59716 Patch
https://github.com/rack/rack/commit/6c5d90bdcec0949f7ba06db62fb740dab394b582 Patch
https://github.com/rack/rack/commit/a227cd793778c7c3a827d32808058571569cda6f Patch
https://github.com/rack/rack/commit/e4c117749ba24a66f8ec5a08eddf68deeb425ccd Patch
https://github.com/rack/rack/security/advisories/GHSA-54rr-7fvw-6x8f Vendor Advisory
https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2024-26146.yml Third Party Advisory
https://lists.debian.org/debian-lts-announce/2024/04/msg00022.html Mailing List
https://security.netapp.com/advisory/ntap-20240510-0006/ Third Party Advisory
https://discuss.rubyonrails.org/t/possible-denial-of-service-vulnerability-in-rack-header-parsing/84942 Vendor Advisory
https://github.com/rack/rack/commit/30b8e39a578b25d4bdcc082c1c52c6f164b59716 Patch
https://github.com/rack/rack/commit/6c5d90bdcec0949f7ba06db62fb740dab394b582 Patch
https://github.com/rack/rack/commit/a227cd793778c7c3a827d32808058571569cda6f Patch
https://github.com/rack/rack/commit/e4c117749ba24a66f8ec5a08eddf68deeb425ccd Patch
https://github.com/rack/rack/security/advisories/GHSA-54rr-7fvw-6x8f Vendor Advisory
https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2024-26146.yml Third Party Advisory
https://lists.debian.org/debian-lts-announce/2024/04/msg00022.html Mailing List
https://security.netapp.com/advisory/ntap-20240510-0006/ Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:rack:rack:*:*:*:*:*:ruby:*:*
cpe:2.3:a:rack:rack:*:*:*:*:*:ruby:*:*
cpe:2.3:a:rack:rack:*:*:*:*:*:ruby:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

14 Feb 2025, 15:51

Type Values Removed Values Added
References () https://discuss.rubyonrails.org/t/possible-denial-of-service-vulnerability-in-rack-header-parsing/84942 - () https://discuss.rubyonrails.org/t/possible-denial-of-service-vulnerability-in-rack-header-parsing/84942 - Vendor Advisory
References () https://github.com/rack/rack/commit/30b8e39a578b25d4bdcc082c1c52c6f164b59716 - () https://github.com/rack/rack/commit/30b8e39a578b25d4bdcc082c1c52c6f164b59716 - Patch
References () https://github.com/rack/rack/commit/6c5d90bdcec0949f7ba06db62fb740dab394b582 - () https://github.com/rack/rack/commit/6c5d90bdcec0949f7ba06db62fb740dab394b582 - Patch
References () https://github.com/rack/rack/commit/a227cd793778c7c3a827d32808058571569cda6f - () https://github.com/rack/rack/commit/a227cd793778c7c3a827d32808058571569cda6f - Patch
References () https://github.com/rack/rack/commit/e4c117749ba24a66f8ec5a08eddf68deeb425ccd - () https://github.com/rack/rack/commit/e4c117749ba24a66f8ec5a08eddf68deeb425ccd - Patch
References () https://github.com/rack/rack/security/advisories/GHSA-54rr-7fvw-6x8f - () https://github.com/rack/rack/security/advisories/GHSA-54rr-7fvw-6x8f - Vendor Advisory
References () https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2024-26146.yml - () https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2024-26146.yml - Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2024/04/msg00022.html - () https://lists.debian.org/debian-lts-announce/2024/04/msg00022.html - Mailing List
References () https://security.netapp.com/advisory/ntap-20240510-0006/ - () https://security.netapp.com/advisory/ntap-20240510-0006/ - Third Party Advisory
CPE cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:a:rack:rack:*:*:*:*:*:ruby:*:*
First Time Debian debian Linux
Debian
Rack rack
Rack

13 Feb 2025, 18:17

Type Values Removed Values Added
Summary (en) Rack is a modular Ruby web server interface. Carefully crafted headers can cause header parsing in Rack to take longer than expected resulting in a possible denial of service issue. Accept and Forwarded headers are impacted. Ruby 3.2 has mitigations for this problem, so Rack applications using Ruby 3.2 or newer are unaffected. This vulnerability is fixed in 2.0.9.4, 2.1.4.4, 2.2.8.1, and 3.0.9.1. (en) Rack is a modular Ruby web server interface. Carefully crafted headers can cause header parsing in Rack to take longer than expected resulting in a possible denial of service issue. Accept and Forwarded headers are impacted. Ruby 3.2 has mitigations for this problem, so Rack applications using Ruby 3.2 or newer are unaffected. This vulnerability is fixed in 2.0.9.4, 2.1.4.4, 2.2.8.1, and 3.0.9.1.

Information

Published : 2024-02-29 00:15

Updated : 2025-02-14 15:51


NVD link : CVE-2024-26146

Mitre link : CVE-2024-26146

CVE.ORG link : CVE-2024-26146


JSON object : View

Products Affected

rack

  • rack

debian

  • debian_linux
CWE
CWE-1333

Inefficient Regular Expression Complexity