Rack is a modular Ruby web server interface. Carefully crafted headers can cause header parsing in Rack to take longer than expected resulting in a possible denial of service issue. Accept and Forwarded headers are impacted. Ruby 3.2 has mitigations for this problem, so Rack applications using Ruby 3.2 or newer are unaffected. This vulnerability is fixed in 2.0.9.4, 2.1.4.4, 2.2.8.1, and 3.0.9.1.
References
Configurations
History
14 Feb 2025, 15:51
Type | Values Removed | Values Added |
---|---|---|
References | () https://discuss.rubyonrails.org/t/possible-denial-of-service-vulnerability-in-rack-header-parsing/84942 - Vendor Advisory | |
References | () https://github.com/rack/rack/commit/30b8e39a578b25d4bdcc082c1c52c6f164b59716 - Patch | |
References | () https://github.com/rack/rack/commit/6c5d90bdcec0949f7ba06db62fb740dab394b582 - Patch | |
References | () https://github.com/rack/rack/commit/a227cd793778c7c3a827d32808058571569cda6f - Patch | |
References | () https://github.com/rack/rack/commit/e4c117749ba24a66f8ec5a08eddf68deeb425ccd - Patch | |
References | () https://github.com/rack/rack/security/advisories/GHSA-54rr-7fvw-6x8f - Vendor Advisory | |
References | () https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2024-26146.yml - Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2024/04/msg00022.html - Mailing List | |
References | () https://security.netapp.com/advisory/ntap-20240510-0006/ - Third Party Advisory | |
CPE | cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* cpe:2.3:a:rack:rack:*:*:*:*:*:ruby:*:* |
|
First Time |
Debian debian Linux
Debian Rack rack Rack |
13 Feb 2025, 18:17
Type | Values Removed | Values Added |
---|---|---|
Summary | (en) Rack is a modular Ruby web server interface. Carefully crafted headers can cause header parsing in Rack to take longer than expected resulting in a possible denial of service issue. Accept and Forwarded headers are impacted. Ruby 3.2 has mitigations for this problem, so Rack applications using Ruby 3.2 or newer are unaffected. This vulnerability is fixed in 2.0.9.4, 2.1.4.4, 2.2.8.1, and 3.0.9.1. |
Information
Published : 2024-02-29 00:15
Updated : 2025-02-14 15:51
NVD link : CVE-2024-26146
Mitre link : CVE-2024-26146
CVE.ORG link : CVE-2024-26146
JSON object : View
Products Affected
rack
- rack
debian
- debian_linux
CWE
CWE-1333
Inefficient Regular Expression Complexity