Rack is a modular Ruby web server interface. Carefully crafted headers can cause header parsing in Rack to take longer than expected resulting in a possible denial of service issue. Accept and Forwarded headers are impacted. Ruby 3.2 has mitigations for this problem, so Rack applications using Ruby 3.2 or newer are unaffected. This vulnerability is fixed in 2.0.9.4, 2.1.4.4, 2.2.8.1, and 3.0.9.1.
References
Configurations
History
14 Feb 2025, 15:51
Type | Values Removed | Values Added |
---|---|---|
First Time |
Debian debian Linux
Rack Rack rack Debian |
|
References | () https://discuss.rubyonrails.org/t/possible-denial-of-service-vulnerability-in-rack-header-parsing/84942 - Vendor Advisory | |
References | () https://github.com/rack/rack/commit/30b8e39a578b25d4bdcc082c1c52c6f164b59716 - Patch | |
References | () https://github.com/rack/rack/commit/6c5d90bdcec0949f7ba06db62fb740dab394b582 - Patch | |
References | () https://github.com/rack/rack/commit/a227cd793778c7c3a827d32808058571569cda6f - Patch | |
References | () https://github.com/rack/rack/commit/e4c117749ba24a66f8ec5a08eddf68deeb425ccd - Patch | |
References | () https://github.com/rack/rack/security/advisories/GHSA-54rr-7fvw-6x8f - Vendor Advisory | |
References | () https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2024-26146.yml - Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2024/04/msg00022.html - Mailing List | |
References | () https://security.netapp.com/advisory/ntap-20240510-0006/ - Third Party Advisory | |
CPE | cpe:2.3:a:rack:rack:*:*:*:*:*:ruby:*:* cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* |
13 Feb 2025, 18:17
Type | Values Removed | Values Added |
---|---|---|
Summary | (en) Rack is a modular Ruby web server interface. Carefully crafted headers can cause header parsing in Rack to take longer than expected resulting in a possible denial of service issue. Accept and Forwarded headers are impacted. Ruby 3.2 has mitigations for this problem, so Rack applications using Ruby 3.2 or newer are unaffected. This vulnerability is fixed in 2.0.9.4, 2.1.4.4, 2.2.8.1, and 3.0.9.1. |
21 Nov 2024, 09:02
Type | Values Removed | Values Added |
---|---|---|
References | () https://discuss.rubyonrails.org/t/possible-denial-of-service-vulnerability-in-rack-header-parsing/84942 - | |
References | () https://github.com/rack/rack/commit/30b8e39a578b25d4bdcc082c1c52c6f164b59716 - | |
References | () https://github.com/rack/rack/commit/6c5d90bdcec0949f7ba06db62fb740dab394b582 - | |
References | () https://github.com/rack/rack/commit/a227cd793778c7c3a827d32808058571569cda6f - | |
References | () https://github.com/rack/rack/commit/e4c117749ba24a66f8ec5a08eddf68deeb425ccd - | |
References | () https://github.com/rack/rack/security/advisories/GHSA-54rr-7fvw-6x8f - | |
References | () https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2024-26146.yml - | |
References | () https://lists.debian.org/debian-lts-announce/2024/04/msg00022.html - | |
References | () https://security.netapp.com/advisory/ntap-20240510-0006/ - |
10 Jun 2024, 18:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
29 Apr 2024, 11:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary |
|
29 Feb 2024, 00:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-02-29 00:15
Updated : 2025-02-14 15:51
NVD link : CVE-2024-26146
Mitre link : CVE-2024-26146
CVE.ORG link : CVE-2024-26146
JSON object : View
Products Affected
debian
- debian_linux
rack
- rack
CWE
CWE-1333
Inefficient Regular Expression Complexity