CVE-2024-26146

Rack is a modular Ruby web server interface. Carefully crafted headers can cause header parsing in Rack to take longer than expected resulting in a possible denial of service issue. Accept and Forwarded headers are impacted. Ruby 3.2 has mitigations for this problem, so Rack applications using Ruby 3.2 or newer are unaffected. This vulnerability is fixed in 2.0.9.4, 2.1.4.4, 2.2.8.1, and 3.0.9.1.
References
Link Resource
https://discuss.rubyonrails.org/t/possible-denial-of-service-vulnerability-in-rack-header-parsing/84942 Vendor Advisory
https://github.com/rack/rack/commit/30b8e39a578b25d4bdcc082c1c52c6f164b59716 Patch
https://github.com/rack/rack/commit/6c5d90bdcec0949f7ba06db62fb740dab394b582 Patch
https://github.com/rack/rack/commit/a227cd793778c7c3a827d32808058571569cda6f Patch
https://github.com/rack/rack/commit/e4c117749ba24a66f8ec5a08eddf68deeb425ccd Patch
https://github.com/rack/rack/security/advisories/GHSA-54rr-7fvw-6x8f Vendor Advisory
https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2024-26146.yml Third Party Advisory
https://lists.debian.org/debian-lts-announce/2024/04/msg00022.html Mailing List
https://security.netapp.com/advisory/ntap-20240510-0006/ Third Party Advisory
https://discuss.rubyonrails.org/t/possible-denial-of-service-vulnerability-in-rack-header-parsing/84942 Vendor Advisory
https://github.com/rack/rack/commit/30b8e39a578b25d4bdcc082c1c52c6f164b59716 Patch
https://github.com/rack/rack/commit/6c5d90bdcec0949f7ba06db62fb740dab394b582 Patch
https://github.com/rack/rack/commit/a227cd793778c7c3a827d32808058571569cda6f Patch
https://github.com/rack/rack/commit/e4c117749ba24a66f8ec5a08eddf68deeb425ccd Patch
https://github.com/rack/rack/security/advisories/GHSA-54rr-7fvw-6x8f Vendor Advisory
https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2024-26146.yml Third Party Advisory
https://lists.debian.org/debian-lts-announce/2024/04/msg00022.html Mailing List
https://security.netapp.com/advisory/ntap-20240510-0006/ Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:rack:rack:*:*:*:*:*:ruby:*:*
cpe:2.3:a:rack:rack:*:*:*:*:*:ruby:*:*
cpe:2.3:a:rack:rack:*:*:*:*:*:ruby:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

14 Feb 2025, 15:51

Type Values Removed Values Added
First Time Debian debian Linux
Rack
Rack rack
Debian
References () https://discuss.rubyonrails.org/t/possible-denial-of-service-vulnerability-in-rack-header-parsing/84942 - () https://discuss.rubyonrails.org/t/possible-denial-of-service-vulnerability-in-rack-header-parsing/84942 - Vendor Advisory
References () https://github.com/rack/rack/commit/30b8e39a578b25d4bdcc082c1c52c6f164b59716 - () https://github.com/rack/rack/commit/30b8e39a578b25d4bdcc082c1c52c6f164b59716 - Patch
References () https://github.com/rack/rack/commit/6c5d90bdcec0949f7ba06db62fb740dab394b582 - () https://github.com/rack/rack/commit/6c5d90bdcec0949f7ba06db62fb740dab394b582 - Patch
References () https://github.com/rack/rack/commit/a227cd793778c7c3a827d32808058571569cda6f - () https://github.com/rack/rack/commit/a227cd793778c7c3a827d32808058571569cda6f - Patch
References () https://github.com/rack/rack/commit/e4c117749ba24a66f8ec5a08eddf68deeb425ccd - () https://github.com/rack/rack/commit/e4c117749ba24a66f8ec5a08eddf68deeb425ccd - Patch
References () https://github.com/rack/rack/security/advisories/GHSA-54rr-7fvw-6x8f - () https://github.com/rack/rack/security/advisories/GHSA-54rr-7fvw-6x8f - Vendor Advisory
References () https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2024-26146.yml - () https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2024-26146.yml - Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2024/04/msg00022.html - () https://lists.debian.org/debian-lts-announce/2024/04/msg00022.html - Mailing List
References () https://security.netapp.com/advisory/ntap-20240510-0006/ - () https://security.netapp.com/advisory/ntap-20240510-0006/ - Third Party Advisory
CPE cpe:2.3:a:rack:rack:*:*:*:*:*:ruby:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

13 Feb 2025, 18:17

Type Values Removed Values Added
Summary (en) Rack is a modular Ruby web server interface. Carefully crafted headers can cause header parsing in Rack to take longer than expected resulting in a possible denial of service issue. Accept and Forwarded headers are impacted. Ruby 3.2 has mitigations for this problem, so Rack applications using Ruby 3.2 or newer are unaffected. This vulnerability is fixed in 2.0.9.4, 2.1.4.4, 2.2.8.1, and 3.0.9.1. (en) Rack is a modular Ruby web server interface. Carefully crafted headers can cause header parsing in Rack to take longer than expected resulting in a possible denial of service issue. Accept and Forwarded headers are impacted. Ruby 3.2 has mitigations for this problem, so Rack applications using Ruby 3.2 or newer are unaffected. This vulnerability is fixed in 2.0.9.4, 2.1.4.4, 2.2.8.1, and 3.0.9.1.

21 Nov 2024, 09:02

Type Values Removed Values Added
References () https://discuss.rubyonrails.org/t/possible-denial-of-service-vulnerability-in-rack-header-parsing/84942 - () https://discuss.rubyonrails.org/t/possible-denial-of-service-vulnerability-in-rack-header-parsing/84942 -
References () https://github.com/rack/rack/commit/30b8e39a578b25d4bdcc082c1c52c6f164b59716 - () https://github.com/rack/rack/commit/30b8e39a578b25d4bdcc082c1c52c6f164b59716 -
References () https://github.com/rack/rack/commit/6c5d90bdcec0949f7ba06db62fb740dab394b582 - () https://github.com/rack/rack/commit/6c5d90bdcec0949f7ba06db62fb740dab394b582 -
References () https://github.com/rack/rack/commit/a227cd793778c7c3a827d32808058571569cda6f - () https://github.com/rack/rack/commit/a227cd793778c7c3a827d32808058571569cda6f -
References () https://github.com/rack/rack/commit/e4c117749ba24a66f8ec5a08eddf68deeb425ccd - () https://github.com/rack/rack/commit/e4c117749ba24a66f8ec5a08eddf68deeb425ccd -
References () https://github.com/rack/rack/security/advisories/GHSA-54rr-7fvw-6x8f - () https://github.com/rack/rack/security/advisories/GHSA-54rr-7fvw-6x8f -
References () https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2024-26146.yml - () https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2024-26146.yml -
References () https://lists.debian.org/debian-lts-announce/2024/04/msg00022.html - () https://lists.debian.org/debian-lts-announce/2024/04/msg00022.html -
References () https://security.netapp.com/advisory/ntap-20240510-0006/ - () https://security.netapp.com/advisory/ntap-20240510-0006/ -

10 Jun 2024, 18:15

Type Values Removed Values Added
References
  • () https://security.netapp.com/advisory/ntap-20240510-0006/ -

29 Apr 2024, 11:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/04/msg00022.html -
Summary
  • (es) Rack es una interfaz modular de servidor web Ruby. Los encabezados cuidadosamente elaborados pueden hacer que el análisis de encabezados en Rack demore más de lo esperado, lo que resulta en un posible problema de denegación de servicio. Los encabezados Aceptar y Reenviar se ven afectados. Ruby 3.2 tiene mitigaciones para este problema, por lo que las aplicaciones Rack que usan Ruby 3.2 o posterior no se ven afectadas. Esta vulnerabilidad se solucionó en 2.0.9.4, 2.1.4.4, 2.2.8.1 y 3.0.9.1.

29 Feb 2024, 00:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-29 00:15

Updated : 2025-02-14 15:51


NVD link : CVE-2024-26146

Mitre link : CVE-2024-26146

CVE.ORG link : CVE-2024-26146


JSON object : View

Products Affected

debian

  • debian_linux

rack

  • rack
CWE
CWE-1333

Inefficient Regular Expression Complexity