First published: Fri Feb 23 2024(Updated: )
# Possible Denial of Service Vulnerability in Rack Header Parsing There is a possible denial of service vulnerability in the header parsing routines in Rack. This vulnerability has been assigned the CVE identifier CVE-2024-26146. Versions Affected: All. Not affected: None Fixed Versions: 2.0.9.4, 2.1.4.4, 2.2.8.1, 3.0.9.1 Impact ------ Carefully crafted headers can cause header parsing in Rack to take longer than expected resulting in a possible denial of service issue. Accept and Forwarded headers are impacted. Ruby 3.2 has mitigations for this problem, so Rack applications using Ruby 3.2 or newer are unaffected. Releases -------- The fixed releases are available at the normal locations. Workarounds ----------- There are no feasible workarounds for this issue. Patches ------- To aid users who aren't able to upgrade immediately we have provided patches for the two supported release series. They are in git-am format and consist of a single changeset. * 2-0-header-redos.patch - Patch for 2.0 series * 2-1-header-redos.patch - Patch for 2.1 series * 2-2-header-redos.patch - Patch for 2.2 series * 3-0-header-redos.patch - Patch for 3.0 series Credits ------- Thanks to [svalkanov](https://hackerone.com/svalkanov) for reporting this and providing patches!
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
rubygems/rack | <2.0.9.4 | 2.0.9.4 |
rubygems/rack | >=2.1.0<2.1.4.4 | 2.1.4.4 |
rubygems/rack | >=2.2.0<2.2.8.1 | 2.2.8.1 |
rubygems/rack | >=3.0.0<3.0.9.1 | 3.0.9.1 |
redhat/rubygem-rack | <2.0.9.4 | 2.0.9.4 |
redhat/rubygem-rack | <2.1.4.4 | 2.1.4.4 |
redhat/rubygem-rack | <2.2.8.1 | 2.2.8.1 |
redhat/rubygem-rack | <3.0.9.1 | 3.0.9.1 |
debian/ruby-rack | 2.1.4-3+deb11u2 2.2.6.4-1+deb12u1 3.0.8-4 | |
Rack | >=0.4<2.0.9.4 | |
Rack | >=2.1.0<2.1.4.4 | |
Rack | >=2.2.0<2.2.8.1 | |
Debian | =10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-26146 is classified as a Denial of Service vulnerability in Rack header parsing.
To fix CVE-2024-26146, update Rack to versions 2.0.9.4, 2.1.4.4, 2.2.8.1, or 3.0.9.1.
All versions of Rack are affected by CVE-2024-26146.
Any application using the affected versions of Rack for header parsing is vulnerable to CVE-2024-26146.
There is no known workaround for CVE-2024-26146; the only mitigation is to upgrade to a fixed version of Rack.