NA

CVE-2024-26141

Published: 29/02/2024 Updated: 29/04/2024

Vulnerability Summary

Rack is a modular Ruby web server interface. Carefully crafted Range headers can cause a server to respond with an unexpectedly large response. Responding with such large responses could lead to a denial of service issue. Vulnerable applications will use the `Rack::File` middleware or the `Rack::Utils.byte_ranges` methods (this includes Rails applications). The vulnerability is fixed in 3.0.9.1 and 2.2.8.1.

Vendor Advisories

Debian Bug report logs - #1064516 ruby-rack: CVE-2024-26141 CVE-2024-25126 CVE-2024-26146 Package: src:ruby-rack; Maintainer for src:ruby-rack is Debian Ruby Team <pkg-ruby-extras-maintainers@listsaliothdebianorg>; Reported by: Moritz Mühlenhoff <jmm@inutilorg> Date: Fri, 23 Feb 2024 15:33:02 UTC Severity: grave ...
A Denial of Service (DoS) vulnerability was found in rubygem-rack in how it parses Content-Type Carefully crafted content type headers can cause Rack's media type parser to take much longer than expected, leading to a possible denial of service vulnerability (CVE-2024-25126) A Denial of Service (DoS) vulnerability was found in rubygem-rack in how ...
Description<!---->This CVE is under investigation by Red Hat Product Security ...