CVE-2024-26146

Rack is a modular Ruby web server interface. Carefully crafted headers can cause header parsing in Rack to take longer than expected resulting in a possible denial of service issue. Accept and Forwarded headers are impacted. Ruby 3.2 has mitigations for this problem, so Rack applications using Ruby 3.2 or newer are unaffected. This vulnerability is fixed in 2.0.9.4, 2.1.4.4, 2.2.8.1, and 3.0.9.1.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
5.3 MEDIUM
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
GitHub_MCNA
5.3 MEDIUM
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
CISA-ADPADP
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 67%
VendorProductVersion
rackrack
0.4 ≤
𝑥
< 2.0.9.4
rackrack
2.1.0 ≤
𝑥
< 2.1.4.4
rackrack
2.2.0 ≤
𝑥
< 2.2.8.1
debiandebian_linux
10.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
ruby-rack
bullseye
2.1.4-3+deb11u2
fixed
bullseye (security)
2.1.4-3+deb11u3
fixed
bookworm
2.2.13-1~deb12u1
fixed
bookworm (security)
2.2.13-1~deb12u1
fixed
sid
3.1.12-1
fixed
trixie
3.1.12-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
ruby-rack
plucky
not-affected
oracular
not-affected
noble
Fixed 2.2.7-1ubuntu0.1
released
mantic
Fixed 2.2.4-3ubuntu0.1
released
jammy
Fixed 2.1.4-5ubuntu1.1
released
focal
Fixed 2.0.7-2ubuntu0.1+esm5
released
bionic
Fixed 1.6.4-4ubuntu0.2+esm6
released
xenial
Fixed 1.6.4-3ubuntu0.2+esm6
released
trusty
Fixed 1.5.2-3+deb8u3ubuntu1~esm8
released