CVE-2024-26141

NameCVE-2024-26141
DescriptionRack is a modular Ruby web server interface. Carefully crafted Range headers can cause a server to respond with an unexpectedly large response. Responding with such large responses could lead to a denial of service issue. Vulnerable applications will use the `Rack::File` middleware or the `Rack::Utils.byte_ranges` methods (this includes Rails applications). The vulnerability is fixed in 3.0.9.1 and 2.2.8.1.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-3800-1, DSA-5698-1, ELA-1081-1
Debian Bugs1064516

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
ruby-rack (PTS)jessie, jessie (lts)1.5.2-3+deb8u4vulnerable
stretch (security)1.6.4-4+deb9u2vulnerable
stretch (lts), stretch1.6.4-4+deb9u6fixed
buster (security), buster, buster (lts)2.0.6-3+deb10u4fixed
bullseye (security), bullseye2.1.4-3+deb11u2fixed
bookworm (security), bookworm2.2.6.4-1+deb12u1fixed
sid, trixie2.2.7-1.1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
ruby-racksourcejessie(unfixed)end-of-life
ruby-racksourcestretch1.6.4-4+deb9u6ELA-1081-1
ruby-racksourcebuster2.0.6-3+deb10u4DLA-3800-1
ruby-racksourcebullseye2.1.4-3+deb11u2DSA-5698-1
ruby-racksourcebookworm2.2.6.4-1+deb12u1DSA-5698-1
ruby-racksource(unstable)2.2.7-1.11064516

Notes

https://github.com/rack/rack/releases/tag/v2.2.8.1
https://github.com/rack/rack/commit/62457686b26d33a15a254c7768c2076e8e02b48b (v2.2.8.1)

Search for package or bug name: Reporting problems