CVE-2024-26141
Published: 29 February 2024
Rack is a modular Ruby web server interface. Carefully crafted Range headers can cause a server to respond with an unexpectedly large response. Responding with such large responses could lead to a denial of service issue. Vulnerable applications will use the `Rack::File` middleware or the `Rack::Utils.byte_ranges` methods (this includes Rails applications). The vulnerability is fixed in 3.0.9.1 and 2.2.8.1.
Priority
Status
Package | Release | Status |
---|---|---|
ruby-rack
Launchpad, Ubuntu, Debian |
bionic |
Released
(1.6.4-4ubuntu0.2+esm6)
Available with Ubuntu Pro |
focal |
Released
(2.0.7-2ubuntu0.1+esm5)
Available with Ubuntu Pro |
|
jammy |
Released
(2.1.4-5ubuntu1+esm5)
Available with Ubuntu Pro |
|
mantic |
Released
(2.2.4-3ubuntu0.1)
|
|
noble |
Released
(2.2.7-1ubuntu0.1)
|
|
trusty |
Released
(1.5.2-3+deb8u3ubuntu1~esm8)
Available with Ubuntu Pro or Ubuntu Pro (Infra-only) |
|
upstream |
Released
(2.2.8.1,2.2.7-1.1)
|
|
xenial |
Released
(1.6.4-3ubuntu0.2+esm6)
Available with Ubuntu Pro |
|
Patches:
upstream: https://github.com/rack/rack/commit/62457686b26d33a15a254c7768c2076e8e02b48b |