Bug 2265595 (CVE-2024-26146)

Summary: CVE-2024-26146 rubygem-rack: Possible Denial of Service Vulnerability in Rack Header Parsing
Product: [Other] Security Response Reporter: Patrick Del Bello <pdelbell>
Component: vulnerabilityAssignee: Product Security <prodsec-ir-bot>
Status: NEW --- QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: amasferr, bbuckingham, bcourt, chazlett, ehelms, jcantril, jsherril, lzap, mhulan, mkudlej, nmoumoul, orabin, pcreech, periklis, rchan, tjochec
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: rubygem-rack 2.0.9.4, rubygem-rack 2.1.4.4, rubygem-rack 2.2.8.1, rubygem-rack 3.0.9.1 Doc Type: ---
Doc Text:
A denial of service (DoS) vulnerability was found in rubygem-rack in how it parses Rack Header. Carefully crafted headers can cause header parsing in Rack to take longer than expected, resulting in a possible denial of service issue. Accept and Forwarded headers are impacted.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2265598, 2265601, 2265604    
Bug Blocks: 2265592    

Description Patrick Del Bello 2024-02-23 02:38:56 UTC
There is a possible denial of service vulnerability in the content type parsing component of Rack. This vulnerability has been assigned the CVE identifier CVE-2024-25126.

Versions Affected: >= 0.4 Not affected: < 0.4 Fixed Versions: 3.0.9.1, 2.2.8.1
Impact


There is a possible DoS vulnerability relating to the Range request header in Rack. This vulnerability has been assigned the CVE identifier CVE-2024-26141.

Versions Affected: >= 1.3.0. Not affected: < 1.3.0 Fixed Versions: 3.0.9.1, 2.2.8.1


There is a possible denial of service vulnerability in the header parsing routines in Rack. This vulnerability has been assigned the CVE identifier CVE-2024-26146.

Versions Affected: All. Not affected: None Fixed Versions: 2.0.9.4, 2.1.4.4, 2.2.8.1, 3.0.9.1

Comment 1 Patrick Del Bello 2024-02-23 02:39:20 UTC
Created rubygem-rack tracking bugs for this issue:

Affects: epel-all [bug 2265601]
Affects: fedora-all [bug 2265598]

Comment 3 errata-xmlrpc 2024-04-16 14:53:28 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.0 Extended Update Support

Via RHSA-2024:1841 https://access.redhat.com/errata/RHSA-2024:1841

Comment 4 errata-xmlrpc 2024-04-16 15:22:31 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.2 Extended Update Support

Via RHSA-2024:1846 https://access.redhat.com/errata/RHSA-2024:1846

Comment 5 errata-xmlrpc 2024-04-23 16:26:16 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.2 Advanced Update Support
  Red Hat Enterprise Linux 8.2 Telecommunications Update Service
  Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions

Via RHSA-2024:2007 https://access.redhat.com/errata/RHSA-2024:2007

Comment 6 errata-xmlrpc 2024-04-30 09:32:11 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2024:2113 https://access.redhat.com/errata/RHSA-2024:2113

Comment 7 errata-xmlrpc 2024-04-30 14:41:21 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.8 Extended Update Support

Via RHSA-2024:2581 https://access.redhat.com/errata/RHSA-2024:2581

Comment 8 errata-xmlrpc 2024-04-30 14:49:41 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.4 Telecommunications Update Service
  Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions

Via RHSA-2024:2584 https://access.redhat.com/errata/RHSA-2024:2584

Comment 9 errata-xmlrpc 2024-05-22 09:15:35 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2024:2953 https://access.redhat.com/errata/RHSA-2024:2953

Comment 10 errata-xmlrpc 2024-05-28 14:24:21 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.6 Extended Update Support

Via RHSA-2024:3431 https://access.redhat.com/errata/RHSA-2024:3431