DSA-5698-1: ruby-rack Security Advisory Updates

Developers and stakeholders in the web application sphere have been alerted about new security patches for Rack, a popular modular interface for Ruby web applications. The detailed security advisory, known as DSA-5698-1, brings to light vulnerabilities that could potentially lead to denial of service attacks, impacting numerous web applications built on Ruby.

The focus of the security improvements addresses three critical Common Vulnerabilities and Exposures (CVEs) identifiers:

  • CVE-2024-25126: The first identified issue in Rack stems from how the media type parser manages content type headers. Specifically engineered headers can escalate processing time substantially, triggering a denial of service (DoS) condition. This particular ReDos (Regular Expression Denial of Service) vulnerability, existing due to quadratic computational complexity, has been remedied in Rack versions and
  • CVE-2024-26141: Anothersignificant finding relates to Rack's handling of Range headers. Maliciously constructed Range headers can cause the server to generate unexpectedly large responses. This flaw, which affects applications using the Rack::File middleware or the Rack::Utils.byte_ranges method, could also lead to denial of service conditions. Corrective updates have been applied in the same versions as the first CVE, ensuring protection across various deployment scenarios.
  • CVE-2024-26146: The final vulnerability detailed in the advisory impacts the parsing of headers. Certain headers like Accept and Forwarded, when crafted maliciously, can extend processing times and may induce a DoS attack. Thankfully, Rack applications running on Ruby 3.2 or newer are not affected due to inherent mitigations present in these versions. Fixes for earlier versions have been incorporated in Rack,,, and

This episode underscores the critical nature of maintaining up-to-date security practices and infrastructure. Developers utilizing Rack in their web applications should expedite the integration of these patches to mitigate any risk of exploitation. For organizations relying on older versions of Ruby or Rack, the release of these patches serves as a crucial reminder of the vulnerabilities that may still be lingering in unupdated systems.

For more detailed information and assistance on how to securely update your systems, please visit LinuxPatch.