DEBIAN-CVE-2026-34826

Source
https://security-tracker.debian.org/tracker/CVE-2026-34826
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2026-34826.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2026-34826
Upstream
Published
2026-04-02T17:16:25.880Z
Modified
2026-04-03T10:04:55.460292Z
Severity
  • 5.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L CVSS Calculator
Summary
[none]
Details

Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, and 3.2.6, Rack::Utils.getbyteranges parses the HTTP Range header without limiting the number of individual byte ranges. Although the existing fix for CVE-2024-26141 rejects ranges whose total byte coverage exceeds the file size, it does not restrict the count of ranges. An attacker can supply many small overlapping ranges such as 0-0,0-0,0-0,... to trigger disproportionate CPU, memory, I/O, and bandwidth consumption per request. This results in a denial of service condition in Rack file-serving paths that process multipart byte range responses. This issue has been patched in versions 2.2.23, 3.1.21, and 3.2.6.

References

Affected packages

Debian:11 / ruby-rack

Package

Name
ruby-rack
Purl
pkg:deb/debian/ruby-rack?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*
2.1.4-3
2.1.4-3+deb11u1
2.1.4-3+deb11u2
2.1.4-3+deb11u3
2.1.4-3+deb11u4
2.1.4-3+deb11u5
2.1.4-4
2.1.4-5
2.2.3-1
2.2.3-2
2.2.3-3
2.2.3-4
2.2.4-1
2.2.4-2
2.2.4-3
2.2.6.4-1
2.2.7-1
2.2.7-1.1
2.2.13-1~deb12u1
3.*
3.0.0-1
3.0.8-1
3.0.8-2
3.0.8-3
3.0.8-4
3.1.9-1~exp1
3.1.9-2
3.1.12-1
3.1.12-2~exp1
3.1.16-0.1
3.1.18-1~deb13u1
3.1.18-1
3.2.4-1
3.2.5-1
3.2.5-2
3.2.6-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2026-34826.json"

Debian:12 / ruby-rack

Package

Name
ruby-rack
Purl
pkg:deb/debian/ruby-rack?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*
2.2.6.4-1
2.2.6.4-1+deb12u1
2.2.7-1
2.2.7-1.1
2.2.13-1~deb12u1
2.2.20-0+deb12u1
2.2.22-0+deb12u1
3.*
3.0.0-1
3.0.8-1
3.0.8-2
3.0.8-3
3.0.8-4
3.1.9-1~exp1
3.1.9-2
3.1.12-1
3.1.12-2~exp1
3.1.16-0.1
3.1.18-1~deb13u1
3.1.18-1
3.2.4-1
3.2.5-1
3.2.5-2
3.2.6-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2026-34826.json"

Debian:13 / ruby-rack

Package

Name
ruby-rack
Purl
pkg:deb/debian/ruby-rack?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*
3.1.16-0.1
3.1.18-1~deb13u1
3.1.18-1
3.1.20-0+deb13u1
3.2.4-1
3.2.5-1
3.2.5-2
3.2.6-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2026-34826.json"

Debian:14 / ruby-rack

Package

Name
ruby-rack
Purl
pkg:deb/debian/ruby-rack?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*
3.1.16-0.1
3.1.18-1~deb13u1
3.1.18-1
3.2.4-1
3.2.5-1
3.2.5-2
3.2.6-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2026-34826.json"