CVE-2026-34826
ADVISORY - githubSummary
Summary
Rack::Utils.get_byte_ranges parses the HTTP Range header without limiting the number of individual byte ranges. Although the existing fix for CVE-2024-26141 rejects ranges whose total byte coverage exceeds the file size, it does not restrict the count of ranges. An attacker can supply many small overlapping ranges such as 0-0,0-0,0-0,... to trigger disproportionate CPU, memory, I/O, and bandwidth consumption per request.
This results in a denial of service condition in Rack file-serving paths that process multipart byte range responses.
Details
Rack::Utils.get_byte_ranges accepts a comma-separated list of byte ranges and validates them based on their aggregate size, but does not impose a limit on how many individual ranges may be supplied.
As a result, a request such as:
Range: bytes=0-0,0-0,0-0,0-0,...
can contain thousands of overlapping one-byte ranges while still satisfying the total-size check added for CVE-2024-26141.
When such a header is processed by Rack’s file-serving code, each range causes additional work, including multipart response generation, per-range iteration, file seek and read operations, and temporary string allocation for response size calculation and output. This allows a relatively small request header to trigger disproportionately expensive processing and a much larger multipart response.
The issue is distinct from CVE-2024-26141. That fix prevents range sets whose total byte coverage exceeds the file size, but does not prevent a large number of overlapping ranges whose summed size remains within that limit.
Impact
Applications that expose file-serving paths with byte range support may be vulnerable to denial of service.
An unauthenticated attacker can send crafted Range headers containing many small overlapping ranges to consume excessive CPU time, memory, file I/O, and bandwidth. Repeated requests may reduce application availability and increase pressure on workers and garbage collection.
Mitigation
- Update to a patched version of Rack that limits the number of accepted byte ranges.
- Reject or normalize multipart byte range requests containing excessive range counts.
- Consider disabling multipart range support where it is not required.
- Apply request filtering or header restrictions at the reverse proxy or application boundary to limit abusive
Rangeheaders.
Common Weakness Enumeration (CWE)
Allocation of Resources Without Limits or Throttling
NIST
CVSS SCORE
5.3mediumGitHub
CVSS SCORE
5.3mediumDebian
-
Ubuntu
-
CVSS SCORE
N/AmediumRed Hat
3.9
CVSS SCORE
5.3mediumminimos
MINI-2jcq-p6qw-pcpv
-
minimos
MINI-623g-wg9g-j44x
-
minimos
MINI-6rg3-7x3v-p87x
-
minimos
MINI-7qq4-xcjf-74qf
-
minimos
MINI-8rxh-pc47-824h
-
minimos
MINI-g3c5-cmqm-87w4
-
minimos
MINI-gv7m-6473-g9rv
-
minimos
MINI-h86m-6mph-9983
-
minimos
MINI-q6rg-522w-wr8f
-
minimos
MINI-qxh9-5mp4-gp2h
-
minimos
MINI-r4v9-m6p6-m6qj
-
minimos
MINI-v7vj-76r9-cx3q
-
minimos
MINI-vfxc-rx29-rmcf
-
minimos
MINI-w38v-fcq9-pxc9
-