{"id":"CVE-2022-44570","details":"A denial of service vulnerability in the Range header parsing component of Rack \u003e= 1.5.0. A Carefully crafted input can cause the Range header parsing component in Rack to take an unexpected amount of time, possibly resulting in a denial of service attack vector. Any applications that deal with Range requests (such as streaming applications, or applications that serve files) may be impacted.","aliases":["GHSA-65f5-mfpf-vfhj"],"modified":"2026-04-10T04:52:18.382787Z","published":"2023-02-09T20:15:11.090Z","related":["MGASA-2023-0106","SUSE-SU-2023:0276-1","SUSE-SU-2023:0649-1","openSUSE-SU-2024:12633-1","openSUSE-SU-2024:12634-1","openSUSE-SU-2024:12974-1","openSUSE-SU-2024:13167-1","openSUSE-SU-2024:13726-1","openSUSE-SU-2024:13727-1","openSUSE-SU-2025:14811-1","openSUSE-SU-2025:14875-1","openSUSE-SU-2026:10286-1","openSUSE-SU-2026:10358-1"],"references":[{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20231208-0010/"},{"type":"ADVISORY","url":"https://www.debian.org/security/2023/dsa-5530"},{"type":"FIX","url":"https://discuss.rubyonrails.org/t/cve-2022-44570-possible-denial-of-service-vulnerability-in-racks-range-header-parsing/82125"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/rack/rack","events":[{"introduced":"0cba6a4d5aeb1ac8768b6ca36320731487fb596b"},{"fixed":"d573159067d8dc64db97beff67621654754e86f2"},{"introduced":"879ae7163a399a9ed36d876668f4ecae4ae8b9e4"},{"fixed":"8b8efd9591876cb6d40b3120388a8b9a0e083777"},{"introduced":"39d501a28c1fe51284addfe6dacffafb69d49849"},{"fixed":"20bc90c2431d7fabcd1873410543cf3d72f65004"},{"introduced":"52901caf09ebcda879512a8605059963a49df55d"},{"fixed":"d1b4c2d82ac5444228d30e66f38156f7046b4296"}],"database_specific":{"versions":[{"introduced":"1.5.0"},{"fixed":"2.0.9.2"},{"introduced":"2.1.0"},{"fixed":"2.1.4.2"},{"introduced":"2.2.0"},{"fixed":"2.2.6.1"},{"introduced":"3.0.0"},{"fixed":"3.0.4.1"}]}}],"versions":["1.5.0","1.5.1","1.6.0.beta","2.0.0","2.0.0.alpha","2.0.0.rc1","2.0.1","2.0.2","2.0.3","2.0.4","2.0.6","2.0.7","2.0.8","2.0.9","2.0.9.1","2.1.0","2.1.1","2.1.2","2.1.3","2.1.4","2.2.0","2.2.3","2.2.4","3.0.0","v2.2.1","v2.2.2","v2.2.5","v2.2.6","v3.0.1","v3.0.2","v3.0.3","v3.0.4"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-44570.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}