Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, and 3.2.6, Rack::Utils.select_best_encoding processes Accept-Encoding values with quadratic time complexity when the header contains many wildcard (*) entries. Because this method is used by Rack::Deflater to choose a response encoding, an unauthenticated attacker can send a single request with a crafted Accept-Encoding header and cause disproportionate CPU consumption on the compression middleware path. This results in a denial of service condition for applications using Rack::Deflater. This issue has been patched in versions 2.2.23, 3.1.21, and 3.2.6.
References
| Link | Resource |
|---|---|
| https://github.com/rack/rack/security/advisories/GHSA-v569-hp3g-36wr | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
16 Apr 2026, 17:27
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Rack rack
Rack |
|
| References | () https://github.com/rack/rack/security/advisories/GHSA-v569-hp3g-36wr - Vendor Advisory | |
| CPE | cpe:2.3:a:rack:rack:*:*:*:*:*:ruby:*:* |
02 Apr 2026, 17:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-02 17:16
Updated : 2026-04-16 17:27
NVD link : CVE-2026-34230
Mitre link : CVE-2026-34230
CVE.ORG link : CVE-2026-34230
JSON object : View
Products Affected
rack
- rack
