Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-v569-hp3g-36wr | Rack has quadratic complexity in Rack::Utils.select_best_encoding via wildcard Accept-Encoding header |
Ubuntu USN |
USN-8182-1 | Rack vulnerabilities |
Thu, 16 Apr 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:rack:rack:*:*:*:*:*:ruby:*:* |
Sat, 04 Apr 2026 01:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-1050 | |
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Fri, 03 Apr 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 03 Apr 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Rack
Rack rack |
|
| Vendors & Products |
Rack
Rack rack |
Thu, 02 Apr 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, and 3.2.6, Rack::Utils.select_best_encoding processes Accept-Encoding values with quadratic time complexity when the header contains many wildcard (*) entries. Because this method is used by Rack::Deflater to choose a response encoding, an unauthenticated attacker can send a single request with a crafted Accept-Encoding header and cause disproportionate CPU consumption on the compression middleware path. This results in a denial of service condition for applications using Rack::Deflater. This issue has been patched in versions 2.2.23, 3.1.21, and 3.2.6. | |
| Title | Rack: Quadratic complexity in Rack::Utils.select_best_encoding via wildcard Accept-Encoding header | |
| Weaknesses | CWE-400 CWE-407 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-03T18:19:00.388Z
Reserved: 2026-03-26T16:22:29.034Z
Link: CVE-2026-34230
Updated: 2026-04-02T18:56:48.670Z
Status : Analyzed
Published: 2026-04-02T17:16:23.570
Modified: 2026-04-16T17:27:43.037
Link: CVE-2026-34230
OpenCVE Enrichment
Updated: 2026-04-07T07:56:02Z
Github GHSA
Ubuntu USN