Bug 2454493 (CVE-2026-34230) - CVE-2026-34230 rack: Rack: Denial of Service via crafted Accept-Encoding header
Summary: CVE-2026-34230 rack: Rack: Denial of Service via crafted Accept-Encoding header
Keywords:
Status: NEW
Alias: CVE-2026-34230
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2026-04-02 18:01 UTC by OSIDB Bzimport
Modified: 2026-04-03 20:14 UTC (History)
11 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2026-04-02 18:01:59 UTC
Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, and 3.2.6, Rack::Utils.select_best_encoding processes Accept-Encoding values with quadratic time complexity when the header contains many wildcard (*) entries. Because this method is used by Rack::Deflater to choose a response encoding, an unauthenticated attacker can send a single request with a crafted Accept-Encoding header and cause disproportionate CPU consumption on the compression middleware path. This results in a denial of service condition for applications using Rack::Deflater. This issue has been patched in versions 2.2.23, 3.1.21, and 3.2.6.


Note You need to log in before you can comment on or make changes to this bug.