CVE-2026-34827

Publication date 2 April 2026

Last updated 14 April 2026


Ubuntu priority

Cvss 3 Severity Score

7.5 · High

Score breakdown

Description

Rack is a modular Ruby web server interface. From versions 3.0.0.beta1 to before 3.1.21, and 3.2.0 to before 3.2.6, Rack::Multipart::Parser#handle_mime_head parses quoted multipart parameters such as Content-Disposition: form-data; name="..." using repeated String#index searches combined with String#slice! prefix deletion. For escape-heavy quoted values, this causes super-linear processing. An unauthenticated attacker can send a crafted multipart/form-data request containing many parts with long backslash-escaped parameter values to trigger excessive CPU usage during multipart parsing. This results in a denial of service condition in Rack applications that accept multipart form data. This issue has been patched in versions 3.1.21 and 3.2.6.

Status

Package Ubuntu Release Status
ruby-rack 25.10 questing
Vulnerable
24.04 LTS noble Ignored changes too intrusive
22.04 LTS jammy Ignored changes too intrusive
20.04 LTS focal Ignored changes too intrusive
18.04 LTS bionic Ignored changes too intrusive
16.04 LTS xenial Ignored changes too intrusive
14.04 LTS trusty Ignored changes too intrusive

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
ruby-rack

Severity score breakdown

Parameter Value
Base score 7.5 · High
Attack vector Network
Attack complexity Low
Privileges required None
User interaction None
Scope Unchanged
Confidentiality None
Integrity impact None
Availability impact High
Vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Access our resources on patching vulnerabilities