The vulnerability is a Regular Expression Denial of Service (ReDoS) located in the multipart parsing component of Rack, specifically when processing the Content-Disposition header. The advisory's title, 'ReDoS Vulnerability in Rack::Multipart handle_mime_head', directly points to the affected function or method. The provided commit patches (e.g., 4795831a0a310c2d31102749e551b38faab6401f) show modifications to regular expressions within lib/rack/multipart/parser.rb. The key change was to the MULTIPART_CONTENT_DISPOSITION regex. The original regex, /Content-Disposition:(.*)(?=#{EOL}(\S|\z))/ni, was prone to catastrophic backtracking because it was not anchored to the start of the line and used a greedy (.*) followed by a lookahead. This allowed crafted inputs to cause significant processing delays. The Rack::Multipart::Parser#handle_mime_head method is the component that would use this regex to parse the Content-Disposition header. The fix involved anchoring the regex with ^ and using more precise definitions for whitespace and header values, thus preventing the ReDoS. While other regexes for Content-Type and Content-ID were also updated for consistency and robustness, the primary reported ReDoS was tied to Content-Disposition processing within handle_mime_head.