Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2026-26962 (GCVE-0-2026-26962)
Vulnerability from cvelistv5 – Published: 2026-04-02 17:10 – Updated: 2026-04-03 18:13- CWE-93 - Improper Neutralization of CRLF Sequences ('CRLF Injection')
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2026-26962",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-04-02T18:31:17.511210Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-04-03T18:13:06.632Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "rack",
"vendor": "rack",
"versions": [
{
"status": "affected",
"version": "\u003e= 3.2.0, \u003c 3.2.6"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Rack is a modular Ruby web server interface. From version 3.2.0 to before version 3.2.6, Rack::Multipart::Parser unfolds folded multipart part headers incorrectly. When a multipart header contains an obs-fold sequence, Rack preserves the embedded CRLF in parsed parameter values such as filename or name instead of removing the folded line break during unfolding. As a result, applications that later reuse those parsed values in HTTP response headers may be vulnerable to downstream header injection or response splitting. This issue has been patched in version 3.2.6."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-93",
"description": "CWE-93: Improper Neutralization of CRLF Sequences (\u0027CRLF Injection\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-04-02T17:10:17.091Z",
"orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"shortName": "GitHub_M"
},
"references": [
{
"name": "https://github.com/rack/rack/security/advisories/GHSA-rx22-g9mx-qrhv",
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/rack/rack/security/advisories/GHSA-rx22-g9mx-qrhv"
}
],
"source": {
"advisory": "GHSA-rx22-g9mx-qrhv",
"discovery": "UNKNOWN"
},
"title": "Rack: Header injection in multipart requests"
}
},
"cveMetadata": {
"assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"assignerShortName": "GitHub_M",
"cveId": "CVE-2026-26962",
"datePublished": "2026-04-02T17:10:17.091Z",
"dateReserved": "2026-02-16T22:20:28.612Z",
"dateUpdated": "2026-04-03T18:13:06.632Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2026-26962",
"date": "2026-05-09",
"epss": "0.00022",
"percentile": "0.06243"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2026-26962\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2026-04-02T18:16:26.773\",\"lastModified\":\"2026-04-21T00:42:36.393\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Rack is a modular Ruby web server interface. From version 3.2.0 to before version 3.2.6, Rack::Multipart::Parser unfolds folded multipart part headers incorrectly. When a multipart header contains an obs-fold sequence, Rack preserves the embedded CRLF in parsed parameter values such as filename or name instead of removing the folded line break during unfolding. As a result, applications that later reuse those parsed values in HTTP response headers may be vulnerable to downstream header injection or response splitting. This issue has been patched in version 3.2.6.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N\",\"baseScore\":4.8,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.2,\"impactScore\":2.5},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":2.5}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-93\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rack:rack:*:*:*:*:*:ruby:*:*\",\"versionStartIncluding\":\"3.2.0\",\"versionEndExcluding\":\"3.2.6\",\"matchCriteriaId\":\"3FB592AD-E826-49BE-AC6D-E5F55FDCC96E\"}]}]}],\"references\":[{\"url\":\"https://github.com/rack/rack/security/advisories/GHSA-rx22-g9mx-qrhv\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Vendor Advisory\",\"Mitigation\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2026-26962\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2026-04-02T18:31:17.511210Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2026-04-02T18:31:21.870Z\"}}], \"cna\": {\"title\": \"Rack: Header injection in multipart requests\", \"source\": {\"advisory\": \"GHSA-rx22-g9mx-qrhv\", \"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 4.8, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N\", \"integrityImpact\": \"LOW\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"HIGH\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"LOW\"}}], \"affected\": [{\"vendor\": \"rack\", \"product\": \"rack\", \"versions\": [{\"status\": \"affected\", \"version\": \"\u003e= 3.2.0, \u003c 3.2.6\"}]}], \"references\": [{\"url\": \"https://github.com/rack/rack/security/advisories/GHSA-rx22-g9mx-qrhv\", \"name\": \"https://github.com/rack/rack/security/advisories/GHSA-rx22-g9mx-qrhv\", \"tags\": [\"x_refsource_CONFIRM\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Rack is a modular Ruby web server interface. From version 3.2.0 to before version 3.2.6, Rack::Multipart::Parser unfolds folded multipart part headers incorrectly. When a multipart header contains an obs-fold sequence, Rack preserves the embedded CRLF in parsed parameter values such as filename or name instead of removing the folded line break during unfolding. As a result, applications that later reuse those parsed values in HTTP response headers may be vulnerable to downstream header injection or response splitting. This issue has been patched in version 3.2.6.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-93\", \"description\": \"CWE-93: Improper Neutralization of CRLF Sequences (\u0027CRLF Injection\u0027)\"}]}], \"providerMetadata\": {\"orgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"shortName\": \"GitHub_M\", \"dateUpdated\": \"2026-04-02T17:10:17.091Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2026-26962\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-04-03T18:13:06.632Z\", \"dateReserved\": \"2026-02-16T22:20:28.612Z\", \"assignerOrgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"datePublished\": \"2026-04-02T17:10:17.091Z\", \"assignerShortName\": \"GitHub_M\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
GHSA-RX22-G9MX-QRHV
Vulnerability from github – Published: 2026-04-02 20:31 – Updated: 2026-04-02 20:31Summary
Rack::Multipart::Parser unfolds folded multipart part headers incorrectly. When a multipart header contains an obs-fold sequence, Rack preserves the embedded CRLF in parsed parameter values such as filename or name instead of removing the folded line break during unfolding.
As a result, applications that later reuse those parsed values in HTTP response headers may be vulnerable to downstream header injection or response splitting.
Details
Rack::Multipart::Parser accepts folded multipart header values and unfolds them during parsing. However, the unfolding behavior does not fully remove the embedded line break sequence from the parsed value.
This means a multipart part header such as:
Content-Disposition: form-data; name="file"; filename="test\r\n foo.txt"
can result in a parsed parameter value that still contains CRLF characters.
The issue is not that Rack creates a second multipart header field. Rather, the problem is that CRLF remains embedded in the parsed metadata value after unfolding. If an application later uses that value in a security-sensitive context, such as constructing an HTTP response header, the preserved CRLF may alter downstream header parsing.
Affected values may include multipart parameters such as filename, name, or similar parsed header attributes.
Impact
Applications that accept multipart form uploads may be affected if they later reuse parsed multipart metadata in HTTP headers or other header-sensitive contexts.
In affected deployments, an attacker may be able to supply a multipart parameter value containing folded line breaks and cause downstream header injection, response splitting, cache poisoning, or related response parsing issues.
The practical impact depends on application behavior. If parsed multipart metadata is not reused in HTTP headers, the issue may be limited to incorrect parsing behavior rather than a direct exploit path.
Mitigation
- Update to a patched version of Rack that removes CRLF correctly when unfolding folded multipart header values.
- Avoid copying upload metadata such as
filenamedirectly into HTTP response headers without sanitization. - Sanitize or reject carriage return and line feed characters in multipart-derived values before reusing them in response headers, logs, or downstream protocol contexts.
- Where feasible, normalize uploaded filenames before storing or reflecting them.
{
"affected": [
{
"package": {
"ecosystem": "RubyGems",
"name": "rack"
},
"ranges": [
{
"events": [
{
"introduced": "3.2.0"
},
{
"fixed": "3.2.6"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2026-26962"
],
"database_specific": {
"cwe_ids": [
"CWE-93"
],
"github_reviewed": true,
"github_reviewed_at": "2026-04-02T20:31:01Z",
"nvd_published_at": "2026-04-02T18:16:26Z",
"severity": "MODERATE"
},
"details": "## Summary\n\n`Rack::Multipart::Parser` unfolds folded multipart part headers incorrectly. When a multipart header contains an obs-fold sequence, Rack preserves the embedded CRLF in parsed parameter values such as `filename` or `name` instead of removing the folded line break during unfolding.\n\nAs a result, applications that later reuse those parsed values in HTTP response headers may be vulnerable to downstream header injection or response splitting.\n\n## Details\n\n`Rack::Multipart::Parser` accepts folded multipart header values and unfolds them during parsing. However, the unfolding behavior does not fully remove the embedded line break sequence from the parsed value.\n\nThis means a multipart part header such as:\n\n```http\nContent-Disposition: form-data; name=\"file\"; filename=\"test\\r\\n foo.txt\"\n```\n\ncan result in a parsed parameter value that still contains CRLF characters.\n\nThe issue is not that Rack creates a second multipart header field. Rather, the problem is that CRLF remains embedded in the parsed metadata value after unfolding. If an application later uses that value in a security-sensitive context, such as constructing an HTTP response header, the preserved CRLF may alter downstream header parsing.\n\nAffected values may include multipart parameters such as `filename`, `name`, or similar parsed header attributes.\n\n## Impact\n\nApplications that accept multipart form uploads may be affected if they later reuse parsed multipart metadata in HTTP headers or other header-sensitive contexts.\n\nIn affected deployments, an attacker may be able to supply a multipart parameter value containing folded line breaks and cause downstream header injection, response splitting, cache poisoning, or related response parsing issues.\n\nThe practical impact depends on application behavior. If parsed multipart metadata is not reused in HTTP headers, the issue may be limited to incorrect parsing behavior rather than a direct exploit path.\n\n## Mitigation\n\n* Update to a patched version of Rack that removes CRLF correctly when unfolding folded multipart header values.\n* Avoid copying upload metadata such as `filename` directly into HTTP response headers without sanitization.\n* Sanitize or reject carriage return and line feed characters in multipart-derived values before reusing them in response headers, logs, or downstream protocol contexts.\n* Where feasible, normalize uploaded filenames before storing or reflecting them.",
"id": "GHSA-rx22-g9mx-qrhv",
"modified": "2026-04-02T20:31:02Z",
"published": "2026-04-02T20:31:01Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/rack/rack/security/advisories/GHSA-rx22-g9mx-qrhv"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-26962"
},
{
"type": "PACKAGE",
"url": "https://github.com/rack/rack"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"type": "CVSS_V3"
}
],
"summary": "Rack\u0027s improper unfolding of folded multipart headers preserves CRLF in parsed parameter values"
}
FKIE_CVE-2026-26962
Vulnerability from fkie_nvd - Published: 2026-04-02 18:16 - Updated: 2026-04-21 00:426.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
| URL | Tags | ||
|---|---|---|---|
| security-advisories@github.com | https://github.com/rack/rack/security/advisories/GHSA-rx22-g9mx-qrhv | Vendor Advisory, Mitigation |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:rack:rack:*:*:*:*:*:ruby:*:*",
"matchCriteriaId": "3FB592AD-E826-49BE-AC6D-E5F55FDCC96E",
"versionEndExcluding": "3.2.6",
"versionStartIncluding": "3.2.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rack is a modular Ruby web server interface. From version 3.2.0 to before version 3.2.6, Rack::Multipart::Parser unfolds folded multipart part headers incorrectly. When a multipart header contains an obs-fold sequence, Rack preserves the embedded CRLF in parsed parameter values such as filename or name instead of removing the folded line break during unfolding. As a result, applications that later reuse those parsed values in HTTP response headers may be vulnerable to downstream header injection or response splitting. This issue has been patched in version 3.2.6."
}
],
"id": "CVE-2026-26962",
"lastModified": "2026-04-21T00:42:36.393",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.2,
"impactScore": 2.5,
"source": "security-advisories@github.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 2.5,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2026-04-02T18:16:26.773",
"references": [
{
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory",
"Mitigation"
],
"url": "https://github.com/rack/rack/security/advisories/GHSA-rx22-g9mx-qrhv"
}
],
"sourceIdentifier": "security-advisories@github.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-93"
}
],
"source": "security-advisories@github.com",
"type": "Primary"
}
]
}
SUSE-SU-2026:1745-1
Vulnerability from csaf_suse - Published: 2026-05-07 07:22 - Updated: 2026-05-07 07:22{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for rmt-server",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for rmt-server fixes the following issues:\n\nUpdate to version 2.27.\n\nSecurity issues fixed:\n\n- CVE-2026-26961: rack: greedy multipart boundary parsing can lead to parser differentials and WAF bypass\n (bsc#1261398).\n- CVE-2026-26962: rack: improper unfolding of folded multipart headers can lead to downstream header injection and\n response splitting(bsc#1261471). \n- CVE-2026-34763: rack: unescaped regex interpolation of configured root path can lead to root directory disclosure\n (bsc#1261406).\n- CVE-2026-34785: rack: prefix matching logic can lead to the exposure of unintended files under the static root\n (bsc#1261417).\n- CVE-2026-34786: rack: URL-encoded path mismatch can lead to `header_rules` bypass (bsc#1261426).\n- CVE-2026-34826: rack: missing individual byte range limit checks when parsing HTTP `Range` headers can lead to\n excessive resource consumption and a denial of service (bsc#1261436).\n- CVE-2026-34829: rack: multipart parsing without `Content-Length` header can lead to unbounded chunked file uploads\n and a denial of service (bsc#1261447).\n- CVE-2026-34230: rack: quadratic complexity when processing of wildcard `Accept-Encoding` headers can lead to a denial\n of service (bsc#1261388). \n- CVE-2026-34830: rack: improper sanitization of the `X-Accel-Mapping` request header can lead to the exposure of\n unintended files via `X-Accel-Redirect` (bsc#1261458).\n- CVE-2026-34831: rack: `Content-Length` header and body byte size mismatch when creating error responses can lead to\n incorrect HTTP response framing (bsc#1261466).\n\nOther updates and bugfixes:\n\n- Fix ReDoS in `Addressable`.\n- Fix out-of-bounds read in `rdiscount`.\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2026-1745,SUSE-SLE-Module-Public-Cloud-15-SP7-2026-1745,SUSE-SLE-Module-Server-Applications-15-SP7-2026-1745",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_1745-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:1745-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20261745-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:1745-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2026-May/046296.html"
},
{
"category": "self",
"summary": "SUSE Bug 1261388",
"url": "https://bugzilla.suse.com/1261388"
},
{
"category": "self",
"summary": "SUSE Bug 1261398",
"url": "https://bugzilla.suse.com/1261398"
},
{
"category": "self",
"summary": "SUSE Bug 1261406",
"url": "https://bugzilla.suse.com/1261406"
},
{
"category": "self",
"summary": "SUSE Bug 1261417",
"url": "https://bugzilla.suse.com/1261417"
},
{
"category": "self",
"summary": "SUSE Bug 1261426",
"url": "https://bugzilla.suse.com/1261426"
},
{
"category": "self",
"summary": "SUSE Bug 1261436",
"url": "https://bugzilla.suse.com/1261436"
},
{
"category": "self",
"summary": "SUSE Bug 1261447",
"url": "https://bugzilla.suse.com/1261447"
},
{
"category": "self",
"summary": "SUSE Bug 1261458",
"url": "https://bugzilla.suse.com/1261458"
},
{
"category": "self",
"summary": "SUSE Bug 1261466",
"url": "https://bugzilla.suse.com/1261466"
},
{
"category": "self",
"summary": "SUSE Bug 1261471",
"url": "https://bugzilla.suse.com/1261471"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-26961 page",
"url": "https://www.suse.com/security/cve/CVE-2026-26961/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-26962 page",
"url": "https://www.suse.com/security/cve/CVE-2026-26962/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-34230 page",
"url": "https://www.suse.com/security/cve/CVE-2026-34230/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-34763 page",
"url": "https://www.suse.com/security/cve/CVE-2026-34763/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-34785 page",
"url": "https://www.suse.com/security/cve/CVE-2026-34785/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-34786 page",
"url": "https://www.suse.com/security/cve/CVE-2026-34786/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-34826 page",
"url": "https://www.suse.com/security/cve/CVE-2026-34826/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-34829 page",
"url": "https://www.suse.com/security/cve/CVE-2026-34829/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-34830 page",
"url": "https://www.suse.com/security/cve/CVE-2026-34830/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-34831 page",
"url": "https://www.suse.com/security/cve/CVE-2026-34831/"
}
],
"title": "Security update for rmt-server",
"tracking": {
"current_release_date": "2026-05-07T07:22:43Z",
"generator": {
"date": "2026-05-07T07:22:43Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:1745-1",
"initial_release_date": "2026-05-07T07:22:43Z",
"revision_history": [
{
"date": "2026-05-07T07:22:43Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "rmt-server-2.27-150700.3.20.1.aarch64",
"product": {
"name": "rmt-server-2.27-150700.3.20.1.aarch64",
"product_id": "rmt-server-2.27-150700.3.20.1.aarch64"
}
},
{
"category": "product_version",
"name": "rmt-server-config-2.27-150700.3.20.1.aarch64",
"product": {
"name": "rmt-server-config-2.27-150700.3.20.1.aarch64",
"product_id": "rmt-server-config-2.27-150700.3.20.1.aarch64"
}
},
{
"category": "product_version",
"name": "rmt-server-pubcloud-2.27-150700.3.20.1.aarch64",
"product": {
"name": "rmt-server-pubcloud-2.27-150700.3.20.1.aarch64",
"product_id": "rmt-server-pubcloud-2.27-150700.3.20.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "rmt-server-2.27-150700.3.20.1.ppc64le",
"product": {
"name": "rmt-server-2.27-150700.3.20.1.ppc64le",
"product_id": "rmt-server-2.27-150700.3.20.1.ppc64le"
}
},
{
"category": "product_version",
"name": "rmt-server-config-2.27-150700.3.20.1.ppc64le",
"product": {
"name": "rmt-server-config-2.27-150700.3.20.1.ppc64le",
"product_id": "rmt-server-config-2.27-150700.3.20.1.ppc64le"
}
},
{
"category": "product_version",
"name": "rmt-server-pubcloud-2.27-150700.3.20.1.ppc64le",
"product": {
"name": "rmt-server-pubcloud-2.27-150700.3.20.1.ppc64le",
"product_id": "rmt-server-pubcloud-2.27-150700.3.20.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "rmt-server-2.27-150700.3.20.1.s390x",
"product": {
"name": "rmt-server-2.27-150700.3.20.1.s390x",
"product_id": "rmt-server-2.27-150700.3.20.1.s390x"
}
},
{
"category": "product_version",
"name": "rmt-server-config-2.27-150700.3.20.1.s390x",
"product": {
"name": "rmt-server-config-2.27-150700.3.20.1.s390x",
"product_id": "rmt-server-config-2.27-150700.3.20.1.s390x"
}
},
{
"category": "product_version",
"name": "rmt-server-pubcloud-2.27-150700.3.20.1.s390x",
"product": {
"name": "rmt-server-pubcloud-2.27-150700.3.20.1.s390x",
"product_id": "rmt-server-pubcloud-2.27-150700.3.20.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "rmt-server-2.27-150700.3.20.1.x86_64",
"product": {
"name": "rmt-server-2.27-150700.3.20.1.x86_64",
"product_id": "rmt-server-2.27-150700.3.20.1.x86_64"
}
},
{
"category": "product_version",
"name": "rmt-server-config-2.27-150700.3.20.1.x86_64",
"product": {
"name": "rmt-server-config-2.27-150700.3.20.1.x86_64",
"product_id": "rmt-server-config-2.27-150700.3.20.1.x86_64"
}
},
{
"category": "product_version",
"name": "rmt-server-pubcloud-2.27-150700.3.20.1.x86_64",
"product": {
"name": "rmt-server-pubcloud-2.27-150700.3.20.1.x86_64",
"product_id": "rmt-server-pubcloud-2.27-150700.3.20.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Public Cloud 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Module for Public Cloud 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-public-cloud:15:sp7"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Server Applications 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Module for Server Applications 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-server-applications:15:sp7"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "rmt-server-pubcloud-2.27-150700.3.20.1.aarch64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.aarch64"
},
"product_reference": "rmt-server-pubcloud-2.27-150700.3.20.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rmt-server-pubcloud-2.27-150700.3.20.1.ppc64le as component of SUSE Linux Enterprise Module for Public Cloud 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.ppc64le"
},
"product_reference": "rmt-server-pubcloud-2.27-150700.3.20.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rmt-server-pubcloud-2.27-150700.3.20.1.s390x as component of SUSE Linux Enterprise Module for Public Cloud 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.s390x"
},
"product_reference": "rmt-server-pubcloud-2.27-150700.3.20.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rmt-server-pubcloud-2.27-150700.3.20.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.x86_64"
},
"product_reference": "rmt-server-pubcloud-2.27-150700.3.20.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rmt-server-2.27-150700.3.20.1.aarch64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.aarch64"
},
"product_reference": "rmt-server-2.27-150700.3.20.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rmt-server-2.27-150700.3.20.1.ppc64le as component of SUSE Linux Enterprise Module for Server Applications 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.ppc64le"
},
"product_reference": "rmt-server-2.27-150700.3.20.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rmt-server-2.27-150700.3.20.1.s390x as component of SUSE Linux Enterprise Module for Server Applications 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.s390x"
},
"product_reference": "rmt-server-2.27-150700.3.20.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rmt-server-2.27-150700.3.20.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.x86_64"
},
"product_reference": "rmt-server-2.27-150700.3.20.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rmt-server-config-2.27-150700.3.20.1.aarch64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.aarch64"
},
"product_reference": "rmt-server-config-2.27-150700.3.20.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rmt-server-config-2.27-150700.3.20.1.ppc64le as component of SUSE Linux Enterprise Module for Server Applications 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.ppc64le"
},
"product_reference": "rmt-server-config-2.27-150700.3.20.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rmt-server-config-2.27-150700.3.20.1.s390x as component of SUSE Linux Enterprise Module for Server Applications 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.s390x"
},
"product_reference": "rmt-server-config-2.27-150700.3.20.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rmt-server-config-2.27-150700.3.20.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.x86_64"
},
"product_reference": "rmt-server-config-2.27-150700.3.20.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP7"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-26961",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-26961"
}
],
"notes": [
{
"category": "general",
"text": "Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, and 3.2.6, Rack::Multipart::Parser extracts the boundary parameter from multipart/form-data using a greedy regular expression. When a Content-Type header contains multiple boundary parameters, Rack selects the last one rather than the first. In deployments where an upstream proxy, WAF, or intermediary interprets the first boundary parameter, this mismatch can allow an attacker to smuggle multipart content past upstream inspection and have Rack parse a different body structure than the intermediary validated. This issue has been patched in versions 2.2.23, 3.1.21, and 3.2.6.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-26961",
"url": "https://www.suse.com/security/cve/CVE-2026-26961"
},
{
"category": "external",
"summary": "SUSE Bug 1261391 for CVE-2026-26961",
"url": "https://bugzilla.suse.com/1261391"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-07T07:22:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-26961"
},
{
"cve": "CVE-2026-26962",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-26962"
}
],
"notes": [
{
"category": "general",
"text": "Rack is a modular Ruby web server interface. From version 3.2.0 to before version 3.2.6, Rack::Multipart::Parser unfolds folded multipart part headers incorrectly. When a multipart header contains an obs-fold sequence, Rack preserves the embedded CRLF in parsed parameter values such as filename or name instead of removing the folded line break during unfolding. As a result, applications that later reuse those parsed values in HTTP response headers may be vulnerable to downstream header injection or response splitting. This issue has been patched in version 3.2.6.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-26962",
"url": "https://www.suse.com/security/cve/CVE-2026-26962"
},
{
"category": "external",
"summary": "SUSE Bug 1261470 for CVE-2026-26962",
"url": "https://bugzilla.suse.com/1261470"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-07T07:22:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-26962"
},
{
"cve": "CVE-2026-34230",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-34230"
}
],
"notes": [
{
"category": "general",
"text": "Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, and 3.2.6, Rack::Utils.select_best_encoding processes Accept-Encoding values with quadratic time complexity when the header contains many wildcard (*) entries. Because this method is used by Rack::Deflater to choose a response encoding, an unauthenticated attacker can send a single request with a crafted Accept-Encoding header and cause disproportionate CPU consumption on the compression middleware path. This results in a denial of service condition for applications using Rack::Deflater. This issue has been patched in versions 2.2.23, 3.1.21, and 3.2.6.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-34230",
"url": "https://www.suse.com/security/cve/CVE-2026-34230"
},
{
"category": "external",
"summary": "SUSE Bug 1261384 for CVE-2026-34230",
"url": "https://bugzilla.suse.com/1261384"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-07T07:22:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-34230"
},
{
"cve": "CVE-2026-34763",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-34763"
}
],
"notes": [
{
"category": "general",
"text": "Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, and 3.2.6, Rack::Directory interpolates the configured root path directly into a regular expression when deriving the displayed directory path. If root contains regex metacharacters such as +, *, or ., the prefix stripping can fail and the generated directory listing may expose the full filesystem path in the HTML output. This issue has been patched in versions 2.2.23, 3.1.21, and 3.2.6.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-34763",
"url": "https://www.suse.com/security/cve/CVE-2026-34763"
},
{
"category": "external",
"summary": "SUSE Bug 1261401 for CVE-2026-34763",
"url": "https://bugzilla.suse.com/1261401"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-07T07:22:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-34763"
},
{
"cve": "CVE-2026-34785",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-34785"
}
],
"notes": [
{
"category": "general",
"text": "Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, and 3.2.6, Rack::Static determines whether a request should be served as a static file using a simple string prefix check. When configured with URL prefixes such as \"/css\", it matches any request path that begins with that string, including unrelated paths such as \"/css-config.env\" or \"/css-backup.sql\". As a result, files under the static root whose names merely share the configured prefix may be served unintentionally, leading to information disclosure. This issue has been patched in versions 2.2.23, 3.1.21, and 3.2.6.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-34785",
"url": "https://www.suse.com/security/cve/CVE-2026-34785"
},
{
"category": "external",
"summary": "SUSE Bug 1261415 for CVE-2026-34785",
"url": "https://bugzilla.suse.com/1261415"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-07T07:22:43Z",
"details": "important"
}
],
"title": "CVE-2026-34785"
},
{
"cve": "CVE-2026-34786",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-34786"
}
],
"notes": [
{
"category": "general",
"text": "Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, and 3.2.6, Rack::Static#applicable_rules evaluates several header_rules types against the raw URL-encoded PATH_INFO, while the underlying file-serving path is decoded before the file is served. As a result, a request for a URL-encoded variant of a static path can serve the same file without the headers that header_rules were intended to apply. In deployments that rely on Rack::Static to attach security-relevant response headers to static content, this can allow an attacker to bypass those headers by requesting an encoded form of the path. This issue has been patched in versions 2.2.23, 3.1.21, and 3.2.6.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-34786",
"url": "https://www.suse.com/security/cve/CVE-2026-34786"
},
{
"category": "external",
"summary": "SUSE Bug 1261421 for CVE-2026-34786",
"url": "https://bugzilla.suse.com/1261421"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-07T07:22:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-34786"
},
{
"cve": "CVE-2026-34826",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-34826"
}
],
"notes": [
{
"category": "general",
"text": "Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, and 3.2.6, Rack::Utils.get_byte_ranges parses the HTTP Range header without limiting the number of individual byte ranges. Although the existing fix for CVE-2024-26141 rejects ranges whose total byte coverage exceeds the file size, it does not restrict the count of ranges. An attacker can supply many small overlapping ranges such as 0-0,0-0,0-0,... to trigger disproportionate CPU, memory, I/O, and bandwidth consumption per request. This results in a denial of service condition in Rack file-serving paths that process multipart byte range responses. This issue has been patched in versions 2.2.23, 3.1.21, and 3.2.6.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-34826",
"url": "https://www.suse.com/security/cve/CVE-2026-34826"
},
{
"category": "external",
"summary": "SUSE Bug 1261431 for CVE-2026-34826",
"url": "https://bugzilla.suse.com/1261431"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-07T07:22:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-34826"
},
{
"cve": "CVE-2026-34829",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-34829"
}
],
"notes": [
{
"category": "general",
"text": "Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, and 3.2.6, Rack::Multipart::Parser only wraps the request body in a BoundedIO when CONTENT_LENGTH is present. When a multipart/form-data request is sent without a Content-Length header, such as with HTTP chunked transfer encoding, multipart parsing continues until end-of-stream with no total size limit. For file parts, the uploaded body is written directly to a temporary file on disk rather than being constrained by the buffered in-memory upload limit. An unauthenticated attacker can therefore stream an arbitrarily large multipart file upload and consume unbounded disk space. This results in a denial of service condition for Rack applications that accept multipart form data. This issue has been patched in versions 2.2.23, 3.1.21, and 3.2.6.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-34829",
"url": "https://www.suse.com/security/cve/CVE-2026-34829"
},
{
"category": "external",
"summary": "SUSE Bug 1261442 for CVE-2026-34829",
"url": "https://bugzilla.suse.com/1261442"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-07T07:22:43Z",
"details": "important"
}
],
"title": "CVE-2026-34829"
},
{
"cve": "CVE-2026-34830",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-34830"
}
],
"notes": [
{
"category": "general",
"text": "Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, and 3.2.6, Rack::Sendfile#map_accel_path interpolates the value of the X-Accel-Mapping request header directly into a regular expression when rewriting file paths for X-Accel-Redirect. Because the header value is not escaped, an attacker who can supply X-Accel-Mapping to the backend can inject regex metacharacters and control the generated X-Accel-Redirect response header. In deployments using Rack::Sendfile with x-accel-redirect, this can allow an attacker to cause nginx to serve unintended files from configured internal locations. This issue has been patched in versions 2.2.23, 3.1.21, and 3.2.6.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-34830",
"url": "https://www.suse.com/security/cve/CVE-2026-34830"
},
{
"category": "external",
"summary": "SUSE Bug 1261453 for CVE-2026-34830",
"url": "https://bugzilla.suse.com/1261453"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-07T07:22:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-34830"
},
{
"cve": "CVE-2026-34831",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-34831"
}
],
"notes": [
{
"category": "general",
"text": "Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, and 3.2.6, Rack::Files#fail sets the Content-Length response header using String#size instead of String#bytesize. When the response body contains multibyte UTF-8 characters, the declared Content-Length is smaller than the number of bytes actually sent on the wire. Because Rack::Files reflects the requested path in 404 responses, an attacker can trigger this mismatch by requesting a non-existent path containing percent-encoded UTF-8 characters. This results in incorrect HTTP response framing and may cause response desynchronization in deployments that rely on the incorrect Content-Length value. This issue has been patched in versions 2.2.23, 3.1.21, and 3.2.6.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-34831",
"url": "https://www.suse.com/security/cve/CVE-2026-34831"
},
{
"category": "external",
"summary": "SUSE Bug 1261464 for CVE-2026-34831",
"url": "https://bugzilla.suse.com/1261464"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-07T07:22:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-34831"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.