Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2026-34831 (GCVE-0-2026-34831)
Vulnerability from cvelistv5 – Published: 2026-04-02 16:43 – Updated: 2026-04-03 17:48| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2026-34831",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-04-03T17:43:52.462237Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-04-03T17:48:11.330Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "rack",
"vendor": "rack",
"versions": [
{
"status": "affected",
"version": "\u003c 2.2.23"
},
{
"status": "affected",
"version": "\u003e= 3.0.0.beta1, \u003c 3.1.21"
},
{
"status": "affected",
"version": "\u003e= 3.2.0, \u003c 3.2.6"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, and 3.2.6, Rack::Files#fail sets the Content-Length response header using String#size instead of String#bytesize. When the response body contains multibyte UTF-8 characters, the declared Content-Length is smaller than the number of bytes actually sent on the wire. Because Rack::Files reflects the requested path in 404 responses, an attacker can trigger this mismatch by requesting a non-existent path containing percent-encoded UTF-8 characters. This results in incorrect HTTP response framing and may cause response desynchronization in deployments that rely on the incorrect Content-Length value. This issue has been patched in versions 2.2.23, 3.1.21, and 3.2.6."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-130",
"description": "CWE-130: Improper Handling of Length Parameter Inconsistency",
"lang": "en",
"type": "CWE"
}
]
},
{
"descriptions": [
{
"cweId": "CWE-135",
"description": "CWE-135: Incorrect Calculation of Multi-Byte String Length",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-04-02T16:43:08.762Z",
"orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"shortName": "GitHub_M"
},
"references": [
{
"name": "https://github.com/rack/rack/security/advisories/GHSA-q2ww-5357-x388",
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/rack/rack/security/advisories/GHSA-q2ww-5357-x388"
}
],
"source": {
"advisory": "GHSA-q2ww-5357-x388",
"discovery": "UNKNOWN"
},
"title": "Rack: Content-Length mismatch in Rack::Files error responses"
}
},
"cveMetadata": {
"assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"assignerShortName": "GitHub_M",
"cveId": "CVE-2026-34831",
"datePublished": "2026-04-02T16:43:08.762Z",
"dateReserved": "2026-03-30T20:52:53.284Z",
"dateUpdated": "2026-04-03T17:48:11.330Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2026-34831",
"date": "2026-05-08",
"epss": "0.00041",
"percentile": "0.12533"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2026-34831\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2026-04-02T17:16:26.420\",\"lastModified\":\"2026-04-16T16:44:32.200\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, and 3.2.6, Rack::Files#fail sets the Content-Length response header using String#size instead of String#bytesize. When the response body contains multibyte UTF-8 characters, the declared Content-Length is smaller than the number of bytes actually sent on the wire. Because Rack::Files reflects the requested path in 404 responses, an attacker can trigger this mismatch by requesting a non-existent path containing percent-encoded UTF-8 characters. This results in incorrect HTTP response framing and may cause response desynchronization in deployments that rely on the incorrect Content-Length value. This issue has been patched in versions 2.2.23, 3.1.21, and 3.2.6.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N\",\"baseScore\":4.8,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.2,\"impactScore\":2.5},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":2.5}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-130\"},{\"lang\":\"en\",\"value\":\"CWE-135\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rack:rack:*:*:*:*:*:ruby:*:*\",\"versionEndExcluding\":\"2.2.23\",\"matchCriteriaId\":\"AD5DE7DE-3A8B-4064-A7D5-1E117A101E81\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rack:rack:*:*:*:*:*:ruby:*:*\",\"versionStartIncluding\":\"3.0.0\",\"versionEndExcluding\":\"3.1.21\",\"matchCriteriaId\":\"6948AAA6-873D-46BA-AA22-4C81138128E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rack:rack:*:*:*:*:*:ruby:*:*\",\"versionStartIncluding\":\"3.2.0\",\"versionEndExcluding\":\"3.2.6\",\"matchCriteriaId\":\"3FB592AD-E826-49BE-AC6D-E5F55FDCC96E\"}]}]}],\"references\":[{\"url\":\"https://github.com/rack/rack/security/advisories/GHSA-q2ww-5357-x388\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2026-34831\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2026-04-03T17:43:52.462237Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2026-04-03T17:48:07.125Z\"}}], \"cna\": {\"title\": \"Rack: Content-Length mismatch in Rack::Files error responses\", \"source\": {\"advisory\": \"GHSA-q2ww-5357-x388\", \"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 4.8, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N\", \"integrityImpact\": \"LOW\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"HIGH\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"LOW\"}}], \"affected\": [{\"vendor\": \"rack\", \"product\": \"rack\", \"versions\": [{\"status\": \"affected\", \"version\": \"\u003c 2.2.23\"}, {\"status\": \"affected\", \"version\": \"\u003e= 3.0.0.beta1, \u003c 3.1.21\"}, {\"status\": \"affected\", \"version\": \"\u003e= 3.2.0, \u003c 3.2.6\"}]}], \"references\": [{\"url\": \"https://github.com/rack/rack/security/advisories/GHSA-q2ww-5357-x388\", \"name\": \"https://github.com/rack/rack/security/advisories/GHSA-q2ww-5357-x388\", \"tags\": [\"x_refsource_CONFIRM\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, and 3.2.6, Rack::Files#fail sets the Content-Length response header using String#size instead of String#bytesize. When the response body contains multibyte UTF-8 characters, the declared Content-Length is smaller than the number of bytes actually sent on the wire. Because Rack::Files reflects the requested path in 404 responses, an attacker can trigger this mismatch by requesting a non-existent path containing percent-encoded UTF-8 characters. This results in incorrect HTTP response framing and may cause response desynchronization in deployments that rely on the incorrect Content-Length value. This issue has been patched in versions 2.2.23, 3.1.21, and 3.2.6.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-130\", \"description\": \"CWE-130: Improper Handling of Length Parameter Inconsistency\"}]}, {\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-135\", \"description\": \"CWE-135: Incorrect Calculation of Multi-Byte String Length\"}]}], \"providerMetadata\": {\"orgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"shortName\": \"GitHub_M\", \"dateUpdated\": \"2026-04-02T16:43:08.762Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2026-34831\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-04-03T17:48:11.330Z\", \"dateReserved\": \"2026-03-30T20:52:53.284Z\", \"assignerOrgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"datePublished\": \"2026-04-02T16:43:08.762Z\", \"assignerShortName\": \"GitHub_M\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
GHSA-Q2WW-5357-X388
Vulnerability from github – Published: 2026-04-02 20:36 – Updated: 2026-04-02 20:36Summary
Rack::Files#fail sets the Content-Length response header using String#size instead of String#bytesize. When the response body contains multibyte UTF-8 characters, the declared Content-Length is smaller than the number of bytes actually sent on the wire.
Because Rack::Files reflects the requested path in 404 responses, an attacker can trigger this mismatch by requesting a non-existent path containing percent-encoded UTF-8 characters.
This results in incorrect HTTP response framing and may cause response desynchronization in deployments that rely on the incorrect Content-Length value.
Details
Rack::Files#fail constructs error responses using logic equivalent to:
def fail(status, body, headers = {})
body += "\n"
[
status,
{
"content-type" => "text/plain",
"content-length" => body.size.to_s,
"x-cascade" => "pass"
}.merge!(headers),
[body]
]
end
Here, body.size returns the number of characters, not the number of bytes. For multibyte UTF-8 strings, this produces an incorrect Content-Length value.
Rack::Files includes the decoded request path in 404 responses. A request containing percent-encoded UTF-8 path components therefore causes the response body to contain multibyte characters, while the Content-Length header still reflects character count rather than byte count.
As a result, the server can send more bytes than declared in the response headers.
This violates HTTP message framing requirements, which define Content-Length as the number of octets in the message body.
Impact
Applications using Rack::Files may emit incorrectly framed error responses when handling requests for non-existent paths containing multibyte characters.
In some deployment topologies, particularly with keep-alive connections and intermediaries that rely on Content-Length, this mismatch may lead to response parsing inconsistencies or response desynchronization. The practical exploitability depends on the behavior of downstream proxies, clients, and connection reuse.
Even where no secondary exploitation is possible, the response is malformed and may trigger protocol errors in strict components.
Mitigation
- Update to a patched version of Rack that computes
Content-LengthusingString#bytesize. - Avoid exposing
Rack::Filesdirectly to untrusted traffic until a fix is available, if operationally feasible. - Where possible, place Rack behind a proxy or server that normalizes or rejects malformed backend responses.
- Prefer closing backend connections on error paths if response framing anomalies are a concern.
{
"affected": [
{
"package": {
"ecosystem": "RubyGems",
"name": "rack"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.2.23"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "RubyGems",
"name": "rack"
},
"ranges": [
{
"events": [
{
"introduced": "3.0.0.beta1"
},
{
"fixed": "3.1.21"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "RubyGems",
"name": "rack"
},
"ranges": [
{
"events": [
{
"introduced": "3.2.0"
},
{
"fixed": "3.2.6"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2026-34831"
],
"database_specific": {
"cwe_ids": [
"CWE-130",
"CWE-135"
],
"github_reviewed": true,
"github_reviewed_at": "2026-04-02T20:36:10Z",
"nvd_published_at": "2026-04-02T17:16:26Z",
"severity": "MODERATE"
},
"details": "## Summary\n\n`Rack::Files#fail` sets the `Content-Length` response header using `String#size` instead of `String#bytesize`. When the response body contains multibyte UTF-8 characters, the declared `Content-Length` is smaller than the number of bytes actually sent on the wire.\n\nBecause `Rack::Files` reflects the requested path in 404 responses, an attacker can trigger this mismatch by requesting a non-existent path containing percent-encoded UTF-8 characters.\n\nThis results in incorrect HTTP response framing and may cause response desynchronization in deployments that rely on the incorrect `Content-Length` value.\n\n## Details\n\n`Rack::Files#fail` constructs error responses using logic equivalent to:\n\n```ruby\ndef fail(status, body, headers = {})\n body += \"\\n\"\n [\n status,\n {\n \"content-type\" =\u003e \"text/plain\",\n \"content-length\" =\u003e body.size.to_s,\n \"x-cascade\" =\u003e \"pass\"\n }.merge!(headers),\n [body]\n ]\nend\n```\n\nHere, `body.size` returns the number of characters, not the number of bytes. For multibyte UTF-8 strings, this produces an incorrect `Content-Length` value.\n\n`Rack::Files` includes the decoded request path in 404 responses. A request containing percent-encoded UTF-8 path components therefore causes the response body to contain multibyte characters, while the `Content-Length` header still reflects character count rather than byte count.\n\nAs a result, the server can send more bytes than declared in the response headers.\n\nThis violates HTTP message framing requirements, which define `Content-Length` as the number of octets in the message body.\n\n## Impact\n\nApplications using `Rack::Files` may emit incorrectly framed error responses when handling requests for non-existent paths containing multibyte characters.\n\nIn some deployment topologies, particularly with keep-alive connections and intermediaries that rely on `Content-Length`, this mismatch may lead to response parsing inconsistencies or response desynchronization. The practical exploitability depends on the behavior of downstream proxies, clients, and connection reuse.\n\nEven where no secondary exploitation is possible, the response is malformed and may trigger protocol errors in strict components.\n\n## Mitigation\n\n* Update to a patched version of Rack that computes `Content-Length` using `String#bytesize`.\n* Avoid exposing `Rack::Files` directly to untrusted traffic until a fix is available, if operationally feasible.\n* Where possible, place Rack behind a proxy or server that normalizes or rejects malformed backend responses.\n* Prefer closing backend connections on error paths if response framing anomalies are a concern.",
"id": "GHSA-q2ww-5357-x388",
"modified": "2026-04-02T20:36:10Z",
"published": "2026-04-02T20:36:10Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/rack/rack/security/advisories/GHSA-q2ww-5357-x388"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34831"
},
{
"type": "PACKAGE",
"url": "https://github.com/rack/rack"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"type": "CVSS_V3"
}
],
"summary": "Rack has Content-Length mismatch in Rack::Files error responses"
}
FKIE_CVE-2026-34831
Vulnerability from fkie_nvd - Published: 2026-04-02 17:16 - Updated: 2026-04-16 16:446.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:rack:rack:*:*:*:*:*:ruby:*:*",
"matchCriteriaId": "AD5DE7DE-3A8B-4064-A7D5-1E117A101E81",
"versionEndExcluding": "2.2.23",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rack:rack:*:*:*:*:*:ruby:*:*",
"matchCriteriaId": "6948AAA6-873D-46BA-AA22-4C81138128E1",
"versionEndExcluding": "3.1.21",
"versionStartIncluding": "3.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rack:rack:*:*:*:*:*:ruby:*:*",
"matchCriteriaId": "3FB592AD-E826-49BE-AC6D-E5F55FDCC96E",
"versionEndExcluding": "3.2.6",
"versionStartIncluding": "3.2.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, and 3.2.6, Rack::Files#fail sets the Content-Length response header using String#size instead of String#bytesize. When the response body contains multibyte UTF-8 characters, the declared Content-Length is smaller than the number of bytes actually sent on the wire. Because Rack::Files reflects the requested path in 404 responses, an attacker can trigger this mismatch by requesting a non-existent path containing percent-encoded UTF-8 characters. This results in incorrect HTTP response framing and may cause response desynchronization in deployments that rely on the incorrect Content-Length value. This issue has been patched in versions 2.2.23, 3.1.21, and 3.2.6."
}
],
"id": "CVE-2026-34831",
"lastModified": "2026-04-16T16:44:32.200",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.2,
"impactScore": 2.5,
"source": "security-advisories@github.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 2.5,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2026-04-02T17:16:26.420",
"references": [
{
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
],
"url": "https://github.com/rack/rack/security/advisories/GHSA-q2ww-5357-x388"
}
],
"sourceIdentifier": "security-advisories@github.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-130"
},
{
"lang": "en",
"value": "CWE-135"
}
],
"source": "security-advisories@github.com",
"type": "Primary"
}
]
}
SUSE-SU-2026:1745-1
Vulnerability from csaf_suse - Published: 2026-05-07 07:22 - Updated: 2026-05-07 07:22{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for rmt-server",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for rmt-server fixes the following issues:\n\nUpdate to version 2.27.\n\nSecurity issues fixed:\n\n- CVE-2026-26961: rack: greedy multipart boundary parsing can lead to parser differentials and WAF bypass\n (bsc#1261398).\n- CVE-2026-26962: rack: improper unfolding of folded multipart headers can lead to downstream header injection and\n response splitting(bsc#1261471). \n- CVE-2026-34763: rack: unescaped regex interpolation of configured root path can lead to root directory disclosure\n (bsc#1261406).\n- CVE-2026-34785: rack: prefix matching logic can lead to the exposure of unintended files under the static root\n (bsc#1261417).\n- CVE-2026-34786: rack: URL-encoded path mismatch can lead to `header_rules` bypass (bsc#1261426).\n- CVE-2026-34826: rack: missing individual byte range limit checks when parsing HTTP `Range` headers can lead to\n excessive resource consumption and a denial of service (bsc#1261436).\n- CVE-2026-34829: rack: multipart parsing without `Content-Length` header can lead to unbounded chunked file uploads\n and a denial of service (bsc#1261447).\n- CVE-2026-34230: rack: quadratic complexity when processing of wildcard `Accept-Encoding` headers can lead to a denial\n of service (bsc#1261388). \n- CVE-2026-34830: rack: improper sanitization of the `X-Accel-Mapping` request header can lead to the exposure of\n unintended files via `X-Accel-Redirect` (bsc#1261458).\n- CVE-2026-34831: rack: `Content-Length` header and body byte size mismatch when creating error responses can lead to\n incorrect HTTP response framing (bsc#1261466).\n\nOther updates and bugfixes:\n\n- Fix ReDoS in `Addressable`.\n- Fix out-of-bounds read in `rdiscount`.\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2026-1745,SUSE-SLE-Module-Public-Cloud-15-SP7-2026-1745,SUSE-SLE-Module-Server-Applications-15-SP7-2026-1745",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_1745-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:1745-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20261745-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:1745-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2026-May/046296.html"
},
{
"category": "self",
"summary": "SUSE Bug 1261388",
"url": "https://bugzilla.suse.com/1261388"
},
{
"category": "self",
"summary": "SUSE Bug 1261398",
"url": "https://bugzilla.suse.com/1261398"
},
{
"category": "self",
"summary": "SUSE Bug 1261406",
"url": "https://bugzilla.suse.com/1261406"
},
{
"category": "self",
"summary": "SUSE Bug 1261417",
"url": "https://bugzilla.suse.com/1261417"
},
{
"category": "self",
"summary": "SUSE Bug 1261426",
"url": "https://bugzilla.suse.com/1261426"
},
{
"category": "self",
"summary": "SUSE Bug 1261436",
"url": "https://bugzilla.suse.com/1261436"
},
{
"category": "self",
"summary": "SUSE Bug 1261447",
"url": "https://bugzilla.suse.com/1261447"
},
{
"category": "self",
"summary": "SUSE Bug 1261458",
"url": "https://bugzilla.suse.com/1261458"
},
{
"category": "self",
"summary": "SUSE Bug 1261466",
"url": "https://bugzilla.suse.com/1261466"
},
{
"category": "self",
"summary": "SUSE Bug 1261471",
"url": "https://bugzilla.suse.com/1261471"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-26961 page",
"url": "https://www.suse.com/security/cve/CVE-2026-26961/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-26962 page",
"url": "https://www.suse.com/security/cve/CVE-2026-26962/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-34230 page",
"url": "https://www.suse.com/security/cve/CVE-2026-34230/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-34763 page",
"url": "https://www.suse.com/security/cve/CVE-2026-34763/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-34785 page",
"url": "https://www.suse.com/security/cve/CVE-2026-34785/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-34786 page",
"url": "https://www.suse.com/security/cve/CVE-2026-34786/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-34826 page",
"url": "https://www.suse.com/security/cve/CVE-2026-34826/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-34829 page",
"url": "https://www.suse.com/security/cve/CVE-2026-34829/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-34830 page",
"url": "https://www.suse.com/security/cve/CVE-2026-34830/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-34831 page",
"url": "https://www.suse.com/security/cve/CVE-2026-34831/"
}
],
"title": "Security update for rmt-server",
"tracking": {
"current_release_date": "2026-05-07T07:22:43Z",
"generator": {
"date": "2026-05-07T07:22:43Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:1745-1",
"initial_release_date": "2026-05-07T07:22:43Z",
"revision_history": [
{
"date": "2026-05-07T07:22:43Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "rmt-server-2.27-150700.3.20.1.aarch64",
"product": {
"name": "rmt-server-2.27-150700.3.20.1.aarch64",
"product_id": "rmt-server-2.27-150700.3.20.1.aarch64"
}
},
{
"category": "product_version",
"name": "rmt-server-config-2.27-150700.3.20.1.aarch64",
"product": {
"name": "rmt-server-config-2.27-150700.3.20.1.aarch64",
"product_id": "rmt-server-config-2.27-150700.3.20.1.aarch64"
}
},
{
"category": "product_version",
"name": "rmt-server-pubcloud-2.27-150700.3.20.1.aarch64",
"product": {
"name": "rmt-server-pubcloud-2.27-150700.3.20.1.aarch64",
"product_id": "rmt-server-pubcloud-2.27-150700.3.20.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "rmt-server-2.27-150700.3.20.1.ppc64le",
"product": {
"name": "rmt-server-2.27-150700.3.20.1.ppc64le",
"product_id": "rmt-server-2.27-150700.3.20.1.ppc64le"
}
},
{
"category": "product_version",
"name": "rmt-server-config-2.27-150700.3.20.1.ppc64le",
"product": {
"name": "rmt-server-config-2.27-150700.3.20.1.ppc64le",
"product_id": "rmt-server-config-2.27-150700.3.20.1.ppc64le"
}
},
{
"category": "product_version",
"name": "rmt-server-pubcloud-2.27-150700.3.20.1.ppc64le",
"product": {
"name": "rmt-server-pubcloud-2.27-150700.3.20.1.ppc64le",
"product_id": "rmt-server-pubcloud-2.27-150700.3.20.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "rmt-server-2.27-150700.3.20.1.s390x",
"product": {
"name": "rmt-server-2.27-150700.3.20.1.s390x",
"product_id": "rmt-server-2.27-150700.3.20.1.s390x"
}
},
{
"category": "product_version",
"name": "rmt-server-config-2.27-150700.3.20.1.s390x",
"product": {
"name": "rmt-server-config-2.27-150700.3.20.1.s390x",
"product_id": "rmt-server-config-2.27-150700.3.20.1.s390x"
}
},
{
"category": "product_version",
"name": "rmt-server-pubcloud-2.27-150700.3.20.1.s390x",
"product": {
"name": "rmt-server-pubcloud-2.27-150700.3.20.1.s390x",
"product_id": "rmt-server-pubcloud-2.27-150700.3.20.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "rmt-server-2.27-150700.3.20.1.x86_64",
"product": {
"name": "rmt-server-2.27-150700.3.20.1.x86_64",
"product_id": "rmt-server-2.27-150700.3.20.1.x86_64"
}
},
{
"category": "product_version",
"name": "rmt-server-config-2.27-150700.3.20.1.x86_64",
"product": {
"name": "rmt-server-config-2.27-150700.3.20.1.x86_64",
"product_id": "rmt-server-config-2.27-150700.3.20.1.x86_64"
}
},
{
"category": "product_version",
"name": "rmt-server-pubcloud-2.27-150700.3.20.1.x86_64",
"product": {
"name": "rmt-server-pubcloud-2.27-150700.3.20.1.x86_64",
"product_id": "rmt-server-pubcloud-2.27-150700.3.20.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Public Cloud 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Module for Public Cloud 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-public-cloud:15:sp7"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Server Applications 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Module for Server Applications 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-server-applications:15:sp7"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "rmt-server-pubcloud-2.27-150700.3.20.1.aarch64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.aarch64"
},
"product_reference": "rmt-server-pubcloud-2.27-150700.3.20.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rmt-server-pubcloud-2.27-150700.3.20.1.ppc64le as component of SUSE Linux Enterprise Module for Public Cloud 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.ppc64le"
},
"product_reference": "rmt-server-pubcloud-2.27-150700.3.20.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rmt-server-pubcloud-2.27-150700.3.20.1.s390x as component of SUSE Linux Enterprise Module for Public Cloud 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.s390x"
},
"product_reference": "rmt-server-pubcloud-2.27-150700.3.20.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rmt-server-pubcloud-2.27-150700.3.20.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.x86_64"
},
"product_reference": "rmt-server-pubcloud-2.27-150700.3.20.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rmt-server-2.27-150700.3.20.1.aarch64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.aarch64"
},
"product_reference": "rmt-server-2.27-150700.3.20.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rmt-server-2.27-150700.3.20.1.ppc64le as component of SUSE Linux Enterprise Module for Server Applications 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.ppc64le"
},
"product_reference": "rmt-server-2.27-150700.3.20.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rmt-server-2.27-150700.3.20.1.s390x as component of SUSE Linux Enterprise Module for Server Applications 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.s390x"
},
"product_reference": "rmt-server-2.27-150700.3.20.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rmt-server-2.27-150700.3.20.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.x86_64"
},
"product_reference": "rmt-server-2.27-150700.3.20.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rmt-server-config-2.27-150700.3.20.1.aarch64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.aarch64"
},
"product_reference": "rmt-server-config-2.27-150700.3.20.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rmt-server-config-2.27-150700.3.20.1.ppc64le as component of SUSE Linux Enterprise Module for Server Applications 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.ppc64le"
},
"product_reference": "rmt-server-config-2.27-150700.3.20.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rmt-server-config-2.27-150700.3.20.1.s390x as component of SUSE Linux Enterprise Module for Server Applications 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.s390x"
},
"product_reference": "rmt-server-config-2.27-150700.3.20.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rmt-server-config-2.27-150700.3.20.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.x86_64"
},
"product_reference": "rmt-server-config-2.27-150700.3.20.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP7"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-26961",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-26961"
}
],
"notes": [
{
"category": "general",
"text": "Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, and 3.2.6, Rack::Multipart::Parser extracts the boundary parameter from multipart/form-data using a greedy regular expression. When a Content-Type header contains multiple boundary parameters, Rack selects the last one rather than the first. In deployments where an upstream proxy, WAF, or intermediary interprets the first boundary parameter, this mismatch can allow an attacker to smuggle multipart content past upstream inspection and have Rack parse a different body structure than the intermediary validated. This issue has been patched in versions 2.2.23, 3.1.21, and 3.2.6.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-26961",
"url": "https://www.suse.com/security/cve/CVE-2026-26961"
},
{
"category": "external",
"summary": "SUSE Bug 1261391 for CVE-2026-26961",
"url": "https://bugzilla.suse.com/1261391"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-07T07:22:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-26961"
},
{
"cve": "CVE-2026-26962",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-26962"
}
],
"notes": [
{
"category": "general",
"text": "Rack is a modular Ruby web server interface. From version 3.2.0 to before version 3.2.6, Rack::Multipart::Parser unfolds folded multipart part headers incorrectly. When a multipart header contains an obs-fold sequence, Rack preserves the embedded CRLF in parsed parameter values such as filename or name instead of removing the folded line break during unfolding. As a result, applications that later reuse those parsed values in HTTP response headers may be vulnerable to downstream header injection or response splitting. This issue has been patched in version 3.2.6.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-26962",
"url": "https://www.suse.com/security/cve/CVE-2026-26962"
},
{
"category": "external",
"summary": "SUSE Bug 1261470 for CVE-2026-26962",
"url": "https://bugzilla.suse.com/1261470"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-07T07:22:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-26962"
},
{
"cve": "CVE-2026-34230",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-34230"
}
],
"notes": [
{
"category": "general",
"text": "Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, and 3.2.6, Rack::Utils.select_best_encoding processes Accept-Encoding values with quadratic time complexity when the header contains many wildcard (*) entries. Because this method is used by Rack::Deflater to choose a response encoding, an unauthenticated attacker can send a single request with a crafted Accept-Encoding header and cause disproportionate CPU consumption on the compression middleware path. This results in a denial of service condition for applications using Rack::Deflater. This issue has been patched in versions 2.2.23, 3.1.21, and 3.2.6.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-34230",
"url": "https://www.suse.com/security/cve/CVE-2026-34230"
},
{
"category": "external",
"summary": "SUSE Bug 1261384 for CVE-2026-34230",
"url": "https://bugzilla.suse.com/1261384"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-07T07:22:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-34230"
},
{
"cve": "CVE-2026-34763",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-34763"
}
],
"notes": [
{
"category": "general",
"text": "Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, and 3.2.6, Rack::Directory interpolates the configured root path directly into a regular expression when deriving the displayed directory path. If root contains regex metacharacters such as +, *, or ., the prefix stripping can fail and the generated directory listing may expose the full filesystem path in the HTML output. This issue has been patched in versions 2.2.23, 3.1.21, and 3.2.6.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-34763",
"url": "https://www.suse.com/security/cve/CVE-2026-34763"
},
{
"category": "external",
"summary": "SUSE Bug 1261401 for CVE-2026-34763",
"url": "https://bugzilla.suse.com/1261401"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-07T07:22:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-34763"
},
{
"cve": "CVE-2026-34785",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-34785"
}
],
"notes": [
{
"category": "general",
"text": "Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, and 3.2.6, Rack::Static determines whether a request should be served as a static file using a simple string prefix check. When configured with URL prefixes such as \"/css\", it matches any request path that begins with that string, including unrelated paths such as \"/css-config.env\" or \"/css-backup.sql\". As a result, files under the static root whose names merely share the configured prefix may be served unintentionally, leading to information disclosure. This issue has been patched in versions 2.2.23, 3.1.21, and 3.2.6.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-34785",
"url": "https://www.suse.com/security/cve/CVE-2026-34785"
},
{
"category": "external",
"summary": "SUSE Bug 1261415 for CVE-2026-34785",
"url": "https://bugzilla.suse.com/1261415"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-07T07:22:43Z",
"details": "important"
}
],
"title": "CVE-2026-34785"
},
{
"cve": "CVE-2026-34786",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-34786"
}
],
"notes": [
{
"category": "general",
"text": "Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, and 3.2.6, Rack::Static#applicable_rules evaluates several header_rules types against the raw URL-encoded PATH_INFO, while the underlying file-serving path is decoded before the file is served. As a result, a request for a URL-encoded variant of a static path can serve the same file without the headers that header_rules were intended to apply. In deployments that rely on Rack::Static to attach security-relevant response headers to static content, this can allow an attacker to bypass those headers by requesting an encoded form of the path. This issue has been patched in versions 2.2.23, 3.1.21, and 3.2.6.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-34786",
"url": "https://www.suse.com/security/cve/CVE-2026-34786"
},
{
"category": "external",
"summary": "SUSE Bug 1261421 for CVE-2026-34786",
"url": "https://bugzilla.suse.com/1261421"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-07T07:22:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-34786"
},
{
"cve": "CVE-2026-34826",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-34826"
}
],
"notes": [
{
"category": "general",
"text": "Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, and 3.2.6, Rack::Utils.get_byte_ranges parses the HTTP Range header without limiting the number of individual byte ranges. Although the existing fix for CVE-2024-26141 rejects ranges whose total byte coverage exceeds the file size, it does not restrict the count of ranges. An attacker can supply many small overlapping ranges such as 0-0,0-0,0-0,... to trigger disproportionate CPU, memory, I/O, and bandwidth consumption per request. This results in a denial of service condition in Rack file-serving paths that process multipart byte range responses. This issue has been patched in versions 2.2.23, 3.1.21, and 3.2.6.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-34826",
"url": "https://www.suse.com/security/cve/CVE-2026-34826"
},
{
"category": "external",
"summary": "SUSE Bug 1261431 for CVE-2026-34826",
"url": "https://bugzilla.suse.com/1261431"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-07T07:22:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-34826"
},
{
"cve": "CVE-2026-34829",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-34829"
}
],
"notes": [
{
"category": "general",
"text": "Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, and 3.2.6, Rack::Multipart::Parser only wraps the request body in a BoundedIO when CONTENT_LENGTH is present. When a multipart/form-data request is sent without a Content-Length header, such as with HTTP chunked transfer encoding, multipart parsing continues until end-of-stream with no total size limit. For file parts, the uploaded body is written directly to a temporary file on disk rather than being constrained by the buffered in-memory upload limit. An unauthenticated attacker can therefore stream an arbitrarily large multipart file upload and consume unbounded disk space. This results in a denial of service condition for Rack applications that accept multipart form data. This issue has been patched in versions 2.2.23, 3.1.21, and 3.2.6.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-34829",
"url": "https://www.suse.com/security/cve/CVE-2026-34829"
},
{
"category": "external",
"summary": "SUSE Bug 1261442 for CVE-2026-34829",
"url": "https://bugzilla.suse.com/1261442"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-07T07:22:43Z",
"details": "important"
}
],
"title": "CVE-2026-34829"
},
{
"cve": "CVE-2026-34830",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-34830"
}
],
"notes": [
{
"category": "general",
"text": "Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, and 3.2.6, Rack::Sendfile#map_accel_path interpolates the value of the X-Accel-Mapping request header directly into a regular expression when rewriting file paths for X-Accel-Redirect. Because the header value is not escaped, an attacker who can supply X-Accel-Mapping to the backend can inject regex metacharacters and control the generated X-Accel-Redirect response header. In deployments using Rack::Sendfile with x-accel-redirect, this can allow an attacker to cause nginx to serve unintended files from configured internal locations. This issue has been patched in versions 2.2.23, 3.1.21, and 3.2.6.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-34830",
"url": "https://www.suse.com/security/cve/CVE-2026-34830"
},
{
"category": "external",
"summary": "SUSE Bug 1261453 for CVE-2026-34830",
"url": "https://bugzilla.suse.com/1261453"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-07T07:22:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-34830"
},
{
"cve": "CVE-2026-34831",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-34831"
}
],
"notes": [
{
"category": "general",
"text": "Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, and 3.2.6, Rack::Files#fail sets the Content-Length response header using String#size instead of String#bytesize. When the response body contains multibyte UTF-8 characters, the declared Content-Length is smaller than the number of bytes actually sent on the wire. Because Rack::Files reflects the requested path in 404 responses, an attacker can trigger this mismatch by requesting a non-existent path containing percent-encoded UTF-8 characters. This results in incorrect HTTP response framing and may cause response desynchronization in deployments that rely on the incorrect Content-Length value. This issue has been patched in versions 2.2.23, 3.1.21, and 3.2.6.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-34831",
"url": "https://www.suse.com/security/cve/CVE-2026-34831"
},
{
"category": "external",
"summary": "SUSE Bug 1261464 for CVE-2026-34831",
"url": "https://bugzilla.suse.com/1261464"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-07T07:22:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-34831"
}
]
}
OPENSUSE-SU-2026:10508-1
Vulnerability from csaf_opensuse - Published: 2026-04-08 00:00 - Updated: 2026-04-08 00:00| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "ruby4.0-rubygem-rack-2.2-2.2.23-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the ruby4.0-rubygem-rack-2.2-2.2.23-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2026-10508",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2026_10508-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-26961 page",
"url": "https://www.suse.com/security/cve/CVE-2026-26961/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-34230 page",
"url": "https://www.suse.com/security/cve/CVE-2026-34230/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-34763 page",
"url": "https://www.suse.com/security/cve/CVE-2026-34763/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-34785 page",
"url": "https://www.suse.com/security/cve/CVE-2026-34785/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-34786 page",
"url": "https://www.suse.com/security/cve/CVE-2026-34786/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-34826 page",
"url": "https://www.suse.com/security/cve/CVE-2026-34826/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-34829 page",
"url": "https://www.suse.com/security/cve/CVE-2026-34829/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-34830 page",
"url": "https://www.suse.com/security/cve/CVE-2026-34830/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-34831 page",
"url": "https://www.suse.com/security/cve/CVE-2026-34831/"
}
],
"title": "ruby4.0-rubygem-rack-2.2-2.2.23-1.1 on GA media",
"tracking": {
"current_release_date": "2026-04-08T00:00:00Z",
"generator": {
"date": "2026-04-08T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2026:10508-1",
"initial_release_date": "2026-04-08T00:00:00Z",
"revision_history": [
{
"date": "2026-04-08T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "ruby4.0-rubygem-rack-2.2-2.2.23-1.1.aarch64",
"product": {
"name": "ruby4.0-rubygem-rack-2.2-2.2.23-1.1.aarch64",
"product_id": "ruby4.0-rubygem-rack-2.2-2.2.23-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby4.0-rubygem-rack-2.2-2.2.23-1.1.ppc64le",
"product": {
"name": "ruby4.0-rubygem-rack-2.2-2.2.23-1.1.ppc64le",
"product_id": "ruby4.0-rubygem-rack-2.2-2.2.23-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby4.0-rubygem-rack-2.2-2.2.23-1.1.s390x",
"product": {
"name": "ruby4.0-rubygem-rack-2.2-2.2.23-1.1.s390x",
"product_id": "ruby4.0-rubygem-rack-2.2-2.2.23-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby4.0-rubygem-rack-2.2-2.2.23-1.1.x86_64",
"product": {
"name": "ruby4.0-rubygem-rack-2.2-2.2.23-1.1.x86_64",
"product_id": "ruby4.0-rubygem-rack-2.2-2.2.23-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby4.0-rubygem-rack-2.2-2.2.23-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.aarch64"
},
"product_reference": "ruby4.0-rubygem-rack-2.2-2.2.23-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby4.0-rubygem-rack-2.2-2.2.23-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.ppc64le"
},
"product_reference": "ruby4.0-rubygem-rack-2.2-2.2.23-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby4.0-rubygem-rack-2.2-2.2.23-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.s390x"
},
"product_reference": "ruby4.0-rubygem-rack-2.2-2.2.23-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby4.0-rubygem-rack-2.2-2.2.23-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.x86_64"
},
"product_reference": "ruby4.0-rubygem-rack-2.2-2.2.23-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-26961",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-26961"
}
],
"notes": [
{
"category": "general",
"text": "Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, and 3.2.6, Rack::Multipart::Parser extracts the boundary parameter from multipart/form-data using a greedy regular expression. When a Content-Type header contains multiple boundary parameters, Rack selects the last one rather than the first. In deployments where an upstream proxy, WAF, or intermediary interprets the first boundary parameter, this mismatch can allow an attacker to smuggle multipart content past upstream inspection and have Rack parse a different body structure than the intermediary validated. This issue has been patched in versions 2.2.23, 3.1.21, and 3.2.6.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.aarch64",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.ppc64le",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.s390x",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-26961",
"url": "https://www.suse.com/security/cve/CVE-2026-26961"
},
{
"category": "external",
"summary": "SUSE Bug 1261391 for CVE-2026-26961",
"url": "https://bugzilla.suse.com/1261391"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.aarch64",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.ppc64le",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.s390x",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.aarch64",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.ppc64le",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.s390x",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-08T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-26961"
},
{
"cve": "CVE-2026-34230",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-34230"
}
],
"notes": [
{
"category": "general",
"text": "Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, and 3.2.6, Rack::Utils.select_best_encoding processes Accept-Encoding values with quadratic time complexity when the header contains many wildcard (*) entries. Because this method is used by Rack::Deflater to choose a response encoding, an unauthenticated attacker can send a single request with a crafted Accept-Encoding header and cause disproportionate CPU consumption on the compression middleware path. This results in a denial of service condition for applications using Rack::Deflater. This issue has been patched in versions 2.2.23, 3.1.21, and 3.2.6.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.aarch64",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.ppc64le",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.s390x",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-34230",
"url": "https://www.suse.com/security/cve/CVE-2026-34230"
},
{
"category": "external",
"summary": "SUSE Bug 1261384 for CVE-2026-34230",
"url": "https://bugzilla.suse.com/1261384"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.aarch64",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.ppc64le",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.s390x",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.aarch64",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.ppc64le",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.s390x",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-08T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-34230"
},
{
"cve": "CVE-2026-34763",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-34763"
}
],
"notes": [
{
"category": "general",
"text": "Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, and 3.2.6, Rack::Directory interpolates the configured root path directly into a regular expression when deriving the displayed directory path. If root contains regex metacharacters such as +, *, or ., the prefix stripping can fail and the generated directory listing may expose the full filesystem path in the HTML output. This issue has been patched in versions 2.2.23, 3.1.21, and 3.2.6.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.aarch64",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.ppc64le",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.s390x",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-34763",
"url": "https://www.suse.com/security/cve/CVE-2026-34763"
},
{
"category": "external",
"summary": "SUSE Bug 1261401 for CVE-2026-34763",
"url": "https://bugzilla.suse.com/1261401"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.aarch64",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.ppc64le",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.s390x",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.aarch64",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.ppc64le",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.s390x",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-08T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-34763"
},
{
"cve": "CVE-2026-34785",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-34785"
}
],
"notes": [
{
"category": "general",
"text": "Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, and 3.2.6, Rack::Static determines whether a request should be served as a static file using a simple string prefix check. When configured with URL prefixes such as \"/css\", it matches any request path that begins with that string, including unrelated paths such as \"/css-config.env\" or \"/css-backup.sql\". As a result, files under the static root whose names merely share the configured prefix may be served unintentionally, leading to information disclosure. This issue has been patched in versions 2.2.23, 3.1.21, and 3.2.6.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.aarch64",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.ppc64le",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.s390x",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-34785",
"url": "https://www.suse.com/security/cve/CVE-2026-34785"
},
{
"category": "external",
"summary": "SUSE Bug 1261415 for CVE-2026-34785",
"url": "https://bugzilla.suse.com/1261415"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.aarch64",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.ppc64le",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.s390x",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.aarch64",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.ppc64le",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.s390x",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-08T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2026-34785"
},
{
"cve": "CVE-2026-34786",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-34786"
}
],
"notes": [
{
"category": "general",
"text": "Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, and 3.2.6, Rack::Static#applicable_rules evaluates several header_rules types against the raw URL-encoded PATH_INFO, while the underlying file-serving path is decoded before the file is served. As a result, a request for a URL-encoded variant of a static path can serve the same file without the headers that header_rules were intended to apply. In deployments that rely on Rack::Static to attach security-relevant response headers to static content, this can allow an attacker to bypass those headers by requesting an encoded form of the path. This issue has been patched in versions 2.2.23, 3.1.21, and 3.2.6.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.aarch64",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.ppc64le",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.s390x",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-34786",
"url": "https://www.suse.com/security/cve/CVE-2026-34786"
},
{
"category": "external",
"summary": "SUSE Bug 1261421 for CVE-2026-34786",
"url": "https://bugzilla.suse.com/1261421"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.aarch64",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.ppc64le",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.s390x",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.aarch64",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.ppc64le",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.s390x",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-08T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-34786"
},
{
"cve": "CVE-2026-34826",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-34826"
}
],
"notes": [
{
"category": "general",
"text": "Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, and 3.2.6, Rack::Utils.get_byte_ranges parses the HTTP Range header without limiting the number of individual byte ranges. Although the existing fix for CVE-2024-26141 rejects ranges whose total byte coverage exceeds the file size, it does not restrict the count of ranges. An attacker can supply many small overlapping ranges such as 0-0,0-0,0-0,... to trigger disproportionate CPU, memory, I/O, and bandwidth consumption per request. This results in a denial of service condition in Rack file-serving paths that process multipart byte range responses. This issue has been patched in versions 2.2.23, 3.1.21, and 3.2.6.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.aarch64",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.ppc64le",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.s390x",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-34826",
"url": "https://www.suse.com/security/cve/CVE-2026-34826"
},
{
"category": "external",
"summary": "SUSE Bug 1261431 for CVE-2026-34826",
"url": "https://bugzilla.suse.com/1261431"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.aarch64",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.ppc64le",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.s390x",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.aarch64",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.ppc64le",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.s390x",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-08T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-34826"
},
{
"cve": "CVE-2026-34829",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-34829"
}
],
"notes": [
{
"category": "general",
"text": "Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, and 3.2.6, Rack::Multipart::Parser only wraps the request body in a BoundedIO when CONTENT_LENGTH is present. When a multipart/form-data request is sent without a Content-Length header, such as with HTTP chunked transfer encoding, multipart parsing continues until end-of-stream with no total size limit. For file parts, the uploaded body is written directly to a temporary file on disk rather than being constrained by the buffered in-memory upload limit. An unauthenticated attacker can therefore stream an arbitrarily large multipart file upload and consume unbounded disk space. This results in a denial of service condition for Rack applications that accept multipart form data. This issue has been patched in versions 2.2.23, 3.1.21, and 3.2.6.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.aarch64",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.ppc64le",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.s390x",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-34829",
"url": "https://www.suse.com/security/cve/CVE-2026-34829"
},
{
"category": "external",
"summary": "SUSE Bug 1261442 for CVE-2026-34829",
"url": "https://bugzilla.suse.com/1261442"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.aarch64",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.ppc64le",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.s390x",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.aarch64",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.ppc64le",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.s390x",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-08T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2026-34829"
},
{
"cve": "CVE-2026-34830",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-34830"
}
],
"notes": [
{
"category": "general",
"text": "Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, and 3.2.6, Rack::Sendfile#map_accel_path interpolates the value of the X-Accel-Mapping request header directly into a regular expression when rewriting file paths for X-Accel-Redirect. Because the header value is not escaped, an attacker who can supply X-Accel-Mapping to the backend can inject regex metacharacters and control the generated X-Accel-Redirect response header. In deployments using Rack::Sendfile with x-accel-redirect, this can allow an attacker to cause nginx to serve unintended files from configured internal locations. This issue has been patched in versions 2.2.23, 3.1.21, and 3.2.6.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.aarch64",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.ppc64le",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.s390x",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-34830",
"url": "https://www.suse.com/security/cve/CVE-2026-34830"
},
{
"category": "external",
"summary": "SUSE Bug 1261453 for CVE-2026-34830",
"url": "https://bugzilla.suse.com/1261453"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.aarch64",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.ppc64le",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.s390x",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.aarch64",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.ppc64le",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.s390x",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-08T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-34830"
},
{
"cve": "CVE-2026-34831",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-34831"
}
],
"notes": [
{
"category": "general",
"text": "Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, and 3.2.6, Rack::Files#fail sets the Content-Length response header using String#size instead of String#bytesize. When the response body contains multibyte UTF-8 characters, the declared Content-Length is smaller than the number of bytes actually sent on the wire. Because Rack::Files reflects the requested path in 404 responses, an attacker can trigger this mismatch by requesting a non-existent path containing percent-encoded UTF-8 characters. This results in incorrect HTTP response framing and may cause response desynchronization in deployments that rely on the incorrect Content-Length value. This issue has been patched in versions 2.2.23, 3.1.21, and 3.2.6.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.aarch64",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.ppc64le",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.s390x",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-34831",
"url": "https://www.suse.com/security/cve/CVE-2026-34831"
},
{
"category": "external",
"summary": "SUSE Bug 1261464 for CVE-2026-34831",
"url": "https://bugzilla.suse.com/1261464"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.aarch64",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.ppc64le",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.s390x",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.aarch64",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.ppc64le",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.s390x",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-08T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-34831"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.