Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2026-34230 (GCVE-0-2026-34230)
Vulnerability from cvelistv5 – Published: 2026-04-02 16:41 – Updated: 2026-04-03 18:19| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2026-34230",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-04-02T18:56:03.220311Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-04-03T18:19:00.388Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "rack",
"vendor": "rack",
"versions": [
{
"status": "affected",
"version": "\u003c 2.2.23"
},
{
"status": "affected",
"version": "\u003e= 3.0.0.beta1, \u003c 3.1.21"
},
{
"status": "affected",
"version": "\u003e= 3.2.0, \u003c 3.2.6"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, and 3.2.6, Rack::Utils.select_best_encoding processes Accept-Encoding values with quadratic time complexity when the header contains many wildcard (*) entries. Because this method is used by Rack::Deflater to choose a response encoding, an unauthenticated attacker can send a single request with a crafted Accept-Encoding header and cause disproportionate CPU consumption on the compression middleware path. This results in a denial of service condition for applications using Rack::Deflater. This issue has been patched in versions 2.2.23, 3.1.21, and 3.2.6."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-400",
"description": "CWE-400: Uncontrolled Resource Consumption",
"lang": "en",
"type": "CWE"
}
]
},
{
"descriptions": [
{
"cweId": "CWE-407",
"description": "CWE-407: Inefficient Algorithmic Complexity",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-04-02T16:41:21.095Z",
"orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"shortName": "GitHub_M"
},
"references": [
{
"name": "https://github.com/rack/rack/security/advisories/GHSA-v569-hp3g-36wr",
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/rack/rack/security/advisories/GHSA-v569-hp3g-36wr"
}
],
"source": {
"advisory": "GHSA-v569-hp3g-36wr",
"discovery": "UNKNOWN"
},
"title": "Rack: Quadratic complexity in Rack::Utils.select_best_encoding via wildcard Accept-Encoding header"
}
},
"cveMetadata": {
"assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"assignerShortName": "GitHub_M",
"cveId": "CVE-2026-34230",
"datePublished": "2026-04-02T16:41:21.095Z",
"dateReserved": "2026-03-26T16:22:29.034Z",
"dateUpdated": "2026-04-03T18:19:00.388Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2026-34230",
"date": "2026-05-09",
"epss": "0.00022",
"percentile": "0.06326"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2026-34230\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2026-04-02T17:16:23.570\",\"lastModified\":\"2026-04-16T17:27:43.037\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, and 3.2.6, Rack::Utils.select_best_encoding processes Accept-Encoding values with quadratic time complexity when the header contains many wildcard (*) entries. Because this method is used by Rack::Deflater to choose a response encoding, an unauthenticated attacker can send a single request with a crafted Accept-Encoding header and cause disproportionate CPU consumption on the compression middleware path. This results in a denial of service condition for applications using Rack::Deflater. This issue has been patched in versions 2.2.23, 3.1.21, and 3.2.6.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":3.9,\"impactScore\":1.4},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-400\"},{\"lang\":\"en\",\"value\":\"CWE-407\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rack:rack:*:*:*:*:*:ruby:*:*\",\"versionEndExcluding\":\"2.2.23\",\"matchCriteriaId\":\"AD5DE7DE-3A8B-4064-A7D5-1E117A101E81\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rack:rack:*:*:*:*:*:ruby:*:*\",\"versionStartIncluding\":\"3.0.0\",\"versionEndExcluding\":\"3.1.21\",\"matchCriteriaId\":\"6948AAA6-873D-46BA-AA22-4C81138128E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rack:rack:*:*:*:*:*:ruby:*:*\",\"versionStartIncluding\":\"3.2.0\",\"versionEndExcluding\":\"3.2.6\",\"matchCriteriaId\":\"3FB592AD-E826-49BE-AC6D-E5F55FDCC96E\"}]}]}],\"references\":[{\"url\":\"https://github.com/rack/rack/security/advisories/GHSA-v569-hp3g-36wr\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2026-34230\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2026-04-02T18:56:03.220311Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2026-04-02T18:56:48.670Z\"}}], \"cna\": {\"title\": \"Rack: Quadratic complexity in Rack::Utils.select_best_encoding via wildcard Accept-Encoding header\", \"source\": {\"advisory\": \"GHSA-v569-hp3g-36wr\", \"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 5.3, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"LOW\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}}], \"affected\": [{\"vendor\": \"rack\", \"product\": \"rack\", \"versions\": [{\"status\": \"affected\", \"version\": \"\u003c 2.2.23\"}, {\"status\": \"affected\", \"version\": \"\u003e= 3.0.0.beta1, \u003c 3.1.21\"}, {\"status\": \"affected\", \"version\": \"\u003e= 3.2.0, \u003c 3.2.6\"}]}], \"references\": [{\"url\": \"https://github.com/rack/rack/security/advisories/GHSA-v569-hp3g-36wr\", \"name\": \"https://github.com/rack/rack/security/advisories/GHSA-v569-hp3g-36wr\", \"tags\": [\"x_refsource_CONFIRM\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, and 3.2.6, Rack::Utils.select_best_encoding processes Accept-Encoding values with quadratic time complexity when the header contains many wildcard (*) entries. Because this method is used by Rack::Deflater to choose a response encoding, an unauthenticated attacker can send a single request with a crafted Accept-Encoding header and cause disproportionate CPU consumption on the compression middleware path. This results in a denial of service condition for applications using Rack::Deflater. This issue has been patched in versions 2.2.23, 3.1.21, and 3.2.6.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-400\", \"description\": \"CWE-400: Uncontrolled Resource Consumption\"}]}, {\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-407\", \"description\": \"CWE-407: Inefficient Algorithmic Complexity\"}]}], \"providerMetadata\": {\"orgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"shortName\": \"GitHub_M\", \"dateUpdated\": \"2026-04-02T16:41:21.095Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2026-34230\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-04-03T18:19:00.388Z\", \"dateReserved\": \"2026-03-26T16:22:29.034Z\", \"assignerOrgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"datePublished\": \"2026-04-02T16:41:21.095Z\", \"assignerShortName\": \"GitHub_M\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
GHSA-V569-HP3G-36WR
Vulnerability from github – Published: 2026-04-02 20:32 – Updated: 2026-04-24 20:34Summary
Rack::Utils.select_best_encoding processes Accept-Encoding values with quadratic time complexity when the header contains many wildcard (*) entries. Because this method is used by Rack::Deflater to choose a response encoding, an unauthenticated attacker can send a single request with a crafted Accept-Encoding header and cause disproportionate CPU consumption on the compression middleware path.
This results in a denial of service condition for applications using Rack::Deflater.
Details
Rack::Utils.select_best_encoding expands parsed Accept-Encoding values into a list of candidate encodings. When an entry is *, the method computes the set of concrete encodings by subtracting the encodings already present in the request:
if m == "*"
(available_encodings - accept_encoding.map(&:first)).each do |m2|
expanded_accept_encoding << [m2, q, preference]
end
else
expanded_accept_encoding << [m, q, preference]
end
Because accept_encoding.map(&:first) is evaluated inside the loop, it is recomputed for each wildcard entry. If the request contains N wildcard entries, this produces repeated scans over the full parsed header and causes quadratic behavior.
After expansion, the method also performs additional work over expanded_accept_encoding, including per-entry deletion, which further increases the cost for large inputs.
Rack::Deflater invokes this method for each request when the middleware is enabled:
Utils.select_best_encoding(ENCODINGS, Utils.parse_encodings(accept_encoding))
As a result, a client can trigger this expensive code path simply by sending a large Accept-Encoding header containing many repeated wildcard values.
For example, a request with an approximately 8 KB Accept-Encoding header containing about 1,000 *;q=0.5 entries can cause roughly 170 ms of CPU time in a single request on the Rack::Deflater path, compared to a negligible baseline for a normal header.
This issue is distinct from CVE-2024-26146. That issue concerned regular expression denial of service during Accept header parsing, whereas this issue arises later during encoding selection after the header has already been parsed.
Impact
Any Rack application using Rack::Deflater may be affected.
An unauthenticated attacker can send requests with crafted Accept-Encoding headers to trigger excessive CPU usage in the encoding selection logic. Repeated requests can consume worker time disproportionately and reduce application availability.
The attack does not require invalid HTTP syntax or large payload bodies. A single header-sized request is sufficient to reach the vulnerable code path.
Mitigation
- Update to a patched version of Rack in which encoding selection does not repeatedly rescan the parsed header for wildcard entries.
- Avoid enabling
Rack::Deflateron untrusted traffic. - Apply request filtering or header size / format restrictions at the reverse proxy or application boundary to limit abusive
Accept-Encodingvalues.
{
"affected": [
{
"package": {
"ecosystem": "RubyGems",
"name": "rack"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.2.23"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "RubyGems",
"name": "rack"
},
"ranges": [
{
"events": [
{
"introduced": "3.0.0.beta1"
},
{
"fixed": "3.1.21"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "RubyGems",
"name": "rack"
},
"ranges": [
{
"events": [
{
"introduced": "3.2.0"
},
{
"fixed": "3.2.6"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2026-34230"
],
"database_specific": {
"cwe_ids": [
"CWE-400",
"CWE-407"
],
"github_reviewed": true,
"github_reviewed_at": "2026-04-02T20:32:19Z",
"nvd_published_at": "2026-04-02T17:16:23Z",
"severity": "HIGH"
},
"details": "## Summary\n\n`Rack::Utils.select_best_encoding` processes `Accept-Encoding` values with quadratic time complexity when the header contains many wildcard (`*`) entries. Because this method is used by `Rack::Deflater` to choose a response encoding, an unauthenticated attacker can send a single request with a crafted `Accept-Encoding` header and cause disproportionate CPU consumption on the compression middleware path.\n\nThis results in a denial of service condition for applications using `Rack::Deflater`.\n\n## Details\n\n`Rack::Utils.select_best_encoding` expands parsed `Accept-Encoding` values into a list of candidate encodings. When an entry is `*`, the method computes the set of concrete encodings by subtracting the encodings already present in the request:\n\n```ruby\nif m == \"*\"\n (available_encodings - accept_encoding.map(\u0026:first)).each do |m2|\n expanded_accept_encoding \u003c\u003c [m2, q, preference]\n end\nelse\n expanded_accept_encoding \u003c\u003c [m, q, preference]\nend\n```\n\nBecause `accept_encoding.map(\u0026:first)` is evaluated inside the loop, it is recomputed for each wildcard entry. If the request contains `N` wildcard entries, this produces repeated scans over the full parsed header and causes quadratic behavior.\n\nAfter expansion, the method also performs additional work over `expanded_accept_encoding`, including per-entry deletion, which further increases the cost for large inputs.\n\n`Rack::Deflater` invokes this method for each request when the middleware is enabled:\n\n```ruby\nUtils.select_best_encoding(ENCODINGS, Utils.parse_encodings(accept_encoding))\n```\n\nAs a result, a client can trigger this expensive code path simply by sending a large `Accept-Encoding` header containing many repeated wildcard values.\n\nFor example, a request with an approximately 8 KB `Accept-Encoding` header containing about 1,000 `*;q=0.5` entries can cause roughly 170 ms of CPU time in a single request on the `Rack::Deflater` path, compared to a negligible baseline for a normal header.\n\nThis issue is distinct from CVE-2024-26146. That issue concerned regular expression denial of service during `Accept` header parsing, whereas this issue arises later during encoding selection after the header has already been parsed.\n\n## Impact\n\nAny Rack application using `Rack::Deflater` may be affected.\n\nAn unauthenticated attacker can send requests with crafted `Accept-Encoding` headers to trigger excessive CPU usage in the encoding selection logic. Repeated requests can consume worker time disproportionately and reduce application availability.\n\nThe attack does not require invalid HTTP syntax or large payload bodies. A single header-sized request is sufficient to reach the vulnerable code path.\n\n## Mitigation\n\n* Update to a patched version of Rack in which encoding selection does not repeatedly rescan the parsed header for wildcard entries.\n* Avoid enabling `Rack::Deflater` on untrusted traffic.\n* Apply request filtering or header size / format restrictions at the reverse proxy or application boundary to limit abusive `Accept-Encoding` values.",
"id": "GHSA-v569-hp3g-36wr",
"modified": "2026-04-24T20:34:45Z",
"published": "2026-04-02T20:32:19Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/rack/rack/security/advisories/GHSA-v569-hp3g-36wr"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34230"
},
{
"type": "PACKAGE",
"url": "https://github.com/rack/rack"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
],
"summary": "Rack has quadratic complexity in Rack::Utils.select_best_encoding via wildcard Accept-Encoding header"
}
FKIE_CVE-2026-34230
Vulnerability from fkie_nvd - Published: 2026-04-02 17:16 - Updated: 2026-04-16 17:277.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:rack:rack:*:*:*:*:*:ruby:*:*",
"matchCriteriaId": "AD5DE7DE-3A8B-4064-A7D5-1E117A101E81",
"versionEndExcluding": "2.2.23",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rack:rack:*:*:*:*:*:ruby:*:*",
"matchCriteriaId": "6948AAA6-873D-46BA-AA22-4C81138128E1",
"versionEndExcluding": "3.1.21",
"versionStartIncluding": "3.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rack:rack:*:*:*:*:*:ruby:*:*",
"matchCriteriaId": "3FB592AD-E826-49BE-AC6D-E5F55FDCC96E",
"versionEndExcluding": "3.2.6",
"versionStartIncluding": "3.2.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, and 3.2.6, Rack::Utils.select_best_encoding processes Accept-Encoding values with quadratic time complexity when the header contains many wildcard (*) entries. Because this method is used by Rack::Deflater to choose a response encoding, an unauthenticated attacker can send a single request with a crafted Accept-Encoding header and cause disproportionate CPU consumption on the compression middleware path. This results in a denial of service condition for applications using Rack::Deflater. This issue has been patched in versions 2.2.23, 3.1.21, and 3.2.6."
}
],
"id": "CVE-2026-34230",
"lastModified": "2026-04-16T17:27:43.037",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4,
"source": "security-advisories@github.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2026-04-02T17:16:23.570",
"references": [
{
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
],
"url": "https://github.com/rack/rack/security/advisories/GHSA-v569-hp3g-36wr"
}
],
"sourceIdentifier": "security-advisories@github.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-400"
},
{
"lang": "en",
"value": "CWE-407"
}
],
"source": "security-advisories@github.com",
"type": "Primary"
}
]
}
SUSE-SU-2026:1745-1
Vulnerability from csaf_suse - Published: 2026-05-07 07:22 - Updated: 2026-05-07 07:22{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for rmt-server",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for rmt-server fixes the following issues:\n\nUpdate to version 2.27.\n\nSecurity issues fixed:\n\n- CVE-2026-26961: rack: greedy multipart boundary parsing can lead to parser differentials and WAF bypass\n (bsc#1261398).\n- CVE-2026-26962: rack: improper unfolding of folded multipart headers can lead to downstream header injection and\n response splitting(bsc#1261471). \n- CVE-2026-34763: rack: unescaped regex interpolation of configured root path can lead to root directory disclosure\n (bsc#1261406).\n- CVE-2026-34785: rack: prefix matching logic can lead to the exposure of unintended files under the static root\n (bsc#1261417).\n- CVE-2026-34786: rack: URL-encoded path mismatch can lead to `header_rules` bypass (bsc#1261426).\n- CVE-2026-34826: rack: missing individual byte range limit checks when parsing HTTP `Range` headers can lead to\n excessive resource consumption and a denial of service (bsc#1261436).\n- CVE-2026-34829: rack: multipart parsing without `Content-Length` header can lead to unbounded chunked file uploads\n and a denial of service (bsc#1261447).\n- CVE-2026-34230: rack: quadratic complexity when processing of wildcard `Accept-Encoding` headers can lead to a denial\n of service (bsc#1261388). \n- CVE-2026-34830: rack: improper sanitization of the `X-Accel-Mapping` request header can lead to the exposure of\n unintended files via `X-Accel-Redirect` (bsc#1261458).\n- CVE-2026-34831: rack: `Content-Length` header and body byte size mismatch when creating error responses can lead to\n incorrect HTTP response framing (bsc#1261466).\n\nOther updates and bugfixes:\n\n- Fix ReDoS in `Addressable`.\n- Fix out-of-bounds read in `rdiscount`.\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2026-1745,SUSE-SLE-Module-Public-Cloud-15-SP7-2026-1745,SUSE-SLE-Module-Server-Applications-15-SP7-2026-1745",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_1745-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:1745-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20261745-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:1745-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2026-May/046296.html"
},
{
"category": "self",
"summary": "SUSE Bug 1261388",
"url": "https://bugzilla.suse.com/1261388"
},
{
"category": "self",
"summary": "SUSE Bug 1261398",
"url": "https://bugzilla.suse.com/1261398"
},
{
"category": "self",
"summary": "SUSE Bug 1261406",
"url": "https://bugzilla.suse.com/1261406"
},
{
"category": "self",
"summary": "SUSE Bug 1261417",
"url": "https://bugzilla.suse.com/1261417"
},
{
"category": "self",
"summary": "SUSE Bug 1261426",
"url": "https://bugzilla.suse.com/1261426"
},
{
"category": "self",
"summary": "SUSE Bug 1261436",
"url": "https://bugzilla.suse.com/1261436"
},
{
"category": "self",
"summary": "SUSE Bug 1261447",
"url": "https://bugzilla.suse.com/1261447"
},
{
"category": "self",
"summary": "SUSE Bug 1261458",
"url": "https://bugzilla.suse.com/1261458"
},
{
"category": "self",
"summary": "SUSE Bug 1261466",
"url": "https://bugzilla.suse.com/1261466"
},
{
"category": "self",
"summary": "SUSE Bug 1261471",
"url": "https://bugzilla.suse.com/1261471"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-26961 page",
"url": "https://www.suse.com/security/cve/CVE-2026-26961/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-26962 page",
"url": "https://www.suse.com/security/cve/CVE-2026-26962/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-34230 page",
"url": "https://www.suse.com/security/cve/CVE-2026-34230/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-34763 page",
"url": "https://www.suse.com/security/cve/CVE-2026-34763/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-34785 page",
"url": "https://www.suse.com/security/cve/CVE-2026-34785/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-34786 page",
"url": "https://www.suse.com/security/cve/CVE-2026-34786/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-34826 page",
"url": "https://www.suse.com/security/cve/CVE-2026-34826/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-34829 page",
"url": "https://www.suse.com/security/cve/CVE-2026-34829/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-34830 page",
"url": "https://www.suse.com/security/cve/CVE-2026-34830/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-34831 page",
"url": "https://www.suse.com/security/cve/CVE-2026-34831/"
}
],
"title": "Security update for rmt-server",
"tracking": {
"current_release_date": "2026-05-07T07:22:43Z",
"generator": {
"date": "2026-05-07T07:22:43Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:1745-1",
"initial_release_date": "2026-05-07T07:22:43Z",
"revision_history": [
{
"date": "2026-05-07T07:22:43Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "rmt-server-2.27-150700.3.20.1.aarch64",
"product": {
"name": "rmt-server-2.27-150700.3.20.1.aarch64",
"product_id": "rmt-server-2.27-150700.3.20.1.aarch64"
}
},
{
"category": "product_version",
"name": "rmt-server-config-2.27-150700.3.20.1.aarch64",
"product": {
"name": "rmt-server-config-2.27-150700.3.20.1.aarch64",
"product_id": "rmt-server-config-2.27-150700.3.20.1.aarch64"
}
},
{
"category": "product_version",
"name": "rmt-server-pubcloud-2.27-150700.3.20.1.aarch64",
"product": {
"name": "rmt-server-pubcloud-2.27-150700.3.20.1.aarch64",
"product_id": "rmt-server-pubcloud-2.27-150700.3.20.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "rmt-server-2.27-150700.3.20.1.ppc64le",
"product": {
"name": "rmt-server-2.27-150700.3.20.1.ppc64le",
"product_id": "rmt-server-2.27-150700.3.20.1.ppc64le"
}
},
{
"category": "product_version",
"name": "rmt-server-config-2.27-150700.3.20.1.ppc64le",
"product": {
"name": "rmt-server-config-2.27-150700.3.20.1.ppc64le",
"product_id": "rmt-server-config-2.27-150700.3.20.1.ppc64le"
}
},
{
"category": "product_version",
"name": "rmt-server-pubcloud-2.27-150700.3.20.1.ppc64le",
"product": {
"name": "rmt-server-pubcloud-2.27-150700.3.20.1.ppc64le",
"product_id": "rmt-server-pubcloud-2.27-150700.3.20.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "rmt-server-2.27-150700.3.20.1.s390x",
"product": {
"name": "rmt-server-2.27-150700.3.20.1.s390x",
"product_id": "rmt-server-2.27-150700.3.20.1.s390x"
}
},
{
"category": "product_version",
"name": "rmt-server-config-2.27-150700.3.20.1.s390x",
"product": {
"name": "rmt-server-config-2.27-150700.3.20.1.s390x",
"product_id": "rmt-server-config-2.27-150700.3.20.1.s390x"
}
},
{
"category": "product_version",
"name": "rmt-server-pubcloud-2.27-150700.3.20.1.s390x",
"product": {
"name": "rmt-server-pubcloud-2.27-150700.3.20.1.s390x",
"product_id": "rmt-server-pubcloud-2.27-150700.3.20.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "rmt-server-2.27-150700.3.20.1.x86_64",
"product": {
"name": "rmt-server-2.27-150700.3.20.1.x86_64",
"product_id": "rmt-server-2.27-150700.3.20.1.x86_64"
}
},
{
"category": "product_version",
"name": "rmt-server-config-2.27-150700.3.20.1.x86_64",
"product": {
"name": "rmt-server-config-2.27-150700.3.20.1.x86_64",
"product_id": "rmt-server-config-2.27-150700.3.20.1.x86_64"
}
},
{
"category": "product_version",
"name": "rmt-server-pubcloud-2.27-150700.3.20.1.x86_64",
"product": {
"name": "rmt-server-pubcloud-2.27-150700.3.20.1.x86_64",
"product_id": "rmt-server-pubcloud-2.27-150700.3.20.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Public Cloud 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Module for Public Cloud 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-public-cloud:15:sp7"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Server Applications 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Module for Server Applications 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-server-applications:15:sp7"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "rmt-server-pubcloud-2.27-150700.3.20.1.aarch64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.aarch64"
},
"product_reference": "rmt-server-pubcloud-2.27-150700.3.20.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rmt-server-pubcloud-2.27-150700.3.20.1.ppc64le as component of SUSE Linux Enterprise Module for Public Cloud 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.ppc64le"
},
"product_reference": "rmt-server-pubcloud-2.27-150700.3.20.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rmt-server-pubcloud-2.27-150700.3.20.1.s390x as component of SUSE Linux Enterprise Module for Public Cloud 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.s390x"
},
"product_reference": "rmt-server-pubcloud-2.27-150700.3.20.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rmt-server-pubcloud-2.27-150700.3.20.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.x86_64"
},
"product_reference": "rmt-server-pubcloud-2.27-150700.3.20.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rmt-server-2.27-150700.3.20.1.aarch64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.aarch64"
},
"product_reference": "rmt-server-2.27-150700.3.20.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rmt-server-2.27-150700.3.20.1.ppc64le as component of SUSE Linux Enterprise Module for Server Applications 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.ppc64le"
},
"product_reference": "rmt-server-2.27-150700.3.20.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rmt-server-2.27-150700.3.20.1.s390x as component of SUSE Linux Enterprise Module for Server Applications 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.s390x"
},
"product_reference": "rmt-server-2.27-150700.3.20.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rmt-server-2.27-150700.3.20.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.x86_64"
},
"product_reference": "rmt-server-2.27-150700.3.20.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rmt-server-config-2.27-150700.3.20.1.aarch64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.aarch64"
},
"product_reference": "rmt-server-config-2.27-150700.3.20.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rmt-server-config-2.27-150700.3.20.1.ppc64le as component of SUSE Linux Enterprise Module for Server Applications 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.ppc64le"
},
"product_reference": "rmt-server-config-2.27-150700.3.20.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rmt-server-config-2.27-150700.3.20.1.s390x as component of SUSE Linux Enterprise Module for Server Applications 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.s390x"
},
"product_reference": "rmt-server-config-2.27-150700.3.20.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rmt-server-config-2.27-150700.3.20.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.x86_64"
},
"product_reference": "rmt-server-config-2.27-150700.3.20.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP7"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-26961",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-26961"
}
],
"notes": [
{
"category": "general",
"text": "Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, and 3.2.6, Rack::Multipart::Parser extracts the boundary parameter from multipart/form-data using a greedy regular expression. When a Content-Type header contains multiple boundary parameters, Rack selects the last one rather than the first. In deployments where an upstream proxy, WAF, or intermediary interprets the first boundary parameter, this mismatch can allow an attacker to smuggle multipart content past upstream inspection and have Rack parse a different body structure than the intermediary validated. This issue has been patched in versions 2.2.23, 3.1.21, and 3.2.6.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-26961",
"url": "https://www.suse.com/security/cve/CVE-2026-26961"
},
{
"category": "external",
"summary": "SUSE Bug 1261391 for CVE-2026-26961",
"url": "https://bugzilla.suse.com/1261391"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-07T07:22:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-26961"
},
{
"cve": "CVE-2026-26962",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-26962"
}
],
"notes": [
{
"category": "general",
"text": "Rack is a modular Ruby web server interface. From version 3.2.0 to before version 3.2.6, Rack::Multipart::Parser unfolds folded multipart part headers incorrectly. When a multipart header contains an obs-fold sequence, Rack preserves the embedded CRLF in parsed parameter values such as filename or name instead of removing the folded line break during unfolding. As a result, applications that later reuse those parsed values in HTTP response headers may be vulnerable to downstream header injection or response splitting. This issue has been patched in version 3.2.6.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-26962",
"url": "https://www.suse.com/security/cve/CVE-2026-26962"
},
{
"category": "external",
"summary": "SUSE Bug 1261470 for CVE-2026-26962",
"url": "https://bugzilla.suse.com/1261470"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-07T07:22:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-26962"
},
{
"cve": "CVE-2026-34230",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-34230"
}
],
"notes": [
{
"category": "general",
"text": "Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, and 3.2.6, Rack::Utils.select_best_encoding processes Accept-Encoding values with quadratic time complexity when the header contains many wildcard (*) entries. Because this method is used by Rack::Deflater to choose a response encoding, an unauthenticated attacker can send a single request with a crafted Accept-Encoding header and cause disproportionate CPU consumption on the compression middleware path. This results in a denial of service condition for applications using Rack::Deflater. This issue has been patched in versions 2.2.23, 3.1.21, and 3.2.6.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-34230",
"url": "https://www.suse.com/security/cve/CVE-2026-34230"
},
{
"category": "external",
"summary": "SUSE Bug 1261384 for CVE-2026-34230",
"url": "https://bugzilla.suse.com/1261384"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-07T07:22:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-34230"
},
{
"cve": "CVE-2026-34763",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-34763"
}
],
"notes": [
{
"category": "general",
"text": "Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, and 3.2.6, Rack::Directory interpolates the configured root path directly into a regular expression when deriving the displayed directory path. If root contains regex metacharacters such as +, *, or ., the prefix stripping can fail and the generated directory listing may expose the full filesystem path in the HTML output. This issue has been patched in versions 2.2.23, 3.1.21, and 3.2.6.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-34763",
"url": "https://www.suse.com/security/cve/CVE-2026-34763"
},
{
"category": "external",
"summary": "SUSE Bug 1261401 for CVE-2026-34763",
"url": "https://bugzilla.suse.com/1261401"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-07T07:22:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-34763"
},
{
"cve": "CVE-2026-34785",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-34785"
}
],
"notes": [
{
"category": "general",
"text": "Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, and 3.2.6, Rack::Static determines whether a request should be served as a static file using a simple string prefix check. When configured with URL prefixes such as \"/css\", it matches any request path that begins with that string, including unrelated paths such as \"/css-config.env\" or \"/css-backup.sql\". As a result, files under the static root whose names merely share the configured prefix may be served unintentionally, leading to information disclosure. This issue has been patched in versions 2.2.23, 3.1.21, and 3.2.6.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-34785",
"url": "https://www.suse.com/security/cve/CVE-2026-34785"
},
{
"category": "external",
"summary": "SUSE Bug 1261415 for CVE-2026-34785",
"url": "https://bugzilla.suse.com/1261415"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-07T07:22:43Z",
"details": "important"
}
],
"title": "CVE-2026-34785"
},
{
"cve": "CVE-2026-34786",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-34786"
}
],
"notes": [
{
"category": "general",
"text": "Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, and 3.2.6, Rack::Static#applicable_rules evaluates several header_rules types against the raw URL-encoded PATH_INFO, while the underlying file-serving path is decoded before the file is served. As a result, a request for a URL-encoded variant of a static path can serve the same file without the headers that header_rules were intended to apply. In deployments that rely on Rack::Static to attach security-relevant response headers to static content, this can allow an attacker to bypass those headers by requesting an encoded form of the path. This issue has been patched in versions 2.2.23, 3.1.21, and 3.2.6.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-34786",
"url": "https://www.suse.com/security/cve/CVE-2026-34786"
},
{
"category": "external",
"summary": "SUSE Bug 1261421 for CVE-2026-34786",
"url": "https://bugzilla.suse.com/1261421"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-07T07:22:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-34786"
},
{
"cve": "CVE-2026-34826",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-34826"
}
],
"notes": [
{
"category": "general",
"text": "Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, and 3.2.6, Rack::Utils.get_byte_ranges parses the HTTP Range header without limiting the number of individual byte ranges. Although the existing fix for CVE-2024-26141 rejects ranges whose total byte coverage exceeds the file size, it does not restrict the count of ranges. An attacker can supply many small overlapping ranges such as 0-0,0-0,0-0,... to trigger disproportionate CPU, memory, I/O, and bandwidth consumption per request. This results in a denial of service condition in Rack file-serving paths that process multipart byte range responses. This issue has been patched in versions 2.2.23, 3.1.21, and 3.2.6.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-34826",
"url": "https://www.suse.com/security/cve/CVE-2026-34826"
},
{
"category": "external",
"summary": "SUSE Bug 1261431 for CVE-2026-34826",
"url": "https://bugzilla.suse.com/1261431"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-07T07:22:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-34826"
},
{
"cve": "CVE-2026-34829",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-34829"
}
],
"notes": [
{
"category": "general",
"text": "Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, and 3.2.6, Rack::Multipart::Parser only wraps the request body in a BoundedIO when CONTENT_LENGTH is present. When a multipart/form-data request is sent without a Content-Length header, such as with HTTP chunked transfer encoding, multipart parsing continues until end-of-stream with no total size limit. For file parts, the uploaded body is written directly to a temporary file on disk rather than being constrained by the buffered in-memory upload limit. An unauthenticated attacker can therefore stream an arbitrarily large multipart file upload and consume unbounded disk space. This results in a denial of service condition for Rack applications that accept multipart form data. This issue has been patched in versions 2.2.23, 3.1.21, and 3.2.6.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-34829",
"url": "https://www.suse.com/security/cve/CVE-2026-34829"
},
{
"category": "external",
"summary": "SUSE Bug 1261442 for CVE-2026-34829",
"url": "https://bugzilla.suse.com/1261442"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-07T07:22:43Z",
"details": "important"
}
],
"title": "CVE-2026-34829"
},
{
"cve": "CVE-2026-34830",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-34830"
}
],
"notes": [
{
"category": "general",
"text": "Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, and 3.2.6, Rack::Sendfile#map_accel_path interpolates the value of the X-Accel-Mapping request header directly into a regular expression when rewriting file paths for X-Accel-Redirect. Because the header value is not escaped, an attacker who can supply X-Accel-Mapping to the backend can inject regex metacharacters and control the generated X-Accel-Redirect response header. In deployments using Rack::Sendfile with x-accel-redirect, this can allow an attacker to cause nginx to serve unintended files from configured internal locations. This issue has been patched in versions 2.2.23, 3.1.21, and 3.2.6.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-34830",
"url": "https://www.suse.com/security/cve/CVE-2026-34830"
},
{
"category": "external",
"summary": "SUSE Bug 1261453 for CVE-2026-34830",
"url": "https://bugzilla.suse.com/1261453"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-07T07:22:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-34830"
},
{
"cve": "CVE-2026-34831",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-34831"
}
],
"notes": [
{
"category": "general",
"text": "Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, and 3.2.6, Rack::Files#fail sets the Content-Length response header using String#size instead of String#bytesize. When the response body contains multibyte UTF-8 characters, the declared Content-Length is smaller than the number of bytes actually sent on the wire. Because Rack::Files reflects the requested path in 404 responses, an attacker can trigger this mismatch by requesting a non-existent path containing percent-encoded UTF-8 characters. This results in incorrect HTTP response framing and may cause response desynchronization in deployments that rely on the incorrect Content-Length value. This issue has been patched in versions 2.2.23, 3.1.21, and 3.2.6.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-34831",
"url": "https://www.suse.com/security/cve/CVE-2026-34831"
},
{
"category": "external",
"summary": "SUSE Bug 1261464 for CVE-2026-34831",
"url": "https://bugzilla.suse.com/1261464"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:rmt-server-pubcloud-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-2.27-150700.3.20.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP7:rmt-server-config-2.27-150700.3.20.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-07T07:22:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-34831"
}
]
}
OPENSUSE-SU-2026:10508-1
Vulnerability from csaf_opensuse - Published: 2026-04-08 00:00 - Updated: 2026-04-08 00:00| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "ruby4.0-rubygem-rack-2.2-2.2.23-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the ruby4.0-rubygem-rack-2.2-2.2.23-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2026-10508",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2026_10508-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-26961 page",
"url": "https://www.suse.com/security/cve/CVE-2026-26961/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-34230 page",
"url": "https://www.suse.com/security/cve/CVE-2026-34230/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-34763 page",
"url": "https://www.suse.com/security/cve/CVE-2026-34763/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-34785 page",
"url": "https://www.suse.com/security/cve/CVE-2026-34785/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-34786 page",
"url": "https://www.suse.com/security/cve/CVE-2026-34786/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-34826 page",
"url": "https://www.suse.com/security/cve/CVE-2026-34826/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-34829 page",
"url": "https://www.suse.com/security/cve/CVE-2026-34829/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-34830 page",
"url": "https://www.suse.com/security/cve/CVE-2026-34830/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-34831 page",
"url": "https://www.suse.com/security/cve/CVE-2026-34831/"
}
],
"title": "ruby4.0-rubygem-rack-2.2-2.2.23-1.1 on GA media",
"tracking": {
"current_release_date": "2026-04-08T00:00:00Z",
"generator": {
"date": "2026-04-08T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2026:10508-1",
"initial_release_date": "2026-04-08T00:00:00Z",
"revision_history": [
{
"date": "2026-04-08T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "ruby4.0-rubygem-rack-2.2-2.2.23-1.1.aarch64",
"product": {
"name": "ruby4.0-rubygem-rack-2.2-2.2.23-1.1.aarch64",
"product_id": "ruby4.0-rubygem-rack-2.2-2.2.23-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby4.0-rubygem-rack-2.2-2.2.23-1.1.ppc64le",
"product": {
"name": "ruby4.0-rubygem-rack-2.2-2.2.23-1.1.ppc64le",
"product_id": "ruby4.0-rubygem-rack-2.2-2.2.23-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby4.0-rubygem-rack-2.2-2.2.23-1.1.s390x",
"product": {
"name": "ruby4.0-rubygem-rack-2.2-2.2.23-1.1.s390x",
"product_id": "ruby4.0-rubygem-rack-2.2-2.2.23-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby4.0-rubygem-rack-2.2-2.2.23-1.1.x86_64",
"product": {
"name": "ruby4.0-rubygem-rack-2.2-2.2.23-1.1.x86_64",
"product_id": "ruby4.0-rubygem-rack-2.2-2.2.23-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby4.0-rubygem-rack-2.2-2.2.23-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.aarch64"
},
"product_reference": "ruby4.0-rubygem-rack-2.2-2.2.23-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby4.0-rubygem-rack-2.2-2.2.23-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.ppc64le"
},
"product_reference": "ruby4.0-rubygem-rack-2.2-2.2.23-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby4.0-rubygem-rack-2.2-2.2.23-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.s390x"
},
"product_reference": "ruby4.0-rubygem-rack-2.2-2.2.23-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby4.0-rubygem-rack-2.2-2.2.23-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.x86_64"
},
"product_reference": "ruby4.0-rubygem-rack-2.2-2.2.23-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-26961",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-26961"
}
],
"notes": [
{
"category": "general",
"text": "Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, and 3.2.6, Rack::Multipart::Parser extracts the boundary parameter from multipart/form-data using a greedy regular expression. When a Content-Type header contains multiple boundary parameters, Rack selects the last one rather than the first. In deployments where an upstream proxy, WAF, or intermediary interprets the first boundary parameter, this mismatch can allow an attacker to smuggle multipart content past upstream inspection and have Rack parse a different body structure than the intermediary validated. This issue has been patched in versions 2.2.23, 3.1.21, and 3.2.6.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.aarch64",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.ppc64le",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.s390x",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-26961",
"url": "https://www.suse.com/security/cve/CVE-2026-26961"
},
{
"category": "external",
"summary": "SUSE Bug 1261391 for CVE-2026-26961",
"url": "https://bugzilla.suse.com/1261391"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.aarch64",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.ppc64le",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.s390x",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.aarch64",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.ppc64le",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.s390x",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-08T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-26961"
},
{
"cve": "CVE-2026-34230",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-34230"
}
],
"notes": [
{
"category": "general",
"text": "Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, and 3.2.6, Rack::Utils.select_best_encoding processes Accept-Encoding values with quadratic time complexity when the header contains many wildcard (*) entries. Because this method is used by Rack::Deflater to choose a response encoding, an unauthenticated attacker can send a single request with a crafted Accept-Encoding header and cause disproportionate CPU consumption on the compression middleware path. This results in a denial of service condition for applications using Rack::Deflater. This issue has been patched in versions 2.2.23, 3.1.21, and 3.2.6.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.aarch64",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.ppc64le",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.s390x",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-34230",
"url": "https://www.suse.com/security/cve/CVE-2026-34230"
},
{
"category": "external",
"summary": "SUSE Bug 1261384 for CVE-2026-34230",
"url": "https://bugzilla.suse.com/1261384"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.aarch64",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.ppc64le",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.s390x",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.aarch64",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.ppc64le",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.s390x",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-08T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-34230"
},
{
"cve": "CVE-2026-34763",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-34763"
}
],
"notes": [
{
"category": "general",
"text": "Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, and 3.2.6, Rack::Directory interpolates the configured root path directly into a regular expression when deriving the displayed directory path. If root contains regex metacharacters such as +, *, or ., the prefix stripping can fail and the generated directory listing may expose the full filesystem path in the HTML output. This issue has been patched in versions 2.2.23, 3.1.21, and 3.2.6.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.aarch64",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.ppc64le",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.s390x",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-34763",
"url": "https://www.suse.com/security/cve/CVE-2026-34763"
},
{
"category": "external",
"summary": "SUSE Bug 1261401 for CVE-2026-34763",
"url": "https://bugzilla.suse.com/1261401"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.aarch64",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.ppc64le",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.s390x",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.aarch64",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.ppc64le",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.s390x",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-08T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-34763"
},
{
"cve": "CVE-2026-34785",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-34785"
}
],
"notes": [
{
"category": "general",
"text": "Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, and 3.2.6, Rack::Static determines whether a request should be served as a static file using a simple string prefix check. When configured with URL prefixes such as \"/css\", it matches any request path that begins with that string, including unrelated paths such as \"/css-config.env\" or \"/css-backup.sql\". As a result, files under the static root whose names merely share the configured prefix may be served unintentionally, leading to information disclosure. This issue has been patched in versions 2.2.23, 3.1.21, and 3.2.6.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.aarch64",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.ppc64le",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.s390x",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-34785",
"url": "https://www.suse.com/security/cve/CVE-2026-34785"
},
{
"category": "external",
"summary": "SUSE Bug 1261415 for CVE-2026-34785",
"url": "https://bugzilla.suse.com/1261415"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.aarch64",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.ppc64le",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.s390x",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.aarch64",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.ppc64le",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.s390x",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-08T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2026-34785"
},
{
"cve": "CVE-2026-34786",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-34786"
}
],
"notes": [
{
"category": "general",
"text": "Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, and 3.2.6, Rack::Static#applicable_rules evaluates several header_rules types against the raw URL-encoded PATH_INFO, while the underlying file-serving path is decoded before the file is served. As a result, a request for a URL-encoded variant of a static path can serve the same file without the headers that header_rules were intended to apply. In deployments that rely on Rack::Static to attach security-relevant response headers to static content, this can allow an attacker to bypass those headers by requesting an encoded form of the path. This issue has been patched in versions 2.2.23, 3.1.21, and 3.2.6.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.aarch64",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.ppc64le",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.s390x",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-34786",
"url": "https://www.suse.com/security/cve/CVE-2026-34786"
},
{
"category": "external",
"summary": "SUSE Bug 1261421 for CVE-2026-34786",
"url": "https://bugzilla.suse.com/1261421"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.aarch64",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.ppc64le",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.s390x",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.aarch64",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.ppc64le",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.s390x",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-08T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-34786"
},
{
"cve": "CVE-2026-34826",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-34826"
}
],
"notes": [
{
"category": "general",
"text": "Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, and 3.2.6, Rack::Utils.get_byte_ranges parses the HTTP Range header without limiting the number of individual byte ranges. Although the existing fix for CVE-2024-26141 rejects ranges whose total byte coverage exceeds the file size, it does not restrict the count of ranges. An attacker can supply many small overlapping ranges such as 0-0,0-0,0-0,... to trigger disproportionate CPU, memory, I/O, and bandwidth consumption per request. This results in a denial of service condition in Rack file-serving paths that process multipart byte range responses. This issue has been patched in versions 2.2.23, 3.1.21, and 3.2.6.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.aarch64",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.ppc64le",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.s390x",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-34826",
"url": "https://www.suse.com/security/cve/CVE-2026-34826"
},
{
"category": "external",
"summary": "SUSE Bug 1261431 for CVE-2026-34826",
"url": "https://bugzilla.suse.com/1261431"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.aarch64",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.ppc64le",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.s390x",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.aarch64",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.ppc64le",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.s390x",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-08T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-34826"
},
{
"cve": "CVE-2026-34829",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-34829"
}
],
"notes": [
{
"category": "general",
"text": "Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, and 3.2.6, Rack::Multipart::Parser only wraps the request body in a BoundedIO when CONTENT_LENGTH is present. When a multipart/form-data request is sent without a Content-Length header, such as with HTTP chunked transfer encoding, multipart parsing continues until end-of-stream with no total size limit. For file parts, the uploaded body is written directly to a temporary file on disk rather than being constrained by the buffered in-memory upload limit. An unauthenticated attacker can therefore stream an arbitrarily large multipart file upload and consume unbounded disk space. This results in a denial of service condition for Rack applications that accept multipart form data. This issue has been patched in versions 2.2.23, 3.1.21, and 3.2.6.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.aarch64",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.ppc64le",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.s390x",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-34829",
"url": "https://www.suse.com/security/cve/CVE-2026-34829"
},
{
"category": "external",
"summary": "SUSE Bug 1261442 for CVE-2026-34829",
"url": "https://bugzilla.suse.com/1261442"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.aarch64",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.ppc64le",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.s390x",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.aarch64",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.ppc64le",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.s390x",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-08T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2026-34829"
},
{
"cve": "CVE-2026-34830",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-34830"
}
],
"notes": [
{
"category": "general",
"text": "Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, and 3.2.6, Rack::Sendfile#map_accel_path interpolates the value of the X-Accel-Mapping request header directly into a regular expression when rewriting file paths for X-Accel-Redirect. Because the header value is not escaped, an attacker who can supply X-Accel-Mapping to the backend can inject regex metacharacters and control the generated X-Accel-Redirect response header. In deployments using Rack::Sendfile with x-accel-redirect, this can allow an attacker to cause nginx to serve unintended files from configured internal locations. This issue has been patched in versions 2.2.23, 3.1.21, and 3.2.6.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.aarch64",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.ppc64le",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.s390x",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-34830",
"url": "https://www.suse.com/security/cve/CVE-2026-34830"
},
{
"category": "external",
"summary": "SUSE Bug 1261453 for CVE-2026-34830",
"url": "https://bugzilla.suse.com/1261453"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.aarch64",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.ppc64le",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.s390x",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.aarch64",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.ppc64le",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.s390x",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-08T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-34830"
},
{
"cve": "CVE-2026-34831",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-34831"
}
],
"notes": [
{
"category": "general",
"text": "Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, and 3.2.6, Rack::Files#fail sets the Content-Length response header using String#size instead of String#bytesize. When the response body contains multibyte UTF-8 characters, the declared Content-Length is smaller than the number of bytes actually sent on the wire. Because Rack::Files reflects the requested path in 404 responses, an attacker can trigger this mismatch by requesting a non-existent path containing percent-encoded UTF-8 characters. This results in incorrect HTTP response framing and may cause response desynchronization in deployments that rely on the incorrect Content-Length value. This issue has been patched in versions 2.2.23, 3.1.21, and 3.2.6.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.aarch64",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.ppc64le",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.s390x",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-34831",
"url": "https://www.suse.com/security/cve/CVE-2026-34831"
},
{
"category": "external",
"summary": "SUSE Bug 1261464 for CVE-2026-34831",
"url": "https://bugzilla.suse.com/1261464"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.aarch64",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.ppc64le",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.s390x",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.aarch64",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.ppc64le",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.s390x",
"openSUSE Tumbleweed:ruby4.0-rubygem-rack-2.2-2.2.23-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-08T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-34831"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.