UBUNTU-CVE-2026-34830

Source
https://ubuntu.com/security/CVE-2026-34830
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-34830.json
JSON Data
https://api.test.osv.dev/v1/vulns/UBUNTU-CVE-2026-34830
Upstream
Downstream
Related
Published
2026-04-02T17:16:00Z
Modified
2026-04-27T20:10:49.801616Z
Severity
  • 5.9 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
  • Ubuntu - medium
Summary
[none]
Details

Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, and 3.2.6, Rack::Sendfile#mapaccelpath interpolates the value of the X-Accel-Mapping request header directly into a regular expression when rewriting file paths for X-Accel-Redirect. Because the header value is not escaped, an attacker who can supply X-Accel-Mapping to the backend can inject regex metacharacters and control the generated X-Accel-Redirect response header. In deployments using Rack::Sendfile with x-accel-redirect, this can allow an attacker to cause nginx to serve unintended files from configured internal locations. This issue has been patched in versions 2.2.23, 3.1.21, and 3.2.6.

References

Affected packages

Ubuntu:24.04:LTS
ruby-rack

Package

Name
ruby-rack
Purl
pkg:deb/ubuntu/ruby-rack@2.2.7-1ubuntu0.7?arch=source&distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.2.7-1ubuntu0.7

Affected versions

2.*
2.2.4-3
2.2.7-1
2.2.7-1ubuntu0.1
2.2.7-1ubuntu0.2
2.2.7-1ubuntu0.3
2.2.7-1ubuntu0.4
2.2.7-1ubuntu0.5
2.2.7-1ubuntu0.6

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "2.2.7-1ubuntu0.7",
            "binary_name": "ruby-rack"
        }
    ],
    "availability": "No subscription required"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-34830.json"
Ubuntu:25.10
ruby-rack

Package

Name
ruby-rack
Purl
pkg:deb/ubuntu/ruby-rack@3.1.16-0.1ubuntu0.3?arch=source&distro=questing

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.1.16-0.1ubuntu0.3

Affected versions

2.*
2.2.7-1.1
3.*
3.1.16-0.1
3.1.16-0.1ubuntu0.1
3.1.16-0.1ubuntu0.2

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "3.1.16-0.1ubuntu0.3",
            "binary_name": "ruby-rack"
        }
    ],
    "availability": "No subscription required"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-34830.json"
Ubuntu:26.04
ruby-rack

Package

Name
ruby-rack
Purl
pkg:deb/ubuntu/ruby-rack@3.2.4-1ubuntu1?arch=source&distro=resolute

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*
3.1.16-0.1
3.1.18-1
3.1.18-1build1
3.2.4-1ubuntu1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "3.2.4-1ubuntu1",
            "binary_name": "ruby-rack"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-34830.json"
Ubuntu:Pro:14.04:LTS
ruby-rack

Package

Name
ruby-rack
Purl
pkg:deb/ubuntu/ruby-rack@1.5.2-3+deb8u3ubuntu1~esm11?arch=source&distro=esm-infra-legacy/trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*
1.5.2-1
1.5.2-1ubuntu0.1~esm1
1.5.2-3+deb8u3ubuntu1~esm2
1.5.2-3+deb8u3ubuntu1~esm3
1.5.2-3+deb8u3ubuntu1~esm4
1.5.2-3+deb8u3ubuntu1~esm6
1.5.2-3+deb8u3ubuntu1~esm7
1.5.2-3+deb8u3ubuntu1~esm8
1.5.2-3+deb8u3ubuntu1~esm9
1.5.2-3+deb8u3ubuntu1~esm10
1.5.2-3+deb8u3ubuntu1~esm11

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "1.5.2-3+deb8u3ubuntu1~esm11",
            "binary_name": "librack-ruby"
        },
        {
            "binary_version": "1.5.2-3+deb8u3ubuntu1~esm11",
            "binary_name": "librack-ruby1.8"
        },
        {
            "binary_version": "1.5.2-3+deb8u3ubuntu1~esm11",
            "binary_name": "librack-ruby1.9.1"
        },
        {
            "binary_version": "1.5.2-3+deb8u3ubuntu1~esm11",
            "binary_name": "ruby-rack"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-34830.json"
Ubuntu:Pro:16.04:LTS
ruby-rack

Package

Name
ruby-rack
Purl
pkg:deb/ubuntu/ruby-rack@1.6.4-3ubuntu0.2+esm10?arch=source&distro=esm-apps/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.6.4-3ubuntu0.2+esm10

Affected versions

1.*
1.5.2-4
1.6.4-2
1.6.4-3
1.6.4-3ubuntu0.1
1.6.4-3ubuntu0.2
1.6.4-3ubuntu0.2+esm1
1.6.4-3ubuntu0.2+esm2
1.6.4-3ubuntu0.2+esm4
1.6.4-3ubuntu0.2+esm5
1.6.4-3ubuntu0.2+esm6
1.6.4-3ubuntu0.2+esm7
1.6.4-3ubuntu0.2+esm8
1.6.4-3ubuntu0.2+esm9

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "1.6.4-3ubuntu0.2+esm10",
            "binary_name": "ruby-rack"
        }
    ],
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-34830.json"
Ubuntu:Pro:18.04:LTS
ruby-rack

Package

Name
ruby-rack
Purl
pkg:deb/ubuntu/ruby-rack@1.6.4-4ubuntu0.2+esm10?arch=source&distro=esm-apps/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.6.4-4ubuntu0.2+esm10

Affected versions

1.*
1.6.4-4
1.6.4-4ubuntu0.1
1.6.4-4ubuntu0.2
1.6.4-4ubuntu0.2+esm1
1.6.4-4ubuntu0.2+esm2
1.6.4-4ubuntu0.2+esm4
1.6.4-4ubuntu0.2+esm5
1.6.4-4ubuntu0.2+esm6
1.6.4-4ubuntu0.2+esm7
1.6.4-4ubuntu0.2+esm8
1.6.4-4ubuntu0.2+esm9

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "1.6.4-4ubuntu0.2+esm10",
            "binary_name": "ruby-rack"
        }
    ],
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-34830.json"
Ubuntu:Pro:20.04:LTS
ruby-rack

Package

Name
ruby-rack
Purl
pkg:deb/ubuntu/ruby-rack@2.0.7-2ubuntu0.1+esm10?arch=source&distro=esm-apps/focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.0.7-2ubuntu0.1+esm10

Affected versions

2.*
2.0.6-3
2.0.7-2
2.0.7-2ubuntu0.1
2.0.7-2ubuntu0.1+esm1
2.0.7-2ubuntu0.1+esm2
2.0.7-2ubuntu0.1+esm3
2.0.7-2ubuntu0.1+esm4
2.0.7-2ubuntu0.1+esm5
2.0.7-2ubuntu0.1+esm6
2.0.7-2ubuntu0.1+esm7
2.0.7-2ubuntu0.1+esm8
2.0.7-2ubuntu0.1+esm9

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "2.0.7-2ubuntu0.1+esm10",
            "binary_name": "ruby-rack"
        }
    ],
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-34830.json"
Ubuntu:Pro:22.04:LTS
ruby-rack

Package

Name
ruby-rack
Purl
pkg:deb/ubuntu/ruby-rack@2.1.4-5ubuntu1.2+esm3?arch=source&distro=esm-apps/jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.1.4-5ubuntu1.2+esm3

Affected versions

2.*
2.1.4-3
2.1.4-4
2.1.4-5
2.1.4-5ubuntu1
2.1.4-5ubuntu1+esm2
2.1.4-5ubuntu1+esm3
2.1.4-5ubuntu1+esm4
2.1.4-5ubuntu1+esm5
2.1.4-5ubuntu1.1
2.1.4-5ubuntu1.1+esm1
2.1.4-5ubuntu1.1+esm2
2.1.4-5ubuntu1.2
2.1.4-5ubuntu1.2+esm1
2.1.4-5ubuntu1.2+esm2

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "2.1.4-5ubuntu1.2+esm3",
            "binary_name": "ruby-rack"
        }
    ],
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-34830.json"