Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-13033 (GCVE-0-2025-13033)
Vulnerability from cvelistv5 – Published: 2025-11-14 19:37 – Updated: 2026-05-11 11:26- CWE-1286 - Improper Validation of Syntactic Correctness of Input
| URL | Tags |
|---|---|
| https://access.redhat.com/errata/RHSA-2026:15979 | vendor-advisoryx_refsource_REDHAT |
| https://access.redhat.com/errata/RHSA-2026:3751 | vendor-advisoryx_refsource_REDHAT |
| https://access.redhat.com/security/cve/CVE-2025-13033 | vdb-entryx_refsource_REDHAT |
| https://bugzilla.redhat.com/show_bug.cgi?id=2402179 | issue-trackingx_refsource_REDHAT |
| https://github.com/nodemailer/nodemailer | |
| https://github.com/nodemailer/nodemailer/commit/1… | |
| https://github.com/nodemailer/nodemailer/security… |
| Vendor | Product | Version | |
|---|---|---|---|
| nodemailer | nodemailer |
Affected:
0 , < 7.0.7
(semver)
|
|
| Red Hat | Red Hat Ceph Storage 8.1 |
Unaffected:
1777566546 , < *
(rpm)
cpe:/a:redhat:ceph_storage:8.1::el9 |
|
| Red Hat | Red Hat Developer Hub 1.9 |
Unaffected:
1772573159 , < *
(rpm)
cpe:/a:redhat:rhdh:1.9::el9 |
|
| Red Hat | Red Hat Advanced Cluster Management for Kubernetes 2 |
cpe:/a:redhat:acm:2 |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-13033",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-11-14T20:00:22.140079Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-11-14T20:00:51.936Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"collectionURL": "https://github.com/nodemailer/nodemailer",
"defaultStatus": "unaffected",
"packageName": "nodemailer",
"product": "nodemailer",
"vendor": "nodemailer",
"versions": [
{
"lessThan": "7.0.7",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"collectionURL": "https://catalog.redhat.com/software/containers/",
"cpes": [
"cpe:/a:redhat:ceph_storage:8.1::el9"
],
"defaultStatus": "affected",
"packageName": "rhceph/grafana-rhel9",
"product": "Red Hat Ceph Storage 8.1",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "1777566546",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://catalog.redhat.com/software/containers/",
"cpes": [
"cpe:/a:redhat:rhdh:1.9::el9"
],
"defaultStatus": "affected",
"packageName": "rhdh/rhdh-hub-rhel9",
"product": "Red Hat Developer Hub 1.9",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "1772573159",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:acm:2"
],
"defaultStatus": "affected",
"packageName": "rhacm2/acm-grafana-rhel9",
"product": "Red Hat Advanced Cluster Management for Kubernetes 2",
"vendor": "Red Hat"
}
],
"datePublic": "2025-10-07T13:42:02.000Z",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was identified in the email parsing library due to improper handling of specially formatted recipient email addresses. An attacker can exploit this flaw by crafting a recipient address that embeds an external address within quotes. This causes the application to misdirect the email to the attacker\u0027s external address instead of the intended internal recipient. This could lead to a significant data leak of sensitive information and allow an attacker to bypass security filters and access controls."
}
],
"metrics": [
{
"other": {
"content": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"value": "Moderate"
},
"type": "Red Hat severity rating"
}
},
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"format": "CVSS"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-1286",
"description": "Improper Validation of Syntactic Correctness of Input",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-05-11T11:26:36.924Z",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"name": "RHSA-2026:15979",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2026:15979"
},
{
"name": "RHSA-2026:3751",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2026:3751"
},
{
"tags": [
"vdb-entry",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/security/cve/CVE-2025-13033"
},
{
"name": "RHBZ#2402179",
"tags": [
"issue-tracking",
"x_refsource_REDHAT"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402179"
},
{
"url": "https://github.com/nodemailer/nodemailer"
},
{
"url": "https://github.com/nodemailer/nodemailer/commit/1150d99fba77280df2cfb1885c43df23109a8626"
},
{
"url": "https://github.com/nodemailer/nodemailer/security/advisories/GHSA-mm7p-fcc7-pg87"
}
],
"timeline": [
{
"lang": "en",
"time": "2025-10-07T15:03:14.483Z",
"value": "Reported to Red Hat."
},
{
"lang": "en",
"time": "2025-10-07T13:42:02.000Z",
"value": "Made public."
}
],
"title": "Nodemailer: nodemailer: email to an unintended domain can occur due to interpretation conflict",
"workarounds": [
{
"lang": "en",
"value": "Currently there\u0027s no available mitigation for this flaw."
}
],
"x_generator": {
"engine": "cvelib 1.8.0"
},
"x_redhatCweChain": "CWE-1286: Improper Validation of Syntactic Correctness of Input"
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2025-13033",
"datePublished": "2025-11-14T19:37:08.224Z",
"dateReserved": "2025-11-11T16:15:03.749Z",
"dateUpdated": "2026-05-11T11:26:36.924Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2025-13033",
"date": "2026-05-16",
"epss": "0.00031",
"percentile": "0.09055"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2025-13033\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2025-11-14T20:15:45.957\",\"lastModified\":\"2026-05-11T13:16:10.037\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability was identified in the email parsing library due to improper handling of specially formatted recipient email addresses. An attacker can exploit this flaw by crafting a recipient address that embeds an external address within quotes. This causes the application to misdirect the email to the attacker\u0027s external address instead of the intended internal recipient. This could lead to a significant data leak of sensitive information and allow an attacker to bypass security filters and access controls.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-1286\"}]}],\"references\":[{\"url\":\"https://access.redhat.com/errata/RHSA-2026:15979\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2026:3751\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/security/cve/CVE-2025-13033\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=2402179\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://github.com/nodemailer/nodemailer\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://github.com/nodemailer/nodemailer/commit/1150d99fba77280df2cfb1885c43df23109a8626\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://github.com/nodemailer/nodemailer/security/advisories/GHSA-mm7p-fcc7-pg87\",\"source\":\"secalert@redhat.com\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-13033\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-11-14T20:00:22.140079Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-11-14T20:00:42.733Z\"}}], \"cna\": {\"title\": \"Nodemailer: nodemailer: email to an unintended domain can occur due to interpretation conflict\", \"metrics\": [{\"other\": {\"type\": \"Red Hat severity rating\", \"content\": {\"value\": \"Moderate\", \"namespace\": \"https://access.redhat.com/security/updates/classification/\"}}}, {\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.5, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}}], \"affected\": [{\"vendor\": \"nodemailer\", \"product\": \"nodemailer\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"7.0.7\", \"versionType\": \"semver\"}], \"packageName\": \"nodemailer\", \"collectionURL\": \"https://github.com/nodemailer/nodemailer\", \"defaultStatus\": \"unaffected\"}, {\"cpes\": [\"cpe:/a:redhat:ceph_storage:8.1::el9\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Ceph Storage 8.1\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"1777566546\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"rhceph/grafana-rhel9\", \"collectionURL\": \"https://catalog.redhat.com/software/containers/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:rhdh:1.9::el9\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Developer Hub 1.9\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"1772573159\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"rhdh/rhdh-hub-rhel9\", \"collectionURL\": \"https://catalog.redhat.com/software/containers/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:acm:2\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Advanced Cluster Management for Kubernetes 2\", \"packageName\": \"rhacm2/acm-grafana-rhel9\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}], \"timeline\": [{\"lang\": \"en\", \"time\": \"2025-10-07T15:03:14.483Z\", \"value\": \"Reported to Red Hat.\"}, {\"lang\": \"en\", \"time\": \"2025-10-07T13:42:02.000Z\", \"value\": \"Made public.\"}], \"datePublic\": \"2025-10-07T13:42:02.000Z\", \"references\": [{\"url\": \"https://access.redhat.com/errata/RHSA-2026:15979\", \"name\": \"RHSA-2026:15979\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2026:3751\", \"name\": \"RHSA-2026:3751\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/security/cve/CVE-2025-13033\", \"tags\": [\"vdb-entry\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=2402179\", \"name\": \"RHBZ#2402179\", \"tags\": [\"issue-tracking\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://github.com/nodemailer/nodemailer\"}, {\"url\": \"https://github.com/nodemailer/nodemailer/commit/1150d99fba77280df2cfb1885c43df23109a8626\"}, {\"url\": \"https://github.com/nodemailer/nodemailer/security/advisories/GHSA-mm7p-fcc7-pg87\"}], \"workarounds\": [{\"lang\": \"en\", \"value\": \"Currently there\u0027s no available mitigation for this flaw.\"}], \"x_generator\": {\"engine\": \"cvelib 1.8.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"A vulnerability was identified in the email parsing library due to improper handling of specially formatted recipient email addresses. An attacker can exploit this flaw by crafting a recipient address that embeds an external address within quotes. This causes the application to misdirect the email to the attacker\u0027s external address instead of the intended internal recipient. This could lead to a significant data leak of sensitive information and allow an attacker to bypass security filters and access controls.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-1286\", \"description\": \"Improper Validation of Syntactic Correctness of Input\"}]}], \"providerMetadata\": {\"orgId\": \"53f830b8-0a3f-465b-8143-3b8a9948e749\", \"shortName\": \"redhat\", \"dateUpdated\": \"2026-05-11T11:26:36.924Z\"}, \"x_redhatCweChain\": \"CWE-1286: Improper Validation of Syntactic Correctness of Input\"}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-13033\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-05-11T11:26:36.924Z\", \"dateReserved\": \"2025-11-11T16:15:03.749Z\", \"assignerOrgId\": \"53f830b8-0a3f-465b-8143-3b8a9948e749\", \"datePublished\": \"2025-11-14T19:37:08.224Z\", \"assignerShortName\": \"redhat\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
GHSA-MM7P-FCC7-PG87
Vulnerability from github – Published: 2025-10-07 13:42 – Updated: 2025-11-17 17:29The email parsing library incorrectly handles quoted local-parts containing @. This leads to misrouting of email recipients, where the parser extracts and routes to an unintended domain instead of the RFC-compliant target.
Payload: "xclow3n@gmail.com x"@internal.domain
Using the following code to send mail
const nodemailer = require("nodemailer");
let transporter = nodemailer.createTransport({
service: "gmail",
auth: {
user: "",
pass: "",
},
});
let mailOptions = {
from: '"Test Sender" <your_email@gmail.com>',
to: "\"xclow3n@gmail.com x\"@internal.domain",
subject: "Hello from Nodemailer",
text: "This is a test email sent using Gmail SMTP and Nodemailer!",
};
transporter.sendMail(mailOptions, (error, info) => {
if (error) {
return console.log("Error: ", error);
}
console.log("Message sent: %s", info.messageId);
});
(async () => {
const parser = await import("@sparser/email-address-parser");
const { EmailAddress, ParsingOptions } = parser.default;
const parsed = EmailAddress.parse(mailOptions.to /*, new ParsingOptions(true) */);
if (!parsed) {
console.error("Invalid email address:", mailOptions.to);
return;
}
console.log("Parsed email:", {
address: `${parsed.localPart}@${parsed.domain}`,
local: parsed.localPart,
domain: parsed.domain,
});
})();
Running the script and seeing how this mail is parsed according to RFC
Parsed email: {
address: '"xclow3n@gmail.com x"@internal.domain',
local: '"xclow3n@gmail.com x"',
domain: 'internal.domain'
}
But the email is sent to xclow3n@gmail.com
Impact:
-
Misdelivery / Data leakage: Email is sent to psres.net instead of test.com.
-
Filter evasion: Logs and anti-spam systems may be bypassed by hiding recipients inside quoted local-parts.
-
Potential compliance issue: Violates RFC 5321/5322 parsing rules.
-
Domain based access control bypass in downstream applications using your library to send mails
Recommendations
-
Fix parser to correctly treat quoted local-parts per RFC 5321/5322.
-
Add strict validation rejecting local-parts containing embedded @ unless fully compliant with quoting.
{
"affected": [
{
"package": {
"ecosystem": "npm",
"name": "nodemailer"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "7.0.7"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2025-13033"
],
"database_specific": {
"cwe_ids": [
"CWE-20",
"CWE-436"
],
"github_reviewed": true,
"github_reviewed_at": "2025-10-07T13:42:02Z",
"nvd_published_at": null,
"severity": "MODERATE"
},
"details": "The email parsing library incorrectly handles quoted local-parts containing @. This leads to misrouting of email recipients, where the parser extracts and routes to an unintended domain instead of the RFC-compliant target.\n\nPayload: `\"xclow3n@gmail.com x\"@internal.domain`\nUsing the following code to send mail\n```\nconst nodemailer = require(\"nodemailer\");\n\nlet transporter = nodemailer.createTransport({\n service: \"gmail\",\n auth: {\n user: \"\",\n pass: \"\",\n },\n});\n\nlet mailOptions = {\n from: \u0027\"Test Sender\" \u003cyour_email@gmail.com\u003e\u0027, \n to: \"\\\"xclow3n@gmail.com x\\\"@internal.domain\",\n subject: \"Hello from Nodemailer\",\n text: \"This is a test email sent using Gmail SMTP and Nodemailer!\",\n};\n\ntransporter.sendMail(mailOptions, (error, info) =\u003e {\n if (error) {\n return console.log(\"Error: \", error);\n }\n console.log(\"Message sent: %s\", info.messageId);\n\n});\n\n\n(async () =\u003e {\n const parser = await import(\"@sparser/email-address-parser\");\n const { EmailAddress, ParsingOptions } = parser.default;\n const parsed = EmailAddress.parse(mailOptions.to /*, new ParsingOptions(true) */);\n\n if (!parsed) {\n console.error(\"Invalid email address:\", mailOptions.to);\n return;\n }\n\n console.log(\"Parsed email:\", {\n address: `${parsed.localPart}@${parsed.domain}`,\n local: parsed.localPart,\n domain: parsed.domain,\n });\n})();\n```\n\nRunning the script and seeing how this mail is parsed according to RFC\n\n```\nParsed email: {\n address: \u0027\"xclow3n@gmail.com x\"@internal.domain\u0027,\n local: \u0027\"xclow3n@gmail.com x\"\u0027,\n domain: \u0027internal.domain\u0027\n}\n```\n\nBut the email is sent to `xclow3n@gmail.com`\n\n\u003cimg width=\"2128\" height=\"439\" alt=\"Image\" src=\"https://github.com/user-attachments/assets/20eb459c-9803-45a2-b30e-5d1177d60a8d\" /\u003e\n\n\n### Impact:\n\n- Misdelivery / Data leakage: Email is sent to psres.net instead of test.com.\n\n- Filter evasion: Logs and anti-spam systems may be bypassed by hiding recipients inside quoted local-parts.\n\n- Potential compliance issue: Violates RFC 5321/5322 parsing rules.\n\n- Domain based access control bypass in downstream applications using your library to send mails\n\n### Recommendations\n\n- Fix parser to correctly treat quoted local-parts per RFC 5321/5322.\n\n- Add strict validation rejecting local-parts containing embedded @ unless fully compliant with quoting.",
"id": "GHSA-mm7p-fcc7-pg87",
"modified": "2025-11-17T17:29:26Z",
"published": "2025-10-07T13:42:02Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/nodemailer/nodemailer/security/advisories/GHSA-mm7p-fcc7-pg87"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-13033"
},
{
"type": "WEB",
"url": "https://github.com/nodemailer/nodemailer/commit/1150d99fba77280df2cfb1885c43df23109a8626"
},
{
"type": "WEB",
"url": "https://access.redhat.com/security/cve/CVE-2025-13033"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402179"
},
{
"type": "PACKAGE",
"url": "https://github.com/nodemailer/nodemailer"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P",
"type": "CVSS_V4"
}
],
"summary": "Nodemailer: Email to an unintended domain can occur due to Interpretation Conflict"
}
GHSA-JJ37-3377-M6VV
Vulnerability from github – Published: 2025-11-14 21:30 – Updated: 2026-05-13 13:45Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of GHSA-mm7p-fcc7-pg87. This link is maintained to preserve external references.
Original Description
A vulnerability was identified in the email parsing library due to improper handling of specially formatted recipient email addresses. An attacker can exploit this flaw by crafting a recipient address that embeds an external address within quotes. This causes the application to misdirect the email to the attacker's external address instead of the intended internal recipient. This could lead to a significant data leak of sensitive information and allow an attacker to bypass security filters and access controls.
{
"affected": [
{
"package": {
"ecosystem": "npm",
"name": "nodemailer"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "7.0.7"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [],
"database_specific": {
"cwe_ids": [
"CWE-1286",
"CWE-436"
],
"github_reviewed": true,
"github_reviewed_at": "2025-11-17T17:17:33Z",
"nvd_published_at": "2025-11-14T20:15:45Z",
"severity": "HIGH"
},
"details": "## Duplicate Advisory\nThis advisory has been withdrawn because it is a duplicate of GHSA-mm7p-fcc7-pg87. This link is maintained to preserve external references.\n\n## Original Description\nA vulnerability was identified in the email parsing library due to improper handling of specially formatted recipient email addresses. An attacker can exploit this flaw by crafting a recipient address that embeds an external address within quotes. This causes the application to misdirect the email to the attacker\u0027s external address instead of the intended internal recipient. This could lead to a significant data leak of sensitive information and allow an attacker to bypass security filters and access controls.",
"id": "GHSA-jj37-3377-m6vv",
"modified": "2026-05-13T13:45:17Z",
"published": "2025-11-14T21:30:29Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/nodemailer/nodemailer/security/advisories/GHSA-mm7p-fcc7-pg87"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-13033"
},
{
"type": "WEB",
"url": "https://github.com/nodemailer/nodemailer/commit/1150d99fba77280df2cfb1885c43df23109a8626"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2026:15979"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2026:3751"
},
{
"type": "WEB",
"url": "https://access.redhat.com/security/cve/CVE-2025-13033"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402179"
},
{
"type": "PACKAGE",
"url": "https://github.com/nodemailer/nodemailer"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
}
],
"summary": "Duplicate Advisory: Nodemailer: Email to an unintended domain can occur due to Interpretation Conflict",
"withdrawn": "2025-11-17T17:17:33Z"
}
RHSA-2026:15979
Vulnerability from csaf_redhat - Published: 2026-05-11 11:23 - Updated: 2026-05-16 14:38A vulnerability was identified in the email parsing library due to improper handling of specially formatted recipient email addresses. An attacker can exploit this flaw by crafting a recipient address that embeds an external address within quotes. This causes the application to misdirect the email to the attacker's external address instead of the intended internal recipient. This could lead to a significant data leak of sensitive information and allow an attacker to bypass security filters and access controls.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:3d4903b8dbe33464c05ce219ee2e945bf1be169efbed73caee5185883c9df508_amd64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:67d65ecfe844febb7afdfcfbdc0a31f3bd9dfb4c3c81f4734a1b146e34d8d5cb_ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:a6a8bbdd49272c632edd96e1598d1e697ba3a1dabb8d36086eced4847de59cbb_s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:c27690e36faf7db08a6d398cce7dbedcfe74848224a179c7278b62315516dd4a_arm64 | — |
Vendor Fix
fix
Workaround
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:02914a917bbea40c35be2cc7dbaf05c5ac1e1bd30b0e82b4ad9a1c58b99a076b_ppc64le | — |
Workaround
|
|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:2ce063cc246e7694adf066c17390b4c8d95719b2786267a9db64390407648410_amd64 | — |
Workaround
|
|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:aeb508e1309d4a811f881f4028e1c370a5431d290aca2c4af5acdf6a58916a7f_arm64 | — |
Workaround
|
|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:fa3c9307038f92e351892be9c73cda40a3bab2038904fabcb97dad5568dcec2d_s390x | — |
Workaround
|
|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:0f37c554cc22c9c89cc4c53739b2ef86e84287486e3f7cdbad10a6e53439d596_s390x | — |
Workaround
|
|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:1a8207fe81e8c5bd63568eddddb41dd0da16d8340c5f5ae3615fe46ae864a163_ppc64le | — |
Workaround
|
|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:9e15073c7782b0194c06e0b420573e49d5719002417faa567c99ee8409ff590d_amd64 | — |
Workaround
|
|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:f76307e201d0b2deaf0aa96bc6b62fc4535c8358b06a8e95ec5a8abf10d2da07_arm64 | — |
Workaround
|
|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:5c496cafb1e21883677c6dcb9fd7392383325b8529b98648af757545dfe59488_s390x | — |
Workaround
|
|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:b2875bcf5aee1175faa2ab1ce163642e17c4948ff5aa76967d008f75b470fc74_amd64 | — |
Workaround
|
|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:df6bf531755753b224999cb9a5f087c96e8a512666589df4763d4a14941a6f5a_ppc64le | — |
Workaround
|
|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:f7e87de708186099c76426f24b53395340a672e282615164bac73afca3f36454_arm64 | — |
Workaround
|
|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:0350448bf1fb15f26c0d092ceb8b0618932f42d30ca4c7c62f2ec1b86c20dd23_ppc64le | — |
Workaround
|
|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:4c8c8ef82f2f2685d76a9535523c4c93485329aa23328a68426e93789f363b53_arm64 | — |
Workaround
|
|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:7fa04ae06b25476b7b2a3f9e21279202571fd8fc5ff5012c980caf3f33edc0a5_s390x | — |
Workaround
|
|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:8b20b6abf0399bbfc970990bc0c5b6dab46c1043ef761519dbbe8213e6fdd169_amd64 | — |
Workaround
|
|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:28aae4d07691c86cdfa9bbfcc7b68e1a3304402ac6c65982bfc0f7945cb9a44e_s390x | — |
Workaround
|
|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:3b78f446debe56d01cd96dc3c3ae225a982ee6abdd7d2fabae553cf4c87e471a_arm64 | — |
Workaround
|
|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:cbc542505b4784050c96b3fb31a4867b5d94c8a6957b54a8cfad03bc16a19578_ppc64le | — |
Workaround
|
|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:e0e44241bde7bfbccea69d06e5fd00ad0a0ab569bef6645687bcadcfc00aa5ef_amd64 | — |
Workaround
|
|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:5ccb9e878551c910e3a300ab8043fdc4788381c9515dc9dcaa965a738d2de059_s390x | — |
Workaround
|
|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:7559ec0119f673e243361d4e457a8e9687beb3af60a4fd608fa211539b9034c1_arm64 | — |
Workaround
|
|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:808082ac26e53bc7f962428d8e67f721654b732eb1d40fc6e272fcb7f045797c_amd64 | — |
Workaround
|
|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:bf282440c8e3ce4d38535bb1efdcbc05f0278647d2fc6e2a13c9c28c0c101f79_ppc64le | — |
Workaround
|
A flaw was found in the SSH Agent servers component (golang.org/x/crypto/ssh/agent). This vulnerability allows a remote attacker to cause a denial of service (DoS) by sending a specially crafted, malformed message during new identity requests. The server fails to validate the size of these messages, leading to an out-of-bounds read that can cause the program to panic and terminate.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:3d4903b8dbe33464c05ce219ee2e945bf1be169efbed73caee5185883c9df508_amd64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:67d65ecfe844febb7afdfcfbdc0a31f3bd9dfb4c3c81f4734a1b146e34d8d5cb_ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:a6a8bbdd49272c632edd96e1598d1e697ba3a1dabb8d36086eced4847de59cbb_s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:c27690e36faf7db08a6d398cce7dbedcfe74848224a179c7278b62315516dd4a_arm64 | — |
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:02914a917bbea40c35be2cc7dbaf05c5ac1e1bd30b0e82b4ad9a1c58b99a076b_ppc64le | — | ||
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:2ce063cc246e7694adf066c17390b4c8d95719b2786267a9db64390407648410_amd64 | — | ||
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:aeb508e1309d4a811f881f4028e1c370a5431d290aca2c4af5acdf6a58916a7f_arm64 | — | ||
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:fa3c9307038f92e351892be9c73cda40a3bab2038904fabcb97dad5568dcec2d_s390x | — | ||
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:0f37c554cc22c9c89cc4c53739b2ef86e84287486e3f7cdbad10a6e53439d596_s390x | — | ||
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:1a8207fe81e8c5bd63568eddddb41dd0da16d8340c5f5ae3615fe46ae864a163_ppc64le | — | ||
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:9e15073c7782b0194c06e0b420573e49d5719002417faa567c99ee8409ff590d_amd64 | — | ||
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:f76307e201d0b2deaf0aa96bc6b62fc4535c8358b06a8e95ec5a8abf10d2da07_arm64 | — | ||
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:5c496cafb1e21883677c6dcb9fd7392383325b8529b98648af757545dfe59488_s390x | — | ||
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:b2875bcf5aee1175faa2ab1ce163642e17c4948ff5aa76967d008f75b470fc74_amd64 | — | ||
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:df6bf531755753b224999cb9a5f087c96e8a512666589df4763d4a14941a6f5a_ppc64le | — | ||
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:f7e87de708186099c76426f24b53395340a672e282615164bac73afca3f36454_arm64 | — | ||
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:0350448bf1fb15f26c0d092ceb8b0618932f42d30ca4c7c62f2ec1b86c20dd23_ppc64le | — | ||
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:4c8c8ef82f2f2685d76a9535523c4c93485329aa23328a68426e93789f363b53_arm64 | — | ||
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:7fa04ae06b25476b7b2a3f9e21279202571fd8fc5ff5012c980caf3f33edc0a5_s390x | — | ||
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:8b20b6abf0399bbfc970990bc0c5b6dab46c1043ef761519dbbe8213e6fdd169_amd64 | — | ||
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:28aae4d07691c86cdfa9bbfcc7b68e1a3304402ac6c65982bfc0f7945cb9a44e_s390x | — | ||
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:3b78f446debe56d01cd96dc3c3ae225a982ee6abdd7d2fabae553cf4c87e471a_arm64 | — | ||
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:cbc542505b4784050c96b3fb31a4867b5d94c8a6957b54a8cfad03bc16a19578_ppc64le | — | ||
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:e0e44241bde7bfbccea69d06e5fd00ad0a0ab569bef6645687bcadcfc00aa5ef_amd64 | — | ||
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:5ccb9e878551c910e3a300ab8043fdc4788381c9515dc9dcaa965a738d2de059_s390x | — | ||
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:7559ec0119f673e243361d4e457a8e9687beb3af60a4fd608fa211539b9034c1_arm64 | — | ||
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:808082ac26e53bc7f962428d8e67f721654b732eb1d40fc6e272fcb7f045797c_amd64 | — | ||
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:bf282440c8e3ce4d38535bb1efdcbc05f0278647d2fc6e2a13c9c28c0c101f79_ppc64le | — |
A flaw was found in golang.org/x/crypto/ssh. An attacker can exploit this vulnerability by sending specially crafted GSSAPI (Generic Security Service Application Program Interface) authentication requests to an SSH (Secure Shell) server. The server fails to validate the number of mechanisms specified in these requests, leading to unbounded memory consumption. This can result in a Denial of Service (DoS), making the SSH server unavailable to legitimate users.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:3d4903b8dbe33464c05ce219ee2e945bf1be169efbed73caee5185883c9df508_amd64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:67d65ecfe844febb7afdfcfbdc0a31f3bd9dfb4c3c81f4734a1b146e34d8d5cb_ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:a6a8bbdd49272c632edd96e1598d1e697ba3a1dabb8d36086eced4847de59cbb_s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:c27690e36faf7db08a6d398cce7dbedcfe74848224a179c7278b62315516dd4a_arm64 | — |
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:02914a917bbea40c35be2cc7dbaf05c5ac1e1bd30b0e82b4ad9a1c58b99a076b_ppc64le | — | ||
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:2ce063cc246e7694adf066c17390b4c8d95719b2786267a9db64390407648410_amd64 | — | ||
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:aeb508e1309d4a811f881f4028e1c370a5431d290aca2c4af5acdf6a58916a7f_arm64 | — | ||
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:fa3c9307038f92e351892be9c73cda40a3bab2038904fabcb97dad5568dcec2d_s390x | — | ||
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:0f37c554cc22c9c89cc4c53739b2ef86e84287486e3f7cdbad10a6e53439d596_s390x | — | ||
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:1a8207fe81e8c5bd63568eddddb41dd0da16d8340c5f5ae3615fe46ae864a163_ppc64le | — | ||
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:9e15073c7782b0194c06e0b420573e49d5719002417faa567c99ee8409ff590d_amd64 | — | ||
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:f76307e201d0b2deaf0aa96bc6b62fc4535c8358b06a8e95ec5a8abf10d2da07_arm64 | — | ||
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:5c496cafb1e21883677c6dcb9fd7392383325b8529b98648af757545dfe59488_s390x | — | ||
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:b2875bcf5aee1175faa2ab1ce163642e17c4948ff5aa76967d008f75b470fc74_amd64 | — | ||
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:df6bf531755753b224999cb9a5f087c96e8a512666589df4763d4a14941a6f5a_ppc64le | — | ||
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:f7e87de708186099c76426f24b53395340a672e282615164bac73afca3f36454_arm64 | — | ||
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:0350448bf1fb15f26c0d092ceb8b0618932f42d30ca4c7c62f2ec1b86c20dd23_ppc64le | — | ||
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:4c8c8ef82f2f2685d76a9535523c4c93485329aa23328a68426e93789f363b53_arm64 | — | ||
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:7fa04ae06b25476b7b2a3f9e21279202571fd8fc5ff5012c980caf3f33edc0a5_s390x | — | ||
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:8b20b6abf0399bbfc970990bc0c5b6dab46c1043ef761519dbbe8213e6fdd169_amd64 | — | ||
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:28aae4d07691c86cdfa9bbfcc7b68e1a3304402ac6c65982bfc0f7945cb9a44e_s390x | — | ||
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:3b78f446debe56d01cd96dc3c3ae225a982ee6abdd7d2fabae553cf4c87e471a_arm64 | — | ||
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:cbc542505b4784050c96b3fb31a4867b5d94c8a6957b54a8cfad03bc16a19578_ppc64le | — | ||
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:e0e44241bde7bfbccea69d06e5fd00ad0a0ab569bef6645687bcadcfc00aa5ef_amd64 | — | ||
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:5ccb9e878551c910e3a300ab8043fdc4788381c9515dc9dcaa965a738d2de059_s390x | — | ||
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:7559ec0119f673e243361d4e457a8e9687beb3af60a4fd608fa211539b9034c1_arm64 | — | ||
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:808082ac26e53bc7f962428d8e67f721654b732eb1d40fc6e272fcb7f045797c_amd64 | — | ||
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:bf282440c8e3ce4d38535bb1efdcbc05f0278647d2fc6e2a13c9c28c0c101f79_ppc64le | — |
A flaw was found in golang. A remote attacker could exploit this vulnerability by providing a specially crafted certificate during the error string construction process within the `HostnameError.Error()` function. This flaw, caused by unbounded string concatenation, leads to excessive resource consumption. Successful exploitation can result in a denial of service (DoS) for the affected system.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:3d4903b8dbe33464c05ce219ee2e945bf1be169efbed73caee5185883c9df508_amd64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:67d65ecfe844febb7afdfcfbdc0a31f3bd9dfb4c3c81f4734a1b146e34d8d5cb_ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:a6a8bbdd49272c632edd96e1598d1e697ba3a1dabb8d36086eced4847de59cbb_s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:c27690e36faf7db08a6d398cce7dbedcfe74848224a179c7278b62315516dd4a_arm64 | — |
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:02914a917bbea40c35be2cc7dbaf05c5ac1e1bd30b0e82b4ad9a1c58b99a076b_ppc64le | — | ||
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:2ce063cc246e7694adf066c17390b4c8d95719b2786267a9db64390407648410_amd64 | — | ||
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:aeb508e1309d4a811f881f4028e1c370a5431d290aca2c4af5acdf6a58916a7f_arm64 | — | ||
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:fa3c9307038f92e351892be9c73cda40a3bab2038904fabcb97dad5568dcec2d_s390x | — | ||
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:0f37c554cc22c9c89cc4c53739b2ef86e84287486e3f7cdbad10a6e53439d596_s390x | — | ||
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:1a8207fe81e8c5bd63568eddddb41dd0da16d8340c5f5ae3615fe46ae864a163_ppc64le | — | ||
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:9e15073c7782b0194c06e0b420573e49d5719002417faa567c99ee8409ff590d_amd64 | — | ||
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:f76307e201d0b2deaf0aa96bc6b62fc4535c8358b06a8e95ec5a8abf10d2da07_arm64 | — | ||
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:5c496cafb1e21883677c6dcb9fd7392383325b8529b98648af757545dfe59488_s390x | — | ||
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:b2875bcf5aee1175faa2ab1ce163642e17c4948ff5aa76967d008f75b470fc74_amd64 | — | ||
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:df6bf531755753b224999cb9a5f087c96e8a512666589df4763d4a14941a6f5a_ppc64le | — | ||
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:f7e87de708186099c76426f24b53395340a672e282615164bac73afca3f36454_arm64 | — | ||
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:0350448bf1fb15f26c0d092ceb8b0618932f42d30ca4c7c62f2ec1b86c20dd23_ppc64le | — | ||
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:4c8c8ef82f2f2685d76a9535523c4c93485329aa23328a68426e93789f363b53_arm64 | — | ||
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:7fa04ae06b25476b7b2a3f9e21279202571fd8fc5ff5012c980caf3f33edc0a5_s390x | — | ||
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:8b20b6abf0399bbfc970990bc0c5b6dab46c1043ef761519dbbe8213e6fdd169_amd64 | — | ||
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:28aae4d07691c86cdfa9bbfcc7b68e1a3304402ac6c65982bfc0f7945cb9a44e_s390x | — | ||
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:3b78f446debe56d01cd96dc3c3ae225a982ee6abdd7d2fabae553cf4c87e471a_arm64 | — | ||
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:cbc542505b4784050c96b3fb31a4867b5d94c8a6957b54a8cfad03bc16a19578_ppc64le | — | ||
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:e0e44241bde7bfbccea69d06e5fd00ad0a0ab569bef6645687bcadcfc00aa5ef_amd64 | — | ||
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:5ccb9e878551c910e3a300ab8043fdc4788381c9515dc9dcaa965a738d2de059_s390x | — | ||
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:7559ec0119f673e243361d4e457a8e9687beb3af60a4fd608fa211539b9034c1_arm64 | — | ||
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:808082ac26e53bc7f962428d8e67f721654b732eb1d40fc6e272fcb7f045797c_amd64 | — | ||
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:bf282440c8e3ce4d38535bb1efdcbc05f0278647d2fc6e2a13c9c28c0c101f79_ppc64le | — |
A prototype pollution flaw has been discovered in the js-yaml npm library. It's possible for an attacker to modify the prototype of the result of a parsed yaml document via prototype pollution (__proto__). All users who parse untrusted yaml documents may be impacted.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:3d4903b8dbe33464c05ce219ee2e945bf1be169efbed73caee5185883c9df508_amd64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:67d65ecfe844febb7afdfcfbdc0a31f3bd9dfb4c3c81f4734a1b146e34d8d5cb_ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:a6a8bbdd49272c632edd96e1598d1e697ba3a1dabb8d36086eced4847de59cbb_s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:c27690e36faf7db08a6d398cce7dbedcfe74848224a179c7278b62315516dd4a_arm64 | — |
Vendor Fix
fix
Workaround
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:02914a917bbea40c35be2cc7dbaf05c5ac1e1bd30b0e82b4ad9a1c58b99a076b_ppc64le | — |
Workaround
|
|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:2ce063cc246e7694adf066c17390b4c8d95719b2786267a9db64390407648410_amd64 | — |
Workaround
|
|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:aeb508e1309d4a811f881f4028e1c370a5431d290aca2c4af5acdf6a58916a7f_arm64 | — |
Workaround
|
|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:fa3c9307038f92e351892be9c73cda40a3bab2038904fabcb97dad5568dcec2d_s390x | — |
Workaround
|
|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:0f37c554cc22c9c89cc4c53739b2ef86e84287486e3f7cdbad10a6e53439d596_s390x | — |
Workaround
|
|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:1a8207fe81e8c5bd63568eddddb41dd0da16d8340c5f5ae3615fe46ae864a163_ppc64le | — |
Workaround
|
|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:9e15073c7782b0194c06e0b420573e49d5719002417faa567c99ee8409ff590d_amd64 | — |
Workaround
|
|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:f76307e201d0b2deaf0aa96bc6b62fc4535c8358b06a8e95ec5a8abf10d2da07_arm64 | — |
Workaround
|
|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:5c496cafb1e21883677c6dcb9fd7392383325b8529b98648af757545dfe59488_s390x | — |
Workaround
|
|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:b2875bcf5aee1175faa2ab1ce163642e17c4948ff5aa76967d008f75b470fc74_amd64 | — |
Workaround
|
|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:df6bf531755753b224999cb9a5f087c96e8a512666589df4763d4a14941a6f5a_ppc64le | — |
Workaround
|
|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:f7e87de708186099c76426f24b53395340a672e282615164bac73afca3f36454_arm64 | — |
Workaround
|
|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:0350448bf1fb15f26c0d092ceb8b0618932f42d30ca4c7c62f2ec1b86c20dd23_ppc64le | — |
Workaround
|
|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:4c8c8ef82f2f2685d76a9535523c4c93485329aa23328a68426e93789f363b53_arm64 | — |
Workaround
|
|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:7fa04ae06b25476b7b2a3f9e21279202571fd8fc5ff5012c980caf3f33edc0a5_s390x | — |
Workaround
|
|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:8b20b6abf0399bbfc970990bc0c5b6dab46c1043ef761519dbbe8213e6fdd169_amd64 | — |
Workaround
|
|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:28aae4d07691c86cdfa9bbfcc7b68e1a3304402ac6c65982bfc0f7945cb9a44e_s390x | — |
Workaround
|
|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:3b78f446debe56d01cd96dc3c3ae225a982ee6abdd7d2fabae553cf4c87e471a_arm64 | — |
Workaround
|
|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:cbc542505b4784050c96b3fb31a4867b5d94c8a6957b54a8cfad03bc16a19578_ppc64le | — |
Workaround
|
|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:e0e44241bde7bfbccea69d06e5fd00ad0a0ab569bef6645687bcadcfc00aa5ef_amd64 | — |
Workaround
|
|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:5ccb9e878551c910e3a300ab8043fdc4788381c9515dc9dcaa965a738d2de059_s390x | — |
Workaround
|
|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:7559ec0119f673e243361d4e457a8e9687beb3af60a4fd608fa211539b9034c1_arm64 | — |
Workaround
|
|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:808082ac26e53bc7f962428d8e67f721654b732eb1d40fc6e272fcb7f045797c_amd64 | — |
Workaround
|
|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:bf282440c8e3ce4d38535bb1efdcbc05f0278647d2fc6e2a13c9c28c0c101f79_ppc64le | — |
Workaround
|
A flaw was found in glob. This vulnerability allows arbitrary command execution via processing files with malicious names when the glob command-line interface (CLI) is used with the -c/--cmd option, enabling shell metacharacters to trigger command injection.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:3d4903b8dbe33464c05ce219ee2e945bf1be169efbed73caee5185883c9df508_amd64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:67d65ecfe844febb7afdfcfbdc0a31f3bd9dfb4c3c81f4734a1b146e34d8d5cb_ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:a6a8bbdd49272c632edd96e1598d1e697ba3a1dabb8d36086eced4847de59cbb_s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:c27690e36faf7db08a6d398cce7dbedcfe74848224a179c7278b62315516dd4a_arm64 | — |
Vendor Fix
fix
Workaround
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:02914a917bbea40c35be2cc7dbaf05c5ac1e1bd30b0e82b4ad9a1c58b99a076b_ppc64le | — |
Workaround
|
|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:2ce063cc246e7694adf066c17390b4c8d95719b2786267a9db64390407648410_amd64 | — |
Workaround
|
|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:aeb508e1309d4a811f881f4028e1c370a5431d290aca2c4af5acdf6a58916a7f_arm64 | — |
Workaround
|
|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:fa3c9307038f92e351892be9c73cda40a3bab2038904fabcb97dad5568dcec2d_s390x | — |
Workaround
|
|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:0f37c554cc22c9c89cc4c53739b2ef86e84287486e3f7cdbad10a6e53439d596_s390x | — |
Workaround
|
|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:1a8207fe81e8c5bd63568eddddb41dd0da16d8340c5f5ae3615fe46ae864a163_ppc64le | — |
Workaround
|
|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:9e15073c7782b0194c06e0b420573e49d5719002417faa567c99ee8409ff590d_amd64 | — |
Workaround
|
|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:f76307e201d0b2deaf0aa96bc6b62fc4535c8358b06a8e95ec5a8abf10d2da07_arm64 | — |
Workaround
|
|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:5c496cafb1e21883677c6dcb9fd7392383325b8529b98648af757545dfe59488_s390x | — |
Workaround
|
|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:b2875bcf5aee1175faa2ab1ce163642e17c4948ff5aa76967d008f75b470fc74_amd64 | — |
Workaround
|
|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:df6bf531755753b224999cb9a5f087c96e8a512666589df4763d4a14941a6f5a_ppc64le | — |
Workaround
|
|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:f7e87de708186099c76426f24b53395340a672e282615164bac73afca3f36454_arm64 | — |
Workaround
|
|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:0350448bf1fb15f26c0d092ceb8b0618932f42d30ca4c7c62f2ec1b86c20dd23_ppc64le | — |
Workaround
|
|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:4c8c8ef82f2f2685d76a9535523c4c93485329aa23328a68426e93789f363b53_arm64 | — |
Workaround
|
|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:7fa04ae06b25476b7b2a3f9e21279202571fd8fc5ff5012c980caf3f33edc0a5_s390x | — |
Workaround
|
|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:8b20b6abf0399bbfc970990bc0c5b6dab46c1043ef761519dbbe8213e6fdd169_amd64 | — |
Workaround
|
|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:28aae4d07691c86cdfa9bbfcc7b68e1a3304402ac6c65982bfc0f7945cb9a44e_s390x | — |
Workaround
|
|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:3b78f446debe56d01cd96dc3c3ae225a982ee6abdd7d2fabae553cf4c87e471a_arm64 | — |
Workaround
|
|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:cbc542505b4784050c96b3fb31a4867b5d94c8a6957b54a8cfad03bc16a19578_ppc64le | — |
Workaround
|
|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:e0e44241bde7bfbccea69d06e5fd00ad0a0ab569bef6645687bcadcfc00aa5ef_amd64 | — |
Workaround
|
|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:5ccb9e878551c910e3a300ab8043fdc4788381c9515dc9dcaa965a738d2de059_s390x | — |
Workaround
|
|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:7559ec0119f673e243361d4e457a8e9687beb3af60a4fd608fa211539b9034c1_arm64 | — |
Workaround
|
|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:808082ac26e53bc7f962428d8e67f721654b732eb1d40fc6e272fcb7f045797c_amd64 | — |
Workaround
|
|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:bf282440c8e3ce4d38535bb1efdcbc05f0278647d2fc6e2a13c9c28c0c101f79_ppc64le | — |
Workaround
|
A flaw was found in Expr, an expression language and expression evaluation for Go. This vulnerability allows a denial of service (DoS) via recursive traversal over user-provided deeply nested or cyclic data structures without enforcing a maximum recursion depth, leading to a stack overflow panic and application crash.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:3d4903b8dbe33464c05ce219ee2e945bf1be169efbed73caee5185883c9df508_amd64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:67d65ecfe844febb7afdfcfbdc0a31f3bd9dfb4c3c81f4734a1b146e34d8d5cb_ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:a6a8bbdd49272c632edd96e1598d1e697ba3a1dabb8d36086eced4847de59cbb_s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:c27690e36faf7db08a6d398cce7dbedcfe74848224a179c7278b62315516dd4a_arm64 | — |
Vendor Fix
fix
Workaround
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:02914a917bbea40c35be2cc7dbaf05c5ac1e1bd30b0e82b4ad9a1c58b99a076b_ppc64le | — |
Workaround
|
|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:2ce063cc246e7694adf066c17390b4c8d95719b2786267a9db64390407648410_amd64 | — |
Workaround
|
|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:aeb508e1309d4a811f881f4028e1c370a5431d290aca2c4af5acdf6a58916a7f_arm64 | — |
Workaround
|
|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:fa3c9307038f92e351892be9c73cda40a3bab2038904fabcb97dad5568dcec2d_s390x | — |
Workaround
|
|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:0f37c554cc22c9c89cc4c53739b2ef86e84287486e3f7cdbad10a6e53439d596_s390x | — |
Workaround
|
|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:1a8207fe81e8c5bd63568eddddb41dd0da16d8340c5f5ae3615fe46ae864a163_ppc64le | — |
Workaround
|
|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:9e15073c7782b0194c06e0b420573e49d5719002417faa567c99ee8409ff590d_amd64 | — |
Workaround
|
|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:f76307e201d0b2deaf0aa96bc6b62fc4535c8358b06a8e95ec5a8abf10d2da07_arm64 | — |
Workaround
|
|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:5c496cafb1e21883677c6dcb9fd7392383325b8529b98648af757545dfe59488_s390x | — |
Workaround
|
|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:b2875bcf5aee1175faa2ab1ce163642e17c4948ff5aa76967d008f75b470fc74_amd64 | — |
Workaround
|
|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:df6bf531755753b224999cb9a5f087c96e8a512666589df4763d4a14941a6f5a_ppc64le | — |
Workaround
|
|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:f7e87de708186099c76426f24b53395340a672e282615164bac73afca3f36454_arm64 | — |
Workaround
|
|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:0350448bf1fb15f26c0d092ceb8b0618932f42d30ca4c7c62f2ec1b86c20dd23_ppc64le | — |
Workaround
|
|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:4c8c8ef82f2f2685d76a9535523c4c93485329aa23328a68426e93789f363b53_arm64 | — |
Workaround
|
|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:7fa04ae06b25476b7b2a3f9e21279202571fd8fc5ff5012c980caf3f33edc0a5_s390x | — |
Workaround
|
|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:8b20b6abf0399bbfc970990bc0c5b6dab46c1043ef761519dbbe8213e6fdd169_amd64 | — |
Workaround
|
|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:28aae4d07691c86cdfa9bbfcc7b68e1a3304402ac6c65982bfc0f7945cb9a44e_s390x | — |
Workaround
|
|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:3b78f446debe56d01cd96dc3c3ae225a982ee6abdd7d2fabae553cf4c87e471a_arm64 | — |
Workaround
|
|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:cbc542505b4784050c96b3fb31a4867b5d94c8a6957b54a8cfad03bc16a19578_ppc64le | — |
Workaround
|
|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:e0e44241bde7bfbccea69d06e5fd00ad0a0ab569bef6645687bcadcfc00aa5ef_amd64 | — |
Workaround
|
|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:5ccb9e878551c910e3a300ab8043fdc4788381c9515dc9dcaa965a738d2de059_s390x | — |
Workaround
|
|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:7559ec0119f673e243361d4e457a8e9687beb3af60a4fd608fa211539b9034c1_arm64 | — |
Workaround
|
|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:808082ac26e53bc7f962428d8e67f721654b732eb1d40fc6e272fcb7f045797c_amd64 | — |
Workaround
|
|
| Unresolved product id: Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:bf282440c8e3ce4d38535bb1efdcbc05f0278647d2fc6e2a13c9c28c0c101f79_ppc64le | — |
Workaround
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "A new version of Red Hat build of Ceph Storage has been released",
"title": "Topic"
},
{
"category": "general",
"text": "The Red Hat Storage Ceph container images are based on the latest ubi9 base image and Ceph 8.1.\nThis release updates to the latest version.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:15979",
"url": "https://access.redhat.com/errata/RHSA-2026:15979"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-13033",
"url": "https://access.redhat.com/security/cve/CVE-2025-13033"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-47914",
"url": "https://access.redhat.com/security/cve/CVE-2025-47914"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-58181",
"url": "https://access.redhat.com/security/cve/CVE-2025-58181"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61729",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-64718",
"url": "https://access.redhat.com/security/cve/CVE-2025-64718"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-64756",
"url": "https://access.redhat.com/security/cve/CVE-2025-64756"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-68156",
"url": "https://access.redhat.com/security/cve/CVE-2025-68156"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/red_hat_ceph_storage/",
"url": "https://docs.redhat.com/en/documentation/red_hat_ceph_storage/"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_15979.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Ceph Storage",
"tracking": {
"current_release_date": "2026-05-16T14:38:29+00:00",
"generator": {
"date": "2026-05-16T14:38:29+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.8.0"
}
},
"id": "RHSA-2026:15979",
"initial_release_date": "2026-05-11T11:23:46+00:00",
"revision_history": [
{
"date": "2026-05-11T11:23:46+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-05-11T11:23:58+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-05-16T14:38:29+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Ceph Storage 8.1",
"product": {
"name": "Red Hat Ceph Storage 8.1",
"product_id": "Red Hat Ceph Storage 8.1",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:ceph_storage:8.1::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat Ceph Storage"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/grafana-rhel9@sha256:3d4903b8dbe33464c05ce219ee2e945bf1be169efbed73caee5185883c9df508_amd64",
"product": {
"name": "registry.redhat.io/rhceph/grafana-rhel9@sha256:3d4903b8dbe33464c05ce219ee2e945bf1be169efbed73caee5185883c9df508_amd64",
"product_id": "registry.redhat.io/rhceph/grafana-rhel9@sha256:3d4903b8dbe33464c05ce219ee2e945bf1be169efbed73caee5185883c9df508_amd64",
"product_identification_helper": {
"purl": "pkg:oci/grafana-rhel9@sha256%3A3d4903b8dbe33464c05ce219ee2e945bf1be169efbed73caee5185883c9df508?arch=amd64\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1777566546"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:8b20b6abf0399bbfc970990bc0c5b6dab46c1043ef761519dbbe8213e6fdd169_amd64",
"product": {
"name": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:8b20b6abf0399bbfc970990bc0c5b6dab46c1043ef761519dbbe8213e6fdd169_amd64",
"product_id": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:8b20b6abf0399bbfc970990bc0c5b6dab46c1043ef761519dbbe8213e6fdd169_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rhceph-haproxy-rhel9@sha256%3A8b20b6abf0399bbfc970990bc0c5b6dab46c1043ef761519dbbe8213e6fdd169?arch=amd64\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1777566519"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:2ce063cc246e7694adf066c17390b4c8d95719b2786267a9db64390407648410_amd64",
"product": {
"name": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:2ce063cc246e7694adf066c17390b4c8d95719b2786267a9db64390407648410_amd64",
"product_id": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:2ce063cc246e7694adf066c17390b4c8d95719b2786267a9db64390407648410_amd64",
"product_identification_helper": {
"purl": "pkg:oci/keepalived-rhel9@sha256%3A2ce063cc246e7694adf066c17390b4c8d95719b2786267a9db64390407648410?arch=amd64\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1777566772"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:9e15073c7782b0194c06e0b420573e49d5719002417faa567c99ee8409ff590d_amd64",
"product": {
"name": "registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:9e15073c7782b0194c06e0b420573e49d5719002417faa567c99ee8409ff590d_amd64",
"product_id": "registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:9e15073c7782b0194c06e0b420573e49d5719002417faa567c99ee8409ff590d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/oauth2-proxy-rhel9@sha256%3A9e15073c7782b0194c06e0b420573e49d5719002417faa567c99ee8409ff590d?arch=amd64\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1777566148"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:e0e44241bde7bfbccea69d06e5fd00ad0a0ab569bef6645687bcadcfc00aa5ef_amd64",
"product": {
"name": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:e0e44241bde7bfbccea69d06e5fd00ad0a0ab569bef6645687bcadcfc00aa5ef_amd64",
"product_id": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:e0e44241bde7bfbccea69d06e5fd00ad0a0ab569bef6645687bcadcfc00aa5ef_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rhceph-promtail-rhel9@sha256%3Ae0e44241bde7bfbccea69d06e5fd00ad0a0ab569bef6645687bcadcfc00aa5ef?arch=amd64\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1777566201"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:b2875bcf5aee1175faa2ab1ce163642e17c4948ff5aa76967d008f75b470fc74_amd64",
"product": {
"name": "registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:b2875bcf5aee1175faa2ab1ce163642e17c4948ff5aa76967d008f75b470fc74_amd64",
"product_id": "registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:b2875bcf5aee1175faa2ab1ce163642e17c4948ff5aa76967d008f75b470fc74_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rhceph-8-rhel9@sha256%3Ab2875bcf5aee1175faa2ab1ce163642e17c4948ff5aa76967d008f75b470fc74?arch=amd64\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1778049929"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:808082ac26e53bc7f962428d8e67f721654b732eb1d40fc6e272fcb7f045797c_amd64",
"product": {
"name": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:808082ac26e53bc7f962428d8e67f721654b732eb1d40fc6e272fcb7f045797c_amd64",
"product_id": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:808082ac26e53bc7f962428d8e67f721654b732eb1d40fc6e272fcb7f045797c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/snmp-notifier-rhel9@sha256%3A808082ac26e53bc7f962428d8e67f721654b732eb1d40fc6e272fcb7f045797c?arch=amd64\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1777567370"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/grafana-rhel9@sha256:c27690e36faf7db08a6d398cce7dbedcfe74848224a179c7278b62315516dd4a_arm64",
"product": {
"name": "registry.redhat.io/rhceph/grafana-rhel9@sha256:c27690e36faf7db08a6d398cce7dbedcfe74848224a179c7278b62315516dd4a_arm64",
"product_id": "registry.redhat.io/rhceph/grafana-rhel9@sha256:c27690e36faf7db08a6d398cce7dbedcfe74848224a179c7278b62315516dd4a_arm64",
"product_identification_helper": {
"purl": "pkg:oci/grafana-rhel9@sha256%3Ac27690e36faf7db08a6d398cce7dbedcfe74848224a179c7278b62315516dd4a?arch=arm64\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1777566546"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:4c8c8ef82f2f2685d76a9535523c4c93485329aa23328a68426e93789f363b53_arm64",
"product": {
"name": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:4c8c8ef82f2f2685d76a9535523c4c93485329aa23328a68426e93789f363b53_arm64",
"product_id": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:4c8c8ef82f2f2685d76a9535523c4c93485329aa23328a68426e93789f363b53_arm64",
"product_identification_helper": {
"purl": "pkg:oci/rhceph-haproxy-rhel9@sha256%3A4c8c8ef82f2f2685d76a9535523c4c93485329aa23328a68426e93789f363b53?arch=arm64\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1777566519"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:aeb508e1309d4a811f881f4028e1c370a5431d290aca2c4af5acdf6a58916a7f_arm64",
"product": {
"name": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:aeb508e1309d4a811f881f4028e1c370a5431d290aca2c4af5acdf6a58916a7f_arm64",
"product_id": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:aeb508e1309d4a811f881f4028e1c370a5431d290aca2c4af5acdf6a58916a7f_arm64",
"product_identification_helper": {
"purl": "pkg:oci/keepalived-rhel9@sha256%3Aaeb508e1309d4a811f881f4028e1c370a5431d290aca2c4af5acdf6a58916a7f?arch=arm64\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1777566772"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:f76307e201d0b2deaf0aa96bc6b62fc4535c8358b06a8e95ec5a8abf10d2da07_arm64",
"product": {
"name": "registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:f76307e201d0b2deaf0aa96bc6b62fc4535c8358b06a8e95ec5a8abf10d2da07_arm64",
"product_id": "registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:f76307e201d0b2deaf0aa96bc6b62fc4535c8358b06a8e95ec5a8abf10d2da07_arm64",
"product_identification_helper": {
"purl": "pkg:oci/oauth2-proxy-rhel9@sha256%3Af76307e201d0b2deaf0aa96bc6b62fc4535c8358b06a8e95ec5a8abf10d2da07?arch=arm64\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1777566148"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:3b78f446debe56d01cd96dc3c3ae225a982ee6abdd7d2fabae553cf4c87e471a_arm64",
"product": {
"name": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:3b78f446debe56d01cd96dc3c3ae225a982ee6abdd7d2fabae553cf4c87e471a_arm64",
"product_id": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:3b78f446debe56d01cd96dc3c3ae225a982ee6abdd7d2fabae553cf4c87e471a_arm64",
"product_identification_helper": {
"purl": "pkg:oci/rhceph-promtail-rhel9@sha256%3A3b78f446debe56d01cd96dc3c3ae225a982ee6abdd7d2fabae553cf4c87e471a?arch=arm64\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1777566201"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:f7e87de708186099c76426f24b53395340a672e282615164bac73afca3f36454_arm64",
"product": {
"name": "registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:f7e87de708186099c76426f24b53395340a672e282615164bac73afca3f36454_arm64",
"product_id": "registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:f7e87de708186099c76426f24b53395340a672e282615164bac73afca3f36454_arm64",
"product_identification_helper": {
"purl": "pkg:oci/rhceph-8-rhel9@sha256%3Af7e87de708186099c76426f24b53395340a672e282615164bac73afca3f36454?arch=arm64\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1778049929"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:7559ec0119f673e243361d4e457a8e9687beb3af60a4fd608fa211539b9034c1_arm64",
"product": {
"name": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:7559ec0119f673e243361d4e457a8e9687beb3af60a4fd608fa211539b9034c1_arm64",
"product_id": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:7559ec0119f673e243361d4e457a8e9687beb3af60a4fd608fa211539b9034c1_arm64",
"product_identification_helper": {
"purl": "pkg:oci/snmp-notifier-rhel9@sha256%3A7559ec0119f673e243361d4e457a8e9687beb3af60a4fd608fa211539b9034c1?arch=arm64\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1777567370"
}
}
}
],
"category": "architecture",
"name": "arm64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/grafana-rhel9@sha256:a6a8bbdd49272c632edd96e1598d1e697ba3a1dabb8d36086eced4847de59cbb_s390x",
"product": {
"name": "registry.redhat.io/rhceph/grafana-rhel9@sha256:a6a8bbdd49272c632edd96e1598d1e697ba3a1dabb8d36086eced4847de59cbb_s390x",
"product_id": "registry.redhat.io/rhceph/grafana-rhel9@sha256:a6a8bbdd49272c632edd96e1598d1e697ba3a1dabb8d36086eced4847de59cbb_s390x",
"product_identification_helper": {
"purl": "pkg:oci/grafana-rhel9@sha256%3Aa6a8bbdd49272c632edd96e1598d1e697ba3a1dabb8d36086eced4847de59cbb?arch=s390x\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1777566546"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:7fa04ae06b25476b7b2a3f9e21279202571fd8fc5ff5012c980caf3f33edc0a5_s390x",
"product": {
"name": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:7fa04ae06b25476b7b2a3f9e21279202571fd8fc5ff5012c980caf3f33edc0a5_s390x",
"product_id": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:7fa04ae06b25476b7b2a3f9e21279202571fd8fc5ff5012c980caf3f33edc0a5_s390x",
"product_identification_helper": {
"purl": "pkg:oci/rhceph-haproxy-rhel9@sha256%3A7fa04ae06b25476b7b2a3f9e21279202571fd8fc5ff5012c980caf3f33edc0a5?arch=s390x\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1777566519"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:fa3c9307038f92e351892be9c73cda40a3bab2038904fabcb97dad5568dcec2d_s390x",
"product": {
"name": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:fa3c9307038f92e351892be9c73cda40a3bab2038904fabcb97dad5568dcec2d_s390x",
"product_id": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:fa3c9307038f92e351892be9c73cda40a3bab2038904fabcb97dad5568dcec2d_s390x",
"product_identification_helper": {
"purl": "pkg:oci/keepalived-rhel9@sha256%3Afa3c9307038f92e351892be9c73cda40a3bab2038904fabcb97dad5568dcec2d?arch=s390x\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1777566772"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:0f37c554cc22c9c89cc4c53739b2ef86e84287486e3f7cdbad10a6e53439d596_s390x",
"product": {
"name": "registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:0f37c554cc22c9c89cc4c53739b2ef86e84287486e3f7cdbad10a6e53439d596_s390x",
"product_id": "registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:0f37c554cc22c9c89cc4c53739b2ef86e84287486e3f7cdbad10a6e53439d596_s390x",
"product_identification_helper": {
"purl": "pkg:oci/oauth2-proxy-rhel9@sha256%3A0f37c554cc22c9c89cc4c53739b2ef86e84287486e3f7cdbad10a6e53439d596?arch=s390x\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1777566148"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:28aae4d07691c86cdfa9bbfcc7b68e1a3304402ac6c65982bfc0f7945cb9a44e_s390x",
"product": {
"name": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:28aae4d07691c86cdfa9bbfcc7b68e1a3304402ac6c65982bfc0f7945cb9a44e_s390x",
"product_id": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:28aae4d07691c86cdfa9bbfcc7b68e1a3304402ac6c65982bfc0f7945cb9a44e_s390x",
"product_identification_helper": {
"purl": "pkg:oci/rhceph-promtail-rhel9@sha256%3A28aae4d07691c86cdfa9bbfcc7b68e1a3304402ac6c65982bfc0f7945cb9a44e?arch=s390x\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1777566201"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:5c496cafb1e21883677c6dcb9fd7392383325b8529b98648af757545dfe59488_s390x",
"product": {
"name": "registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:5c496cafb1e21883677c6dcb9fd7392383325b8529b98648af757545dfe59488_s390x",
"product_id": "registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:5c496cafb1e21883677c6dcb9fd7392383325b8529b98648af757545dfe59488_s390x",
"product_identification_helper": {
"purl": "pkg:oci/rhceph-8-rhel9@sha256%3A5c496cafb1e21883677c6dcb9fd7392383325b8529b98648af757545dfe59488?arch=s390x\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1778049929"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:5ccb9e878551c910e3a300ab8043fdc4788381c9515dc9dcaa965a738d2de059_s390x",
"product": {
"name": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:5ccb9e878551c910e3a300ab8043fdc4788381c9515dc9dcaa965a738d2de059_s390x",
"product_id": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:5ccb9e878551c910e3a300ab8043fdc4788381c9515dc9dcaa965a738d2de059_s390x",
"product_identification_helper": {
"purl": "pkg:oci/snmp-notifier-rhel9@sha256%3A5ccb9e878551c910e3a300ab8043fdc4788381c9515dc9dcaa965a738d2de059?arch=s390x\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1777567370"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/grafana-rhel9@sha256:67d65ecfe844febb7afdfcfbdc0a31f3bd9dfb4c3c81f4734a1b146e34d8d5cb_ppc64le",
"product": {
"name": "registry.redhat.io/rhceph/grafana-rhel9@sha256:67d65ecfe844febb7afdfcfbdc0a31f3bd9dfb4c3c81f4734a1b146e34d8d5cb_ppc64le",
"product_id": "registry.redhat.io/rhceph/grafana-rhel9@sha256:67d65ecfe844febb7afdfcfbdc0a31f3bd9dfb4c3c81f4734a1b146e34d8d5cb_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/grafana-rhel9@sha256%3A67d65ecfe844febb7afdfcfbdc0a31f3bd9dfb4c3c81f4734a1b146e34d8d5cb?arch=ppc64le\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1777566546"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:0350448bf1fb15f26c0d092ceb8b0618932f42d30ca4c7c62f2ec1b86c20dd23_ppc64le",
"product": {
"name": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:0350448bf1fb15f26c0d092ceb8b0618932f42d30ca4c7c62f2ec1b86c20dd23_ppc64le",
"product_id": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:0350448bf1fb15f26c0d092ceb8b0618932f42d30ca4c7c62f2ec1b86c20dd23_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/rhceph-haproxy-rhel9@sha256%3A0350448bf1fb15f26c0d092ceb8b0618932f42d30ca4c7c62f2ec1b86c20dd23?arch=ppc64le\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1777566519"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:02914a917bbea40c35be2cc7dbaf05c5ac1e1bd30b0e82b4ad9a1c58b99a076b_ppc64le",
"product": {
"name": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:02914a917bbea40c35be2cc7dbaf05c5ac1e1bd30b0e82b4ad9a1c58b99a076b_ppc64le",
"product_id": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:02914a917bbea40c35be2cc7dbaf05c5ac1e1bd30b0e82b4ad9a1c58b99a076b_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/keepalived-rhel9@sha256%3A02914a917bbea40c35be2cc7dbaf05c5ac1e1bd30b0e82b4ad9a1c58b99a076b?arch=ppc64le\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1777566772"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:1a8207fe81e8c5bd63568eddddb41dd0da16d8340c5f5ae3615fe46ae864a163_ppc64le",
"product": {
"name": "registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:1a8207fe81e8c5bd63568eddddb41dd0da16d8340c5f5ae3615fe46ae864a163_ppc64le",
"product_id": "registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:1a8207fe81e8c5bd63568eddddb41dd0da16d8340c5f5ae3615fe46ae864a163_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/oauth2-proxy-rhel9@sha256%3A1a8207fe81e8c5bd63568eddddb41dd0da16d8340c5f5ae3615fe46ae864a163?arch=ppc64le\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1777566148"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:cbc542505b4784050c96b3fb31a4867b5d94c8a6957b54a8cfad03bc16a19578_ppc64le",
"product": {
"name": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:cbc542505b4784050c96b3fb31a4867b5d94c8a6957b54a8cfad03bc16a19578_ppc64le",
"product_id": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:cbc542505b4784050c96b3fb31a4867b5d94c8a6957b54a8cfad03bc16a19578_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/rhceph-promtail-rhel9@sha256%3Acbc542505b4784050c96b3fb31a4867b5d94c8a6957b54a8cfad03bc16a19578?arch=ppc64le\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1777566201"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:df6bf531755753b224999cb9a5f087c96e8a512666589df4763d4a14941a6f5a_ppc64le",
"product": {
"name": "registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:df6bf531755753b224999cb9a5f087c96e8a512666589df4763d4a14941a6f5a_ppc64le",
"product_id": "registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:df6bf531755753b224999cb9a5f087c96e8a512666589df4763d4a14941a6f5a_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/rhceph-8-rhel9@sha256%3Adf6bf531755753b224999cb9a5f087c96e8a512666589df4763d4a14941a6f5a?arch=ppc64le\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1778049929"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:bf282440c8e3ce4d38535bb1efdcbc05f0278647d2fc6e2a13c9c28c0c101f79_ppc64le",
"product": {
"name": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:bf282440c8e3ce4d38535bb1efdcbc05f0278647d2fc6e2a13c9c28c0c101f79_ppc64le",
"product_id": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:bf282440c8e3ce4d38535bb1efdcbc05f0278647d2fc6e2a13c9c28c0c101f79_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/snmp-notifier-rhel9@sha256%3Abf282440c8e3ce4d38535bb1efdcbc05f0278647d2fc6e2a13c9c28c0c101f79?arch=ppc64le\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1777567370"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/grafana-rhel9@sha256:3d4903b8dbe33464c05ce219ee2e945bf1be169efbed73caee5185883c9df508_amd64 as a component of Red Hat Ceph Storage 8.1",
"product_id": "Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:3d4903b8dbe33464c05ce219ee2e945bf1be169efbed73caee5185883c9df508_amd64"
},
"product_reference": "registry.redhat.io/rhceph/grafana-rhel9@sha256:3d4903b8dbe33464c05ce219ee2e945bf1be169efbed73caee5185883c9df508_amd64",
"relates_to_product_reference": "Red Hat Ceph Storage 8.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/grafana-rhel9@sha256:67d65ecfe844febb7afdfcfbdc0a31f3bd9dfb4c3c81f4734a1b146e34d8d5cb_ppc64le as a component of Red Hat Ceph Storage 8.1",
"product_id": "Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:67d65ecfe844febb7afdfcfbdc0a31f3bd9dfb4c3c81f4734a1b146e34d8d5cb_ppc64le"
},
"product_reference": "registry.redhat.io/rhceph/grafana-rhel9@sha256:67d65ecfe844febb7afdfcfbdc0a31f3bd9dfb4c3c81f4734a1b146e34d8d5cb_ppc64le",
"relates_to_product_reference": "Red Hat Ceph Storage 8.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/grafana-rhel9@sha256:a6a8bbdd49272c632edd96e1598d1e697ba3a1dabb8d36086eced4847de59cbb_s390x as a component of Red Hat Ceph Storage 8.1",
"product_id": "Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:a6a8bbdd49272c632edd96e1598d1e697ba3a1dabb8d36086eced4847de59cbb_s390x"
},
"product_reference": "registry.redhat.io/rhceph/grafana-rhel9@sha256:a6a8bbdd49272c632edd96e1598d1e697ba3a1dabb8d36086eced4847de59cbb_s390x",
"relates_to_product_reference": "Red Hat Ceph Storage 8.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/grafana-rhel9@sha256:c27690e36faf7db08a6d398cce7dbedcfe74848224a179c7278b62315516dd4a_arm64 as a component of Red Hat Ceph Storage 8.1",
"product_id": "Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:c27690e36faf7db08a6d398cce7dbedcfe74848224a179c7278b62315516dd4a_arm64"
},
"product_reference": "registry.redhat.io/rhceph/grafana-rhel9@sha256:c27690e36faf7db08a6d398cce7dbedcfe74848224a179c7278b62315516dd4a_arm64",
"relates_to_product_reference": "Red Hat Ceph Storage 8.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:02914a917bbea40c35be2cc7dbaf05c5ac1e1bd30b0e82b4ad9a1c58b99a076b_ppc64le as a component of Red Hat Ceph Storage 8.1",
"product_id": "Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:02914a917bbea40c35be2cc7dbaf05c5ac1e1bd30b0e82b4ad9a1c58b99a076b_ppc64le"
},
"product_reference": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:02914a917bbea40c35be2cc7dbaf05c5ac1e1bd30b0e82b4ad9a1c58b99a076b_ppc64le",
"relates_to_product_reference": "Red Hat Ceph Storage 8.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:2ce063cc246e7694adf066c17390b4c8d95719b2786267a9db64390407648410_amd64 as a component of Red Hat Ceph Storage 8.1",
"product_id": "Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:2ce063cc246e7694adf066c17390b4c8d95719b2786267a9db64390407648410_amd64"
},
"product_reference": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:2ce063cc246e7694adf066c17390b4c8d95719b2786267a9db64390407648410_amd64",
"relates_to_product_reference": "Red Hat Ceph Storage 8.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:aeb508e1309d4a811f881f4028e1c370a5431d290aca2c4af5acdf6a58916a7f_arm64 as a component of Red Hat Ceph Storage 8.1",
"product_id": "Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:aeb508e1309d4a811f881f4028e1c370a5431d290aca2c4af5acdf6a58916a7f_arm64"
},
"product_reference": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:aeb508e1309d4a811f881f4028e1c370a5431d290aca2c4af5acdf6a58916a7f_arm64",
"relates_to_product_reference": "Red Hat Ceph Storage 8.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:fa3c9307038f92e351892be9c73cda40a3bab2038904fabcb97dad5568dcec2d_s390x as a component of Red Hat Ceph Storage 8.1",
"product_id": "Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:fa3c9307038f92e351892be9c73cda40a3bab2038904fabcb97dad5568dcec2d_s390x"
},
"product_reference": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:fa3c9307038f92e351892be9c73cda40a3bab2038904fabcb97dad5568dcec2d_s390x",
"relates_to_product_reference": "Red Hat Ceph Storage 8.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:0f37c554cc22c9c89cc4c53739b2ef86e84287486e3f7cdbad10a6e53439d596_s390x as a component of Red Hat Ceph Storage 8.1",
"product_id": "Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:0f37c554cc22c9c89cc4c53739b2ef86e84287486e3f7cdbad10a6e53439d596_s390x"
},
"product_reference": "registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:0f37c554cc22c9c89cc4c53739b2ef86e84287486e3f7cdbad10a6e53439d596_s390x",
"relates_to_product_reference": "Red Hat Ceph Storage 8.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:1a8207fe81e8c5bd63568eddddb41dd0da16d8340c5f5ae3615fe46ae864a163_ppc64le as a component of Red Hat Ceph Storage 8.1",
"product_id": "Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:1a8207fe81e8c5bd63568eddddb41dd0da16d8340c5f5ae3615fe46ae864a163_ppc64le"
},
"product_reference": "registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:1a8207fe81e8c5bd63568eddddb41dd0da16d8340c5f5ae3615fe46ae864a163_ppc64le",
"relates_to_product_reference": "Red Hat Ceph Storage 8.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:9e15073c7782b0194c06e0b420573e49d5719002417faa567c99ee8409ff590d_amd64 as a component of Red Hat Ceph Storage 8.1",
"product_id": "Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:9e15073c7782b0194c06e0b420573e49d5719002417faa567c99ee8409ff590d_amd64"
},
"product_reference": "registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:9e15073c7782b0194c06e0b420573e49d5719002417faa567c99ee8409ff590d_amd64",
"relates_to_product_reference": "Red Hat Ceph Storage 8.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:f76307e201d0b2deaf0aa96bc6b62fc4535c8358b06a8e95ec5a8abf10d2da07_arm64 as a component of Red Hat Ceph Storage 8.1",
"product_id": "Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:f76307e201d0b2deaf0aa96bc6b62fc4535c8358b06a8e95ec5a8abf10d2da07_arm64"
},
"product_reference": "registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:f76307e201d0b2deaf0aa96bc6b62fc4535c8358b06a8e95ec5a8abf10d2da07_arm64",
"relates_to_product_reference": "Red Hat Ceph Storage 8.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:5c496cafb1e21883677c6dcb9fd7392383325b8529b98648af757545dfe59488_s390x as a component of Red Hat Ceph Storage 8.1",
"product_id": "Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:5c496cafb1e21883677c6dcb9fd7392383325b8529b98648af757545dfe59488_s390x"
},
"product_reference": "registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:5c496cafb1e21883677c6dcb9fd7392383325b8529b98648af757545dfe59488_s390x",
"relates_to_product_reference": "Red Hat Ceph Storage 8.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:b2875bcf5aee1175faa2ab1ce163642e17c4948ff5aa76967d008f75b470fc74_amd64 as a component of Red Hat Ceph Storage 8.1",
"product_id": "Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:b2875bcf5aee1175faa2ab1ce163642e17c4948ff5aa76967d008f75b470fc74_amd64"
},
"product_reference": "registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:b2875bcf5aee1175faa2ab1ce163642e17c4948ff5aa76967d008f75b470fc74_amd64",
"relates_to_product_reference": "Red Hat Ceph Storage 8.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:df6bf531755753b224999cb9a5f087c96e8a512666589df4763d4a14941a6f5a_ppc64le as a component of Red Hat Ceph Storage 8.1",
"product_id": "Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:df6bf531755753b224999cb9a5f087c96e8a512666589df4763d4a14941a6f5a_ppc64le"
},
"product_reference": "registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:df6bf531755753b224999cb9a5f087c96e8a512666589df4763d4a14941a6f5a_ppc64le",
"relates_to_product_reference": "Red Hat Ceph Storage 8.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:f7e87de708186099c76426f24b53395340a672e282615164bac73afca3f36454_arm64 as a component of Red Hat Ceph Storage 8.1",
"product_id": "Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:f7e87de708186099c76426f24b53395340a672e282615164bac73afca3f36454_arm64"
},
"product_reference": "registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:f7e87de708186099c76426f24b53395340a672e282615164bac73afca3f36454_arm64",
"relates_to_product_reference": "Red Hat Ceph Storage 8.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:0350448bf1fb15f26c0d092ceb8b0618932f42d30ca4c7c62f2ec1b86c20dd23_ppc64le as a component of Red Hat Ceph Storage 8.1",
"product_id": "Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:0350448bf1fb15f26c0d092ceb8b0618932f42d30ca4c7c62f2ec1b86c20dd23_ppc64le"
},
"product_reference": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:0350448bf1fb15f26c0d092ceb8b0618932f42d30ca4c7c62f2ec1b86c20dd23_ppc64le",
"relates_to_product_reference": "Red Hat Ceph Storage 8.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:4c8c8ef82f2f2685d76a9535523c4c93485329aa23328a68426e93789f363b53_arm64 as a component of Red Hat Ceph Storage 8.1",
"product_id": "Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:4c8c8ef82f2f2685d76a9535523c4c93485329aa23328a68426e93789f363b53_arm64"
},
"product_reference": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:4c8c8ef82f2f2685d76a9535523c4c93485329aa23328a68426e93789f363b53_arm64",
"relates_to_product_reference": "Red Hat Ceph Storage 8.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:7fa04ae06b25476b7b2a3f9e21279202571fd8fc5ff5012c980caf3f33edc0a5_s390x as a component of Red Hat Ceph Storage 8.1",
"product_id": "Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:7fa04ae06b25476b7b2a3f9e21279202571fd8fc5ff5012c980caf3f33edc0a5_s390x"
},
"product_reference": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:7fa04ae06b25476b7b2a3f9e21279202571fd8fc5ff5012c980caf3f33edc0a5_s390x",
"relates_to_product_reference": "Red Hat Ceph Storage 8.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:8b20b6abf0399bbfc970990bc0c5b6dab46c1043ef761519dbbe8213e6fdd169_amd64 as a component of Red Hat Ceph Storage 8.1",
"product_id": "Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:8b20b6abf0399bbfc970990bc0c5b6dab46c1043ef761519dbbe8213e6fdd169_amd64"
},
"product_reference": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:8b20b6abf0399bbfc970990bc0c5b6dab46c1043ef761519dbbe8213e6fdd169_amd64",
"relates_to_product_reference": "Red Hat Ceph Storage 8.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:28aae4d07691c86cdfa9bbfcc7b68e1a3304402ac6c65982bfc0f7945cb9a44e_s390x as a component of Red Hat Ceph Storage 8.1",
"product_id": "Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:28aae4d07691c86cdfa9bbfcc7b68e1a3304402ac6c65982bfc0f7945cb9a44e_s390x"
},
"product_reference": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:28aae4d07691c86cdfa9bbfcc7b68e1a3304402ac6c65982bfc0f7945cb9a44e_s390x",
"relates_to_product_reference": "Red Hat Ceph Storage 8.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:3b78f446debe56d01cd96dc3c3ae225a982ee6abdd7d2fabae553cf4c87e471a_arm64 as a component of Red Hat Ceph Storage 8.1",
"product_id": "Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:3b78f446debe56d01cd96dc3c3ae225a982ee6abdd7d2fabae553cf4c87e471a_arm64"
},
"product_reference": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:3b78f446debe56d01cd96dc3c3ae225a982ee6abdd7d2fabae553cf4c87e471a_arm64",
"relates_to_product_reference": "Red Hat Ceph Storage 8.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:cbc542505b4784050c96b3fb31a4867b5d94c8a6957b54a8cfad03bc16a19578_ppc64le as a component of Red Hat Ceph Storage 8.1",
"product_id": "Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:cbc542505b4784050c96b3fb31a4867b5d94c8a6957b54a8cfad03bc16a19578_ppc64le"
},
"product_reference": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:cbc542505b4784050c96b3fb31a4867b5d94c8a6957b54a8cfad03bc16a19578_ppc64le",
"relates_to_product_reference": "Red Hat Ceph Storage 8.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:e0e44241bde7bfbccea69d06e5fd00ad0a0ab569bef6645687bcadcfc00aa5ef_amd64 as a component of Red Hat Ceph Storage 8.1",
"product_id": "Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:e0e44241bde7bfbccea69d06e5fd00ad0a0ab569bef6645687bcadcfc00aa5ef_amd64"
},
"product_reference": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:e0e44241bde7bfbccea69d06e5fd00ad0a0ab569bef6645687bcadcfc00aa5ef_amd64",
"relates_to_product_reference": "Red Hat Ceph Storage 8.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:5ccb9e878551c910e3a300ab8043fdc4788381c9515dc9dcaa965a738d2de059_s390x as a component of Red Hat Ceph Storage 8.1",
"product_id": "Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:5ccb9e878551c910e3a300ab8043fdc4788381c9515dc9dcaa965a738d2de059_s390x"
},
"product_reference": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:5ccb9e878551c910e3a300ab8043fdc4788381c9515dc9dcaa965a738d2de059_s390x",
"relates_to_product_reference": "Red Hat Ceph Storage 8.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:7559ec0119f673e243361d4e457a8e9687beb3af60a4fd608fa211539b9034c1_arm64 as a component of Red Hat Ceph Storage 8.1",
"product_id": "Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:7559ec0119f673e243361d4e457a8e9687beb3af60a4fd608fa211539b9034c1_arm64"
},
"product_reference": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:7559ec0119f673e243361d4e457a8e9687beb3af60a4fd608fa211539b9034c1_arm64",
"relates_to_product_reference": "Red Hat Ceph Storage 8.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:808082ac26e53bc7f962428d8e67f721654b732eb1d40fc6e272fcb7f045797c_amd64 as a component of Red Hat Ceph Storage 8.1",
"product_id": "Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:808082ac26e53bc7f962428d8e67f721654b732eb1d40fc6e272fcb7f045797c_amd64"
},
"product_reference": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:808082ac26e53bc7f962428d8e67f721654b732eb1d40fc6e272fcb7f045797c_amd64",
"relates_to_product_reference": "Red Hat Ceph Storage 8.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:bf282440c8e3ce4d38535bb1efdcbc05f0278647d2fc6e2a13c9c28c0c101f79_ppc64le as a component of Red Hat Ceph Storage 8.1",
"product_id": "Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:bf282440c8e3ce4d38535bb1efdcbc05f0278647d2fc6e2a13c9c28c0c101f79_ppc64le"
},
"product_reference": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:bf282440c8e3ce4d38535bb1efdcbc05f0278647d2fc6e2a13c9c28c0c101f79_ppc64le",
"relates_to_product_reference": "Red Hat Ceph Storage 8.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-13033",
"cwe": {
"id": "CWE-1286",
"name": "Improper Validation of Syntactic Correctness of Input"
},
"discovery_date": "2025-10-07T15:03:14.483722+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:02914a917bbea40c35be2cc7dbaf05c5ac1e1bd30b0e82b4ad9a1c58b99a076b_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:2ce063cc246e7694adf066c17390b4c8d95719b2786267a9db64390407648410_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:aeb508e1309d4a811f881f4028e1c370a5431d290aca2c4af5acdf6a58916a7f_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:fa3c9307038f92e351892be9c73cda40a3bab2038904fabcb97dad5568dcec2d_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:0f37c554cc22c9c89cc4c53739b2ef86e84287486e3f7cdbad10a6e53439d596_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:1a8207fe81e8c5bd63568eddddb41dd0da16d8340c5f5ae3615fe46ae864a163_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:9e15073c7782b0194c06e0b420573e49d5719002417faa567c99ee8409ff590d_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:f76307e201d0b2deaf0aa96bc6b62fc4535c8358b06a8e95ec5a8abf10d2da07_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:5c496cafb1e21883677c6dcb9fd7392383325b8529b98648af757545dfe59488_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:b2875bcf5aee1175faa2ab1ce163642e17c4948ff5aa76967d008f75b470fc74_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:df6bf531755753b224999cb9a5f087c96e8a512666589df4763d4a14941a6f5a_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:f7e87de708186099c76426f24b53395340a672e282615164bac73afca3f36454_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:0350448bf1fb15f26c0d092ceb8b0618932f42d30ca4c7c62f2ec1b86c20dd23_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:4c8c8ef82f2f2685d76a9535523c4c93485329aa23328a68426e93789f363b53_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:7fa04ae06b25476b7b2a3f9e21279202571fd8fc5ff5012c980caf3f33edc0a5_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:8b20b6abf0399bbfc970990bc0c5b6dab46c1043ef761519dbbe8213e6fdd169_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:28aae4d07691c86cdfa9bbfcc7b68e1a3304402ac6c65982bfc0f7945cb9a44e_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:3b78f446debe56d01cd96dc3c3ae225a982ee6abdd7d2fabae553cf4c87e471a_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:cbc542505b4784050c96b3fb31a4867b5d94c8a6957b54a8cfad03bc16a19578_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:e0e44241bde7bfbccea69d06e5fd00ad0a0ab569bef6645687bcadcfc00aa5ef_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:5ccb9e878551c910e3a300ab8043fdc4788381c9515dc9dcaa965a738d2de059_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:7559ec0119f673e243361d4e457a8e9687beb3af60a4fd608fa211539b9034c1_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:808082ac26e53bc7f962428d8e67f721654b732eb1d40fc6e272fcb7f045797c_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:bf282440c8e3ce4d38535bb1efdcbc05f0278647d2fc6e2a13c9c28c0c101f79_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2402179"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was identified in the email parsing library due to improper handling of specially formatted recipient email addresses. An attacker can exploit this flaw by crafting a recipient address that embeds an external address within quotes. This causes the application to misdirect the email to the attacker\u0027s external address instead of the intended internal recipient. This could lead to a significant data leak of sensitive information and allow an attacker to bypass security filters and access controls.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodemailer: Nodemailer: Email to an unintended domain can occur due to Interpretation Conflict",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability allows an attacker to force nodemailer to send an email to an attacker-owned email address by leveraging the incorrect handling of quoted local-parts containing the \u0027@\u0027 character in the destination email address. When successfully exploited, this vulnerability may allow an attacker to exfiltrate data by misrouting emails to an unintended domain, presenting a high impact on data confidentiality.\n\nThis vulnerability has been assessed as having a Moderate impact on Red Hat Products by the Red Hat Product Security team. This is because for an attacker successfully exploit this vulnerability, the malicious actor needs to have direct control over the destination email input.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:3d4903b8dbe33464c05ce219ee2e945bf1be169efbed73caee5185883c9df508_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:67d65ecfe844febb7afdfcfbdc0a31f3bd9dfb4c3c81f4734a1b146e34d8d5cb_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:a6a8bbdd49272c632edd96e1598d1e697ba3a1dabb8d36086eced4847de59cbb_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:c27690e36faf7db08a6d398cce7dbedcfe74848224a179c7278b62315516dd4a_arm64"
],
"known_not_affected": [
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:02914a917bbea40c35be2cc7dbaf05c5ac1e1bd30b0e82b4ad9a1c58b99a076b_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:2ce063cc246e7694adf066c17390b4c8d95719b2786267a9db64390407648410_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:aeb508e1309d4a811f881f4028e1c370a5431d290aca2c4af5acdf6a58916a7f_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:fa3c9307038f92e351892be9c73cda40a3bab2038904fabcb97dad5568dcec2d_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:0f37c554cc22c9c89cc4c53739b2ef86e84287486e3f7cdbad10a6e53439d596_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:1a8207fe81e8c5bd63568eddddb41dd0da16d8340c5f5ae3615fe46ae864a163_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:9e15073c7782b0194c06e0b420573e49d5719002417faa567c99ee8409ff590d_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:f76307e201d0b2deaf0aa96bc6b62fc4535c8358b06a8e95ec5a8abf10d2da07_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:5c496cafb1e21883677c6dcb9fd7392383325b8529b98648af757545dfe59488_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:b2875bcf5aee1175faa2ab1ce163642e17c4948ff5aa76967d008f75b470fc74_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:df6bf531755753b224999cb9a5f087c96e8a512666589df4763d4a14941a6f5a_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:f7e87de708186099c76426f24b53395340a672e282615164bac73afca3f36454_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:0350448bf1fb15f26c0d092ceb8b0618932f42d30ca4c7c62f2ec1b86c20dd23_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:4c8c8ef82f2f2685d76a9535523c4c93485329aa23328a68426e93789f363b53_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:7fa04ae06b25476b7b2a3f9e21279202571fd8fc5ff5012c980caf3f33edc0a5_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:8b20b6abf0399bbfc970990bc0c5b6dab46c1043ef761519dbbe8213e6fdd169_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:28aae4d07691c86cdfa9bbfcc7b68e1a3304402ac6c65982bfc0f7945cb9a44e_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:3b78f446debe56d01cd96dc3c3ae225a982ee6abdd7d2fabae553cf4c87e471a_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:cbc542505b4784050c96b3fb31a4867b5d94c8a6957b54a8cfad03bc16a19578_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:e0e44241bde7bfbccea69d06e5fd00ad0a0ab569bef6645687bcadcfc00aa5ef_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:5ccb9e878551c910e3a300ab8043fdc4788381c9515dc9dcaa965a738d2de059_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:7559ec0119f673e243361d4e457a8e9687beb3af60a4fd608fa211539b9034c1_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:808082ac26e53bc7f962428d8e67f721654b732eb1d40fc6e272fcb7f045797c_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:bf282440c8e3ce4d38535bb1efdcbc05f0278647d2fc6e2a13c9c28c0c101f79_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-13033"
},
{
"category": "external",
"summary": "RHBZ#2402179",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402179"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-13033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13033"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-13033",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-13033"
},
{
"category": "external",
"summary": "https://github.com/nodemailer/nodemailer",
"url": "https://github.com/nodemailer/nodemailer"
},
{
"category": "external",
"summary": "https://github.com/nodemailer/nodemailer/commit/1150d99fba77280df2cfb1885c43df23109a8626",
"url": "https://github.com/nodemailer/nodemailer/commit/1150d99fba77280df2cfb1885c43df23109a8626"
},
{
"category": "external",
"summary": "https://github.com/nodemailer/nodemailer/security/advisories/GHSA-mm7p-fcc7-pg87",
"url": "https://github.com/nodemailer/nodemailer/security/advisories/GHSA-mm7p-fcc7-pg87"
}
],
"release_date": "2025-10-07T13:42:02+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-05-11T11:23:46+00:00",
"details": "The container images provided by this update can be downloaded from the\nRed Hat container registry at registry.redhat.io using the \"podman pull\" command.",
"product_ids": [
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:3d4903b8dbe33464c05ce219ee2e945bf1be169efbed73caee5185883c9df508_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:67d65ecfe844febb7afdfcfbdc0a31f3bd9dfb4c3c81f4734a1b146e34d8d5cb_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:a6a8bbdd49272c632edd96e1598d1e697ba3a1dabb8d36086eced4847de59cbb_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:c27690e36faf7db08a6d398cce7dbedcfe74848224a179c7278b62315516dd4a_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:15979"
},
{
"category": "workaround",
"details": "Currently there\u0027s no available mitigation for this flaw.",
"product_ids": [
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:3d4903b8dbe33464c05ce219ee2e945bf1be169efbed73caee5185883c9df508_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:67d65ecfe844febb7afdfcfbdc0a31f3bd9dfb4c3c81f4734a1b146e34d8d5cb_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:a6a8bbdd49272c632edd96e1598d1e697ba3a1dabb8d36086eced4847de59cbb_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:c27690e36faf7db08a6d398cce7dbedcfe74848224a179c7278b62315516dd4a_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:02914a917bbea40c35be2cc7dbaf05c5ac1e1bd30b0e82b4ad9a1c58b99a076b_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:2ce063cc246e7694adf066c17390b4c8d95719b2786267a9db64390407648410_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:aeb508e1309d4a811f881f4028e1c370a5431d290aca2c4af5acdf6a58916a7f_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:fa3c9307038f92e351892be9c73cda40a3bab2038904fabcb97dad5568dcec2d_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:0f37c554cc22c9c89cc4c53739b2ef86e84287486e3f7cdbad10a6e53439d596_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:1a8207fe81e8c5bd63568eddddb41dd0da16d8340c5f5ae3615fe46ae864a163_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:9e15073c7782b0194c06e0b420573e49d5719002417faa567c99ee8409ff590d_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:f76307e201d0b2deaf0aa96bc6b62fc4535c8358b06a8e95ec5a8abf10d2da07_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:5c496cafb1e21883677c6dcb9fd7392383325b8529b98648af757545dfe59488_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:b2875bcf5aee1175faa2ab1ce163642e17c4948ff5aa76967d008f75b470fc74_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:df6bf531755753b224999cb9a5f087c96e8a512666589df4763d4a14941a6f5a_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:f7e87de708186099c76426f24b53395340a672e282615164bac73afca3f36454_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:0350448bf1fb15f26c0d092ceb8b0618932f42d30ca4c7c62f2ec1b86c20dd23_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:4c8c8ef82f2f2685d76a9535523c4c93485329aa23328a68426e93789f363b53_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:7fa04ae06b25476b7b2a3f9e21279202571fd8fc5ff5012c980caf3f33edc0a5_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:8b20b6abf0399bbfc970990bc0c5b6dab46c1043ef761519dbbe8213e6fdd169_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:28aae4d07691c86cdfa9bbfcc7b68e1a3304402ac6c65982bfc0f7945cb9a44e_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:3b78f446debe56d01cd96dc3c3ae225a982ee6abdd7d2fabae553cf4c87e471a_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:cbc542505b4784050c96b3fb31a4867b5d94c8a6957b54a8cfad03bc16a19578_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:e0e44241bde7bfbccea69d06e5fd00ad0a0ab569bef6645687bcadcfc00aa5ef_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:5ccb9e878551c910e3a300ab8043fdc4788381c9515dc9dcaa965a738d2de059_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:7559ec0119f673e243361d4e457a8e9687beb3af60a4fd608fa211539b9034c1_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:808082ac26e53bc7f962428d8e67f721654b732eb1d40fc6e272fcb7f045797c_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:bf282440c8e3ce4d38535bb1efdcbc05f0278647d2fc6e2a13c9c28c0c101f79_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:3d4903b8dbe33464c05ce219ee2e945bf1be169efbed73caee5185883c9df508_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:67d65ecfe844febb7afdfcfbdc0a31f3bd9dfb4c3c81f4734a1b146e34d8d5cb_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:a6a8bbdd49272c632edd96e1598d1e697ba3a1dabb8d36086eced4847de59cbb_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:c27690e36faf7db08a6d398cce7dbedcfe74848224a179c7278b62315516dd4a_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:02914a917bbea40c35be2cc7dbaf05c5ac1e1bd30b0e82b4ad9a1c58b99a076b_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:2ce063cc246e7694adf066c17390b4c8d95719b2786267a9db64390407648410_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:aeb508e1309d4a811f881f4028e1c370a5431d290aca2c4af5acdf6a58916a7f_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:fa3c9307038f92e351892be9c73cda40a3bab2038904fabcb97dad5568dcec2d_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:0f37c554cc22c9c89cc4c53739b2ef86e84287486e3f7cdbad10a6e53439d596_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:1a8207fe81e8c5bd63568eddddb41dd0da16d8340c5f5ae3615fe46ae864a163_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:9e15073c7782b0194c06e0b420573e49d5719002417faa567c99ee8409ff590d_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:f76307e201d0b2deaf0aa96bc6b62fc4535c8358b06a8e95ec5a8abf10d2da07_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:5c496cafb1e21883677c6dcb9fd7392383325b8529b98648af757545dfe59488_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:b2875bcf5aee1175faa2ab1ce163642e17c4948ff5aa76967d008f75b470fc74_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:df6bf531755753b224999cb9a5f087c96e8a512666589df4763d4a14941a6f5a_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:f7e87de708186099c76426f24b53395340a672e282615164bac73afca3f36454_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:0350448bf1fb15f26c0d092ceb8b0618932f42d30ca4c7c62f2ec1b86c20dd23_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:4c8c8ef82f2f2685d76a9535523c4c93485329aa23328a68426e93789f363b53_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:7fa04ae06b25476b7b2a3f9e21279202571fd8fc5ff5012c980caf3f33edc0a5_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:8b20b6abf0399bbfc970990bc0c5b6dab46c1043ef761519dbbe8213e6fdd169_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:28aae4d07691c86cdfa9bbfcc7b68e1a3304402ac6c65982bfc0f7945cb9a44e_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:3b78f446debe56d01cd96dc3c3ae225a982ee6abdd7d2fabae553cf4c87e471a_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:cbc542505b4784050c96b3fb31a4867b5d94c8a6957b54a8cfad03bc16a19578_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:e0e44241bde7bfbccea69d06e5fd00ad0a0ab569bef6645687bcadcfc00aa5ef_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:5ccb9e878551c910e3a300ab8043fdc4788381c9515dc9dcaa965a738d2de059_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:7559ec0119f673e243361d4e457a8e9687beb3af60a4fd608fa211539b9034c1_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:808082ac26e53bc7f962428d8e67f721654b732eb1d40fc6e272fcb7f045797c_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:bf282440c8e3ce4d38535bb1efdcbc05f0278647d2fc6e2a13c9c28c0c101f79_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nodemailer: Nodemailer: Email to an unintended domain can occur due to Interpretation Conflict"
},
{
"cve": "CVE-2025-47914",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2025-11-19T21:01:06.202641+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:02914a917bbea40c35be2cc7dbaf05c5ac1e1bd30b0e82b4ad9a1c58b99a076b_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:2ce063cc246e7694adf066c17390b4c8d95719b2786267a9db64390407648410_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:aeb508e1309d4a811f881f4028e1c370a5431d290aca2c4af5acdf6a58916a7f_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:fa3c9307038f92e351892be9c73cda40a3bab2038904fabcb97dad5568dcec2d_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:0f37c554cc22c9c89cc4c53739b2ef86e84287486e3f7cdbad10a6e53439d596_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:1a8207fe81e8c5bd63568eddddb41dd0da16d8340c5f5ae3615fe46ae864a163_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:9e15073c7782b0194c06e0b420573e49d5719002417faa567c99ee8409ff590d_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:f76307e201d0b2deaf0aa96bc6b62fc4535c8358b06a8e95ec5a8abf10d2da07_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:5c496cafb1e21883677c6dcb9fd7392383325b8529b98648af757545dfe59488_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:b2875bcf5aee1175faa2ab1ce163642e17c4948ff5aa76967d008f75b470fc74_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:df6bf531755753b224999cb9a5f087c96e8a512666589df4763d4a14941a6f5a_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:f7e87de708186099c76426f24b53395340a672e282615164bac73afca3f36454_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:0350448bf1fb15f26c0d092ceb8b0618932f42d30ca4c7c62f2ec1b86c20dd23_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:4c8c8ef82f2f2685d76a9535523c4c93485329aa23328a68426e93789f363b53_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:7fa04ae06b25476b7b2a3f9e21279202571fd8fc5ff5012c980caf3f33edc0a5_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:8b20b6abf0399bbfc970990bc0c5b6dab46c1043ef761519dbbe8213e6fdd169_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:28aae4d07691c86cdfa9bbfcc7b68e1a3304402ac6c65982bfc0f7945cb9a44e_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:3b78f446debe56d01cd96dc3c3ae225a982ee6abdd7d2fabae553cf4c87e471a_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:cbc542505b4784050c96b3fb31a4867b5d94c8a6957b54a8cfad03bc16a19578_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:e0e44241bde7bfbccea69d06e5fd00ad0a0ab569bef6645687bcadcfc00aa5ef_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:5ccb9e878551c910e3a300ab8043fdc4788381c9515dc9dcaa965a738d2de059_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:7559ec0119f673e243361d4e457a8e9687beb3af60a4fd608fa211539b9034c1_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:808082ac26e53bc7f962428d8e67f721654b732eb1d40fc6e272fcb7f045797c_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:bf282440c8e3ce4d38535bb1efdcbc05f0278647d2fc6e2a13c9c28c0c101f79_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2416000"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the SSH Agent servers component (golang.org/x/crypto/ssh/agent). This vulnerability allows a remote attacker to cause a denial of service (DoS) by sending a specially crafted, malformed message during new identity requests. The server fails to validate the size of these messages, leading to an out-of-bounds read that can cause the program to panic and terminate.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang.org/x/crypto/ssh/agent: SSH Agent servers: Denial of Service due to malformed messages",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Moderate for Red Hat products. The golang.org/x/crypto/ssh/agent library, when used in SSH Agent servers, does not properly validate the size of messages during new identity requests. A specially crafted malformed message can lead to an out-of-bounds read, causing the program to panic and resulting in a denial of service.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:3d4903b8dbe33464c05ce219ee2e945bf1be169efbed73caee5185883c9df508_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:67d65ecfe844febb7afdfcfbdc0a31f3bd9dfb4c3c81f4734a1b146e34d8d5cb_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:a6a8bbdd49272c632edd96e1598d1e697ba3a1dabb8d36086eced4847de59cbb_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:c27690e36faf7db08a6d398cce7dbedcfe74848224a179c7278b62315516dd4a_arm64"
],
"known_not_affected": [
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:02914a917bbea40c35be2cc7dbaf05c5ac1e1bd30b0e82b4ad9a1c58b99a076b_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:2ce063cc246e7694adf066c17390b4c8d95719b2786267a9db64390407648410_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:aeb508e1309d4a811f881f4028e1c370a5431d290aca2c4af5acdf6a58916a7f_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:fa3c9307038f92e351892be9c73cda40a3bab2038904fabcb97dad5568dcec2d_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:0f37c554cc22c9c89cc4c53739b2ef86e84287486e3f7cdbad10a6e53439d596_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:1a8207fe81e8c5bd63568eddddb41dd0da16d8340c5f5ae3615fe46ae864a163_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:9e15073c7782b0194c06e0b420573e49d5719002417faa567c99ee8409ff590d_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:f76307e201d0b2deaf0aa96bc6b62fc4535c8358b06a8e95ec5a8abf10d2da07_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:5c496cafb1e21883677c6dcb9fd7392383325b8529b98648af757545dfe59488_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:b2875bcf5aee1175faa2ab1ce163642e17c4948ff5aa76967d008f75b470fc74_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:df6bf531755753b224999cb9a5f087c96e8a512666589df4763d4a14941a6f5a_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:f7e87de708186099c76426f24b53395340a672e282615164bac73afca3f36454_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:0350448bf1fb15f26c0d092ceb8b0618932f42d30ca4c7c62f2ec1b86c20dd23_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:4c8c8ef82f2f2685d76a9535523c4c93485329aa23328a68426e93789f363b53_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:7fa04ae06b25476b7b2a3f9e21279202571fd8fc5ff5012c980caf3f33edc0a5_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:8b20b6abf0399bbfc970990bc0c5b6dab46c1043ef761519dbbe8213e6fdd169_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:28aae4d07691c86cdfa9bbfcc7b68e1a3304402ac6c65982bfc0f7945cb9a44e_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:3b78f446debe56d01cd96dc3c3ae225a982ee6abdd7d2fabae553cf4c87e471a_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:cbc542505b4784050c96b3fb31a4867b5d94c8a6957b54a8cfad03bc16a19578_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:e0e44241bde7bfbccea69d06e5fd00ad0a0ab569bef6645687bcadcfc00aa5ef_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:5ccb9e878551c910e3a300ab8043fdc4788381c9515dc9dcaa965a738d2de059_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:7559ec0119f673e243361d4e457a8e9687beb3af60a4fd608fa211539b9034c1_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:808082ac26e53bc7f962428d8e67f721654b732eb1d40fc6e272fcb7f045797c_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:bf282440c8e3ce4d38535bb1efdcbc05f0278647d2fc6e2a13c9c28c0c101f79_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-47914"
},
{
"category": "external",
"summary": "RHBZ#2416000",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416000"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-47914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47914"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-47914",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47914"
},
{
"category": "external",
"summary": "https://go.dev/cl/721960",
"url": "https://go.dev/cl/721960"
},
{
"category": "external",
"summary": "https://go.dev/issue/76364",
"url": "https://go.dev/issue/76364"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/w-oX3UxNcZA",
"url": "https://groups.google.com/g/golang-announce/c/w-oX3UxNcZA"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4135",
"url": "https://pkg.go.dev/vuln/GO-2025-4135"
}
],
"release_date": "2025-11-19T20:33:43.126000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-05-11T11:23:46+00:00",
"details": "The container images provided by this update can be downloaded from the\nRed Hat container registry at registry.redhat.io using the \"podman pull\" command.",
"product_ids": [
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:3d4903b8dbe33464c05ce219ee2e945bf1be169efbed73caee5185883c9df508_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:67d65ecfe844febb7afdfcfbdc0a31f3bd9dfb4c3c81f4734a1b146e34d8d5cb_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:a6a8bbdd49272c632edd96e1598d1e697ba3a1dabb8d36086eced4847de59cbb_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:c27690e36faf7db08a6d398cce7dbedcfe74848224a179c7278b62315516dd4a_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:15979"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:3d4903b8dbe33464c05ce219ee2e945bf1be169efbed73caee5185883c9df508_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:67d65ecfe844febb7afdfcfbdc0a31f3bd9dfb4c3c81f4734a1b146e34d8d5cb_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:a6a8bbdd49272c632edd96e1598d1e697ba3a1dabb8d36086eced4847de59cbb_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:c27690e36faf7db08a6d398cce7dbedcfe74848224a179c7278b62315516dd4a_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:02914a917bbea40c35be2cc7dbaf05c5ac1e1bd30b0e82b4ad9a1c58b99a076b_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:2ce063cc246e7694adf066c17390b4c8d95719b2786267a9db64390407648410_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:aeb508e1309d4a811f881f4028e1c370a5431d290aca2c4af5acdf6a58916a7f_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:fa3c9307038f92e351892be9c73cda40a3bab2038904fabcb97dad5568dcec2d_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:0f37c554cc22c9c89cc4c53739b2ef86e84287486e3f7cdbad10a6e53439d596_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:1a8207fe81e8c5bd63568eddddb41dd0da16d8340c5f5ae3615fe46ae864a163_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:9e15073c7782b0194c06e0b420573e49d5719002417faa567c99ee8409ff590d_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:f76307e201d0b2deaf0aa96bc6b62fc4535c8358b06a8e95ec5a8abf10d2da07_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:5c496cafb1e21883677c6dcb9fd7392383325b8529b98648af757545dfe59488_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:b2875bcf5aee1175faa2ab1ce163642e17c4948ff5aa76967d008f75b470fc74_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:df6bf531755753b224999cb9a5f087c96e8a512666589df4763d4a14941a6f5a_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:f7e87de708186099c76426f24b53395340a672e282615164bac73afca3f36454_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:0350448bf1fb15f26c0d092ceb8b0618932f42d30ca4c7c62f2ec1b86c20dd23_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:4c8c8ef82f2f2685d76a9535523c4c93485329aa23328a68426e93789f363b53_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:7fa04ae06b25476b7b2a3f9e21279202571fd8fc5ff5012c980caf3f33edc0a5_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:8b20b6abf0399bbfc970990bc0c5b6dab46c1043ef761519dbbe8213e6fdd169_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:28aae4d07691c86cdfa9bbfcc7b68e1a3304402ac6c65982bfc0f7945cb9a44e_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:3b78f446debe56d01cd96dc3c3ae225a982ee6abdd7d2fabae553cf4c87e471a_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:cbc542505b4784050c96b3fb31a4867b5d94c8a6957b54a8cfad03bc16a19578_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:e0e44241bde7bfbccea69d06e5fd00ad0a0ab569bef6645687bcadcfc00aa5ef_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:5ccb9e878551c910e3a300ab8043fdc4788381c9515dc9dcaa965a738d2de059_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:7559ec0119f673e243361d4e457a8e9687beb3af60a4fd608fa211539b9034c1_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:808082ac26e53bc7f962428d8e67f721654b732eb1d40fc6e272fcb7f045797c_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:bf282440c8e3ce4d38535bb1efdcbc05f0278647d2fc6e2a13c9c28c0c101f79_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang.org/x/crypto/ssh/agent: SSH Agent servers: Denial of Service due to malformed messages"
},
{
"cve": "CVE-2025-58181",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2025-11-19T21:00:50.197590+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:02914a917bbea40c35be2cc7dbaf05c5ac1e1bd30b0e82b4ad9a1c58b99a076b_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:2ce063cc246e7694adf066c17390b4c8d95719b2786267a9db64390407648410_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:aeb508e1309d4a811f881f4028e1c370a5431d290aca2c4af5acdf6a58916a7f_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:fa3c9307038f92e351892be9c73cda40a3bab2038904fabcb97dad5568dcec2d_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:0f37c554cc22c9c89cc4c53739b2ef86e84287486e3f7cdbad10a6e53439d596_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:1a8207fe81e8c5bd63568eddddb41dd0da16d8340c5f5ae3615fe46ae864a163_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:9e15073c7782b0194c06e0b420573e49d5719002417faa567c99ee8409ff590d_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:f76307e201d0b2deaf0aa96bc6b62fc4535c8358b06a8e95ec5a8abf10d2da07_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:5c496cafb1e21883677c6dcb9fd7392383325b8529b98648af757545dfe59488_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:b2875bcf5aee1175faa2ab1ce163642e17c4948ff5aa76967d008f75b470fc74_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:df6bf531755753b224999cb9a5f087c96e8a512666589df4763d4a14941a6f5a_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:f7e87de708186099c76426f24b53395340a672e282615164bac73afca3f36454_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:0350448bf1fb15f26c0d092ceb8b0618932f42d30ca4c7c62f2ec1b86c20dd23_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:4c8c8ef82f2f2685d76a9535523c4c93485329aa23328a68426e93789f363b53_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:7fa04ae06b25476b7b2a3f9e21279202571fd8fc5ff5012c980caf3f33edc0a5_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:8b20b6abf0399bbfc970990bc0c5b6dab46c1043ef761519dbbe8213e6fdd169_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:28aae4d07691c86cdfa9bbfcc7b68e1a3304402ac6c65982bfc0f7945cb9a44e_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:3b78f446debe56d01cd96dc3c3ae225a982ee6abdd7d2fabae553cf4c87e471a_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:cbc542505b4784050c96b3fb31a4867b5d94c8a6957b54a8cfad03bc16a19578_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:e0e44241bde7bfbccea69d06e5fd00ad0a0ab569bef6645687bcadcfc00aa5ef_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:5ccb9e878551c910e3a300ab8043fdc4788381c9515dc9dcaa965a738d2de059_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:7559ec0119f673e243361d4e457a8e9687beb3af60a4fd608fa211539b9034c1_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:808082ac26e53bc7f962428d8e67f721654b732eb1d40fc6e272fcb7f045797c_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:bf282440c8e3ce4d38535bb1efdcbc05f0278647d2fc6e2a13c9c28c0c101f79_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2415997"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang.org/x/crypto/ssh. An attacker can exploit this vulnerability by sending specially crafted GSSAPI (Generic Security Service Application Program Interface) authentication requests to an SSH (Secure Shell) server. The server fails to validate the number of mechanisms specified in these requests, leading to unbounded memory consumption. This can result in a Denial of Service (DoS), making the SSH server unavailable to legitimate users.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang.org/x/crypto/ssh: golang.org/x/crypto/ssh: Denial of Service via unbounded memory consumption in GSSAPI authentication",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Moderate for Red Hat. SSH servers utilizing `golang.org/x/crypto/ssh` and configured to process GSSAPI authentication requests are susceptible to unbounded memory consumption. An attacker can exploit this by sending specially crafted GSSAPI authentication requests, potentially leading to a denial of service.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:3d4903b8dbe33464c05ce219ee2e945bf1be169efbed73caee5185883c9df508_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:67d65ecfe844febb7afdfcfbdc0a31f3bd9dfb4c3c81f4734a1b146e34d8d5cb_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:a6a8bbdd49272c632edd96e1598d1e697ba3a1dabb8d36086eced4847de59cbb_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:c27690e36faf7db08a6d398cce7dbedcfe74848224a179c7278b62315516dd4a_arm64"
],
"known_not_affected": [
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:02914a917bbea40c35be2cc7dbaf05c5ac1e1bd30b0e82b4ad9a1c58b99a076b_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:2ce063cc246e7694adf066c17390b4c8d95719b2786267a9db64390407648410_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:aeb508e1309d4a811f881f4028e1c370a5431d290aca2c4af5acdf6a58916a7f_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:fa3c9307038f92e351892be9c73cda40a3bab2038904fabcb97dad5568dcec2d_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:0f37c554cc22c9c89cc4c53739b2ef86e84287486e3f7cdbad10a6e53439d596_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:1a8207fe81e8c5bd63568eddddb41dd0da16d8340c5f5ae3615fe46ae864a163_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:9e15073c7782b0194c06e0b420573e49d5719002417faa567c99ee8409ff590d_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:f76307e201d0b2deaf0aa96bc6b62fc4535c8358b06a8e95ec5a8abf10d2da07_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:5c496cafb1e21883677c6dcb9fd7392383325b8529b98648af757545dfe59488_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:b2875bcf5aee1175faa2ab1ce163642e17c4948ff5aa76967d008f75b470fc74_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:df6bf531755753b224999cb9a5f087c96e8a512666589df4763d4a14941a6f5a_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:f7e87de708186099c76426f24b53395340a672e282615164bac73afca3f36454_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:0350448bf1fb15f26c0d092ceb8b0618932f42d30ca4c7c62f2ec1b86c20dd23_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:4c8c8ef82f2f2685d76a9535523c4c93485329aa23328a68426e93789f363b53_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:7fa04ae06b25476b7b2a3f9e21279202571fd8fc5ff5012c980caf3f33edc0a5_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:8b20b6abf0399bbfc970990bc0c5b6dab46c1043ef761519dbbe8213e6fdd169_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:28aae4d07691c86cdfa9bbfcc7b68e1a3304402ac6c65982bfc0f7945cb9a44e_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:3b78f446debe56d01cd96dc3c3ae225a982ee6abdd7d2fabae553cf4c87e471a_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:cbc542505b4784050c96b3fb31a4867b5d94c8a6957b54a8cfad03bc16a19578_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:e0e44241bde7bfbccea69d06e5fd00ad0a0ab569bef6645687bcadcfc00aa5ef_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:5ccb9e878551c910e3a300ab8043fdc4788381c9515dc9dcaa965a738d2de059_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:7559ec0119f673e243361d4e457a8e9687beb3af60a4fd608fa211539b9034c1_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:808082ac26e53bc7f962428d8e67f721654b732eb1d40fc6e272fcb7f045797c_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:bf282440c8e3ce4d38535bb1efdcbc05f0278647d2fc6e2a13c9c28c0c101f79_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-58181"
},
{
"category": "external",
"summary": "RHBZ#2415997",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2415997"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-58181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58181"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-58181",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58181"
},
{
"category": "external",
"summary": "https://go.dev/cl/721961",
"url": "https://go.dev/cl/721961"
},
{
"category": "external",
"summary": "https://go.dev/issue/76363",
"url": "https://go.dev/issue/76363"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/w-oX3UxNcZA",
"url": "https://groups.google.com/g/golang-announce/c/w-oX3UxNcZA"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4134",
"url": "https://pkg.go.dev/vuln/GO-2025-4134"
}
],
"release_date": "2025-11-19T20:33:42.795000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-05-11T11:23:46+00:00",
"details": "The container images provided by this update can be downloaded from the\nRed Hat container registry at registry.redhat.io using the \"podman pull\" command.",
"product_ids": [
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:3d4903b8dbe33464c05ce219ee2e945bf1be169efbed73caee5185883c9df508_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:67d65ecfe844febb7afdfcfbdc0a31f3bd9dfb4c3c81f4734a1b146e34d8d5cb_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:a6a8bbdd49272c632edd96e1598d1e697ba3a1dabb8d36086eced4847de59cbb_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:c27690e36faf7db08a6d398cce7dbedcfe74848224a179c7278b62315516dd4a_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:15979"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:3d4903b8dbe33464c05ce219ee2e945bf1be169efbed73caee5185883c9df508_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:67d65ecfe844febb7afdfcfbdc0a31f3bd9dfb4c3c81f4734a1b146e34d8d5cb_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:a6a8bbdd49272c632edd96e1598d1e697ba3a1dabb8d36086eced4847de59cbb_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:c27690e36faf7db08a6d398cce7dbedcfe74848224a179c7278b62315516dd4a_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:02914a917bbea40c35be2cc7dbaf05c5ac1e1bd30b0e82b4ad9a1c58b99a076b_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:2ce063cc246e7694adf066c17390b4c8d95719b2786267a9db64390407648410_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:aeb508e1309d4a811f881f4028e1c370a5431d290aca2c4af5acdf6a58916a7f_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:fa3c9307038f92e351892be9c73cda40a3bab2038904fabcb97dad5568dcec2d_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:0f37c554cc22c9c89cc4c53739b2ef86e84287486e3f7cdbad10a6e53439d596_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:1a8207fe81e8c5bd63568eddddb41dd0da16d8340c5f5ae3615fe46ae864a163_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:9e15073c7782b0194c06e0b420573e49d5719002417faa567c99ee8409ff590d_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:f76307e201d0b2deaf0aa96bc6b62fc4535c8358b06a8e95ec5a8abf10d2da07_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:5c496cafb1e21883677c6dcb9fd7392383325b8529b98648af757545dfe59488_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:b2875bcf5aee1175faa2ab1ce163642e17c4948ff5aa76967d008f75b470fc74_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:df6bf531755753b224999cb9a5f087c96e8a512666589df4763d4a14941a6f5a_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:f7e87de708186099c76426f24b53395340a672e282615164bac73afca3f36454_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:0350448bf1fb15f26c0d092ceb8b0618932f42d30ca4c7c62f2ec1b86c20dd23_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:4c8c8ef82f2f2685d76a9535523c4c93485329aa23328a68426e93789f363b53_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:7fa04ae06b25476b7b2a3f9e21279202571fd8fc5ff5012c980caf3f33edc0a5_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:8b20b6abf0399bbfc970990bc0c5b6dab46c1043ef761519dbbe8213e6fdd169_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:28aae4d07691c86cdfa9bbfcc7b68e1a3304402ac6c65982bfc0f7945cb9a44e_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:3b78f446debe56d01cd96dc3c3ae225a982ee6abdd7d2fabae553cf4c87e471a_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:cbc542505b4784050c96b3fb31a4867b5d94c8a6957b54a8cfad03bc16a19578_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:e0e44241bde7bfbccea69d06e5fd00ad0a0ab569bef6645687bcadcfc00aa5ef_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:5ccb9e878551c910e3a300ab8043fdc4788381c9515dc9dcaa965a738d2de059_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:7559ec0119f673e243361d4e457a8e9687beb3af60a4fd608fa211539b9034c1_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:808082ac26e53bc7f962428d8e67f721654b732eb1d40fc6e272fcb7f045797c_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:bf282440c8e3ce4d38535bb1efdcbc05f0278647d2fc6e2a13c9c28c0c101f79_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang.org/x/crypto/ssh: golang.org/x/crypto/ssh: Denial of Service via unbounded memory consumption in GSSAPI authentication"
},
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:02914a917bbea40c35be2cc7dbaf05c5ac1e1bd30b0e82b4ad9a1c58b99a076b_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:2ce063cc246e7694adf066c17390b4c8d95719b2786267a9db64390407648410_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:aeb508e1309d4a811f881f4028e1c370a5431d290aca2c4af5acdf6a58916a7f_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:fa3c9307038f92e351892be9c73cda40a3bab2038904fabcb97dad5568dcec2d_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:0f37c554cc22c9c89cc4c53739b2ef86e84287486e3f7cdbad10a6e53439d596_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:1a8207fe81e8c5bd63568eddddb41dd0da16d8340c5f5ae3615fe46ae864a163_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:9e15073c7782b0194c06e0b420573e49d5719002417faa567c99ee8409ff590d_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:f76307e201d0b2deaf0aa96bc6b62fc4535c8358b06a8e95ec5a8abf10d2da07_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:5c496cafb1e21883677c6dcb9fd7392383325b8529b98648af757545dfe59488_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:b2875bcf5aee1175faa2ab1ce163642e17c4948ff5aa76967d008f75b470fc74_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:df6bf531755753b224999cb9a5f087c96e8a512666589df4763d4a14941a6f5a_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:f7e87de708186099c76426f24b53395340a672e282615164bac73afca3f36454_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:0350448bf1fb15f26c0d092ceb8b0618932f42d30ca4c7c62f2ec1b86c20dd23_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:4c8c8ef82f2f2685d76a9535523c4c93485329aa23328a68426e93789f363b53_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:7fa04ae06b25476b7b2a3f9e21279202571fd8fc5ff5012c980caf3f33edc0a5_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:8b20b6abf0399bbfc970990bc0c5b6dab46c1043ef761519dbbe8213e6fdd169_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:28aae4d07691c86cdfa9bbfcc7b68e1a3304402ac6c65982bfc0f7945cb9a44e_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:3b78f446debe56d01cd96dc3c3ae225a982ee6abdd7d2fabae553cf4c87e471a_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:cbc542505b4784050c96b3fb31a4867b5d94c8a6957b54a8cfad03bc16a19578_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:e0e44241bde7bfbccea69d06e5fd00ad0a0ab569bef6645687bcadcfc00aa5ef_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:5ccb9e878551c910e3a300ab8043fdc4788381c9515dc9dcaa965a738d2de059_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:7559ec0119f673e243361d4e457a8e9687beb3af60a4fd608fa211539b9034c1_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:808082ac26e53bc7f962428d8e67f721654b732eb1d40fc6e272fcb7f045797c_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:bf282440c8e3ce4d38535bb1efdcbc05f0278647d2fc6e2a13c9c28c0c101f79_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang. A remote attacker could exploit this vulnerability by providing a specially crafted certificate during the error string construction process within the `HostnameError.Error()` function. This flaw, caused by unbounded string concatenation, leads to excessive resource consumption. Successful exploitation can result in a denial of service (DoS) for the affected system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:3d4903b8dbe33464c05ce219ee2e945bf1be169efbed73caee5185883c9df508_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:67d65ecfe844febb7afdfcfbdc0a31f3bd9dfb4c3c81f4734a1b146e34d8d5cb_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:a6a8bbdd49272c632edd96e1598d1e697ba3a1dabb8d36086eced4847de59cbb_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:c27690e36faf7db08a6d398cce7dbedcfe74848224a179c7278b62315516dd4a_arm64"
],
"known_not_affected": [
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:02914a917bbea40c35be2cc7dbaf05c5ac1e1bd30b0e82b4ad9a1c58b99a076b_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:2ce063cc246e7694adf066c17390b4c8d95719b2786267a9db64390407648410_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:aeb508e1309d4a811f881f4028e1c370a5431d290aca2c4af5acdf6a58916a7f_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:fa3c9307038f92e351892be9c73cda40a3bab2038904fabcb97dad5568dcec2d_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:0f37c554cc22c9c89cc4c53739b2ef86e84287486e3f7cdbad10a6e53439d596_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:1a8207fe81e8c5bd63568eddddb41dd0da16d8340c5f5ae3615fe46ae864a163_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:9e15073c7782b0194c06e0b420573e49d5719002417faa567c99ee8409ff590d_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:f76307e201d0b2deaf0aa96bc6b62fc4535c8358b06a8e95ec5a8abf10d2da07_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:5c496cafb1e21883677c6dcb9fd7392383325b8529b98648af757545dfe59488_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:b2875bcf5aee1175faa2ab1ce163642e17c4948ff5aa76967d008f75b470fc74_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:df6bf531755753b224999cb9a5f087c96e8a512666589df4763d4a14941a6f5a_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:f7e87de708186099c76426f24b53395340a672e282615164bac73afca3f36454_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:0350448bf1fb15f26c0d092ceb8b0618932f42d30ca4c7c62f2ec1b86c20dd23_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:4c8c8ef82f2f2685d76a9535523c4c93485329aa23328a68426e93789f363b53_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:7fa04ae06b25476b7b2a3f9e21279202571fd8fc5ff5012c980caf3f33edc0a5_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:8b20b6abf0399bbfc970990bc0c5b6dab46c1043ef761519dbbe8213e6fdd169_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:28aae4d07691c86cdfa9bbfcc7b68e1a3304402ac6c65982bfc0f7945cb9a44e_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:3b78f446debe56d01cd96dc3c3ae225a982ee6abdd7d2fabae553cf4c87e471a_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:cbc542505b4784050c96b3fb31a4867b5d94c8a6957b54a8cfad03bc16a19578_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:e0e44241bde7bfbccea69d06e5fd00ad0a0ab569bef6645687bcadcfc00aa5ef_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:5ccb9e878551c910e3a300ab8043fdc4788381c9515dc9dcaa965a738d2de059_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:7559ec0119f673e243361d4e457a8e9687beb3af60a4fd608fa211539b9034c1_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:808082ac26e53bc7f962428d8e67f721654b732eb1d40fc6e272fcb7f045797c_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:bf282440c8e3ce4d38535bb1efdcbc05f0278647d2fc6e2a13c9c28c0c101f79_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-05-11T11:23:46+00:00",
"details": "The container images provided by this update can be downloaded from the\nRed Hat container registry at registry.redhat.io using the \"podman pull\" command.",
"product_ids": [
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:3d4903b8dbe33464c05ce219ee2e945bf1be169efbed73caee5185883c9df508_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:67d65ecfe844febb7afdfcfbdc0a31f3bd9dfb4c3c81f4734a1b146e34d8d5cb_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:a6a8bbdd49272c632edd96e1598d1e697ba3a1dabb8d36086eced4847de59cbb_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:c27690e36faf7db08a6d398cce7dbedcfe74848224a179c7278b62315516dd4a_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:15979"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:3d4903b8dbe33464c05ce219ee2e945bf1be169efbed73caee5185883c9df508_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:67d65ecfe844febb7afdfcfbdc0a31f3bd9dfb4c3c81f4734a1b146e34d8d5cb_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:a6a8bbdd49272c632edd96e1598d1e697ba3a1dabb8d36086eced4847de59cbb_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:c27690e36faf7db08a6d398cce7dbedcfe74848224a179c7278b62315516dd4a_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:02914a917bbea40c35be2cc7dbaf05c5ac1e1bd30b0e82b4ad9a1c58b99a076b_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:2ce063cc246e7694adf066c17390b4c8d95719b2786267a9db64390407648410_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:aeb508e1309d4a811f881f4028e1c370a5431d290aca2c4af5acdf6a58916a7f_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:fa3c9307038f92e351892be9c73cda40a3bab2038904fabcb97dad5568dcec2d_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:0f37c554cc22c9c89cc4c53739b2ef86e84287486e3f7cdbad10a6e53439d596_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:1a8207fe81e8c5bd63568eddddb41dd0da16d8340c5f5ae3615fe46ae864a163_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:9e15073c7782b0194c06e0b420573e49d5719002417faa567c99ee8409ff590d_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:f76307e201d0b2deaf0aa96bc6b62fc4535c8358b06a8e95ec5a8abf10d2da07_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:5c496cafb1e21883677c6dcb9fd7392383325b8529b98648af757545dfe59488_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:b2875bcf5aee1175faa2ab1ce163642e17c4948ff5aa76967d008f75b470fc74_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:df6bf531755753b224999cb9a5f087c96e8a512666589df4763d4a14941a6f5a_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:f7e87de708186099c76426f24b53395340a672e282615164bac73afca3f36454_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:0350448bf1fb15f26c0d092ceb8b0618932f42d30ca4c7c62f2ec1b86c20dd23_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:4c8c8ef82f2f2685d76a9535523c4c93485329aa23328a68426e93789f363b53_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:7fa04ae06b25476b7b2a3f9e21279202571fd8fc5ff5012c980caf3f33edc0a5_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:8b20b6abf0399bbfc970990bc0c5b6dab46c1043ef761519dbbe8213e6fdd169_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:28aae4d07691c86cdfa9bbfcc7b68e1a3304402ac6c65982bfc0f7945cb9a44e_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:3b78f446debe56d01cd96dc3c3ae225a982ee6abdd7d2fabae553cf4c87e471a_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:cbc542505b4784050c96b3fb31a4867b5d94c8a6957b54a8cfad03bc16a19578_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:e0e44241bde7bfbccea69d06e5fd00ad0a0ab569bef6645687bcadcfc00aa5ef_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:5ccb9e878551c910e3a300ab8043fdc4788381c9515dc9dcaa965a738d2de059_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:7559ec0119f673e243361d4e457a8e9687beb3af60a4fd608fa211539b9034c1_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:808082ac26e53bc7f962428d8e67f721654b732eb1d40fc6e272fcb7f045797c_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:bf282440c8e3ce4d38535bb1efdcbc05f0278647d2fc6e2a13c9c28c0c101f79_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
},
{
"cve": "CVE-2025-64718",
"cwe": {
"id": "CWE-1321",
"name": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)"
},
"discovery_date": "2025-11-13T16:01:24.744054+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:02914a917bbea40c35be2cc7dbaf05c5ac1e1bd30b0e82b4ad9a1c58b99a076b_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:2ce063cc246e7694adf066c17390b4c8d95719b2786267a9db64390407648410_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:aeb508e1309d4a811f881f4028e1c370a5431d290aca2c4af5acdf6a58916a7f_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:fa3c9307038f92e351892be9c73cda40a3bab2038904fabcb97dad5568dcec2d_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:0f37c554cc22c9c89cc4c53739b2ef86e84287486e3f7cdbad10a6e53439d596_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:1a8207fe81e8c5bd63568eddddb41dd0da16d8340c5f5ae3615fe46ae864a163_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:9e15073c7782b0194c06e0b420573e49d5719002417faa567c99ee8409ff590d_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:f76307e201d0b2deaf0aa96bc6b62fc4535c8358b06a8e95ec5a8abf10d2da07_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:5c496cafb1e21883677c6dcb9fd7392383325b8529b98648af757545dfe59488_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:b2875bcf5aee1175faa2ab1ce163642e17c4948ff5aa76967d008f75b470fc74_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:df6bf531755753b224999cb9a5f087c96e8a512666589df4763d4a14941a6f5a_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:f7e87de708186099c76426f24b53395340a672e282615164bac73afca3f36454_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:0350448bf1fb15f26c0d092ceb8b0618932f42d30ca4c7c62f2ec1b86c20dd23_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:4c8c8ef82f2f2685d76a9535523c4c93485329aa23328a68426e93789f363b53_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:7fa04ae06b25476b7b2a3f9e21279202571fd8fc5ff5012c980caf3f33edc0a5_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:8b20b6abf0399bbfc970990bc0c5b6dab46c1043ef761519dbbe8213e6fdd169_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:28aae4d07691c86cdfa9bbfcc7b68e1a3304402ac6c65982bfc0f7945cb9a44e_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:3b78f446debe56d01cd96dc3c3ae225a982ee6abdd7d2fabae553cf4c87e471a_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:cbc542505b4784050c96b3fb31a4867b5d94c8a6957b54a8cfad03bc16a19578_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:e0e44241bde7bfbccea69d06e5fd00ad0a0ab569bef6645687bcadcfc00aa5ef_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:5ccb9e878551c910e3a300ab8043fdc4788381c9515dc9dcaa965a738d2de059_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:7559ec0119f673e243361d4e457a8e9687beb3af60a4fd608fa211539b9034c1_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:808082ac26e53bc7f962428d8e67f721654b732eb1d40fc6e272fcb7f045797c_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:bf282440c8e3ce4d38535bb1efdcbc05f0278647d2fc6e2a13c9c28c0c101f79_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2414854"
}
],
"notes": [
{
"category": "description",
"text": "A prototype pollution flaw has been discovered in the js-yaml npm library. It\u0027s possible for an attacker to modify the prototype of the result of a parsed yaml document via prototype pollution (__proto__). All users who parse untrusted yaml documents may be impacted.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "js-yaml: js-yaml prototype pollution in merge",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:3d4903b8dbe33464c05ce219ee2e945bf1be169efbed73caee5185883c9df508_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:67d65ecfe844febb7afdfcfbdc0a31f3bd9dfb4c3c81f4734a1b146e34d8d5cb_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:a6a8bbdd49272c632edd96e1598d1e697ba3a1dabb8d36086eced4847de59cbb_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:c27690e36faf7db08a6d398cce7dbedcfe74848224a179c7278b62315516dd4a_arm64"
],
"known_not_affected": [
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:02914a917bbea40c35be2cc7dbaf05c5ac1e1bd30b0e82b4ad9a1c58b99a076b_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:2ce063cc246e7694adf066c17390b4c8d95719b2786267a9db64390407648410_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:aeb508e1309d4a811f881f4028e1c370a5431d290aca2c4af5acdf6a58916a7f_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:fa3c9307038f92e351892be9c73cda40a3bab2038904fabcb97dad5568dcec2d_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:0f37c554cc22c9c89cc4c53739b2ef86e84287486e3f7cdbad10a6e53439d596_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:1a8207fe81e8c5bd63568eddddb41dd0da16d8340c5f5ae3615fe46ae864a163_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:9e15073c7782b0194c06e0b420573e49d5719002417faa567c99ee8409ff590d_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:f76307e201d0b2deaf0aa96bc6b62fc4535c8358b06a8e95ec5a8abf10d2da07_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:5c496cafb1e21883677c6dcb9fd7392383325b8529b98648af757545dfe59488_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:b2875bcf5aee1175faa2ab1ce163642e17c4948ff5aa76967d008f75b470fc74_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:df6bf531755753b224999cb9a5f087c96e8a512666589df4763d4a14941a6f5a_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:f7e87de708186099c76426f24b53395340a672e282615164bac73afca3f36454_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:0350448bf1fb15f26c0d092ceb8b0618932f42d30ca4c7c62f2ec1b86c20dd23_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:4c8c8ef82f2f2685d76a9535523c4c93485329aa23328a68426e93789f363b53_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:7fa04ae06b25476b7b2a3f9e21279202571fd8fc5ff5012c980caf3f33edc0a5_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:8b20b6abf0399bbfc970990bc0c5b6dab46c1043ef761519dbbe8213e6fdd169_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:28aae4d07691c86cdfa9bbfcc7b68e1a3304402ac6c65982bfc0f7945cb9a44e_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:3b78f446debe56d01cd96dc3c3ae225a982ee6abdd7d2fabae553cf4c87e471a_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:cbc542505b4784050c96b3fb31a4867b5d94c8a6957b54a8cfad03bc16a19578_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:e0e44241bde7bfbccea69d06e5fd00ad0a0ab569bef6645687bcadcfc00aa5ef_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:5ccb9e878551c910e3a300ab8043fdc4788381c9515dc9dcaa965a738d2de059_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:7559ec0119f673e243361d4e457a8e9687beb3af60a4fd608fa211539b9034c1_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:808082ac26e53bc7f962428d8e67f721654b732eb1d40fc6e272fcb7f045797c_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:bf282440c8e3ce4d38535bb1efdcbc05f0278647d2fc6e2a13c9c28c0c101f79_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-64718"
},
{
"category": "external",
"summary": "RHBZ#2414854",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2414854"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-64718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64718"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-64718",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-64718"
},
{
"category": "external",
"summary": "https://github.com/nodeca/js-yaml/commit/383665ff4248ec2192d1274e934462bb30426879",
"url": "https://github.com/nodeca/js-yaml/commit/383665ff4248ec2192d1274e934462bb30426879"
},
{
"category": "external",
"summary": "https://github.com/nodeca/js-yaml/security/advisories/GHSA-mh29-5h37-fv8m",
"url": "https://github.com/nodeca/js-yaml/security/advisories/GHSA-mh29-5h37-fv8m"
}
],
"release_date": "2025-11-13T15:32:44.634000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-05-11T11:23:46+00:00",
"details": "The container images provided by this update can be downloaded from the\nRed Hat container registry at registry.redhat.io using the \"podman pull\" command.",
"product_ids": [
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:3d4903b8dbe33464c05ce219ee2e945bf1be169efbed73caee5185883c9df508_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:67d65ecfe844febb7afdfcfbdc0a31f3bd9dfb4c3c81f4734a1b146e34d8d5cb_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:a6a8bbdd49272c632edd96e1598d1e697ba3a1dabb8d36086eced4847de59cbb_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:c27690e36faf7db08a6d398cce7dbedcfe74848224a179c7278b62315516dd4a_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:15979"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:3d4903b8dbe33464c05ce219ee2e945bf1be169efbed73caee5185883c9df508_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:67d65ecfe844febb7afdfcfbdc0a31f3bd9dfb4c3c81f4734a1b146e34d8d5cb_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:a6a8bbdd49272c632edd96e1598d1e697ba3a1dabb8d36086eced4847de59cbb_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:c27690e36faf7db08a6d398cce7dbedcfe74848224a179c7278b62315516dd4a_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:02914a917bbea40c35be2cc7dbaf05c5ac1e1bd30b0e82b4ad9a1c58b99a076b_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:2ce063cc246e7694adf066c17390b4c8d95719b2786267a9db64390407648410_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:aeb508e1309d4a811f881f4028e1c370a5431d290aca2c4af5acdf6a58916a7f_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:fa3c9307038f92e351892be9c73cda40a3bab2038904fabcb97dad5568dcec2d_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:0f37c554cc22c9c89cc4c53739b2ef86e84287486e3f7cdbad10a6e53439d596_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:1a8207fe81e8c5bd63568eddddb41dd0da16d8340c5f5ae3615fe46ae864a163_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:9e15073c7782b0194c06e0b420573e49d5719002417faa567c99ee8409ff590d_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:f76307e201d0b2deaf0aa96bc6b62fc4535c8358b06a8e95ec5a8abf10d2da07_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:5c496cafb1e21883677c6dcb9fd7392383325b8529b98648af757545dfe59488_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:b2875bcf5aee1175faa2ab1ce163642e17c4948ff5aa76967d008f75b470fc74_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:df6bf531755753b224999cb9a5f087c96e8a512666589df4763d4a14941a6f5a_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:f7e87de708186099c76426f24b53395340a672e282615164bac73afca3f36454_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:0350448bf1fb15f26c0d092ceb8b0618932f42d30ca4c7c62f2ec1b86c20dd23_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:4c8c8ef82f2f2685d76a9535523c4c93485329aa23328a68426e93789f363b53_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:7fa04ae06b25476b7b2a3f9e21279202571fd8fc5ff5012c980caf3f33edc0a5_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:8b20b6abf0399bbfc970990bc0c5b6dab46c1043ef761519dbbe8213e6fdd169_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:28aae4d07691c86cdfa9bbfcc7b68e1a3304402ac6c65982bfc0f7945cb9a44e_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:3b78f446debe56d01cd96dc3c3ae225a982ee6abdd7d2fabae553cf4c87e471a_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:cbc542505b4784050c96b3fb31a4867b5d94c8a6957b54a8cfad03bc16a19578_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:e0e44241bde7bfbccea69d06e5fd00ad0a0ab569bef6645687bcadcfc00aa5ef_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:5ccb9e878551c910e3a300ab8043fdc4788381c9515dc9dcaa965a738d2de059_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:7559ec0119f673e243361d4e457a8e9687beb3af60a4fd608fa211539b9034c1_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:808082ac26e53bc7f962428d8e67f721654b732eb1d40fc6e272fcb7f045797c_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:bf282440c8e3ce4d38535bb1efdcbc05f0278647d2fc6e2a13c9c28c0c101f79_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:3d4903b8dbe33464c05ce219ee2e945bf1be169efbed73caee5185883c9df508_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:67d65ecfe844febb7afdfcfbdc0a31f3bd9dfb4c3c81f4734a1b146e34d8d5cb_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:a6a8bbdd49272c632edd96e1598d1e697ba3a1dabb8d36086eced4847de59cbb_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:c27690e36faf7db08a6d398cce7dbedcfe74848224a179c7278b62315516dd4a_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:02914a917bbea40c35be2cc7dbaf05c5ac1e1bd30b0e82b4ad9a1c58b99a076b_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:2ce063cc246e7694adf066c17390b4c8d95719b2786267a9db64390407648410_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:aeb508e1309d4a811f881f4028e1c370a5431d290aca2c4af5acdf6a58916a7f_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:fa3c9307038f92e351892be9c73cda40a3bab2038904fabcb97dad5568dcec2d_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:0f37c554cc22c9c89cc4c53739b2ef86e84287486e3f7cdbad10a6e53439d596_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:1a8207fe81e8c5bd63568eddddb41dd0da16d8340c5f5ae3615fe46ae864a163_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:9e15073c7782b0194c06e0b420573e49d5719002417faa567c99ee8409ff590d_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:f76307e201d0b2deaf0aa96bc6b62fc4535c8358b06a8e95ec5a8abf10d2da07_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:5c496cafb1e21883677c6dcb9fd7392383325b8529b98648af757545dfe59488_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:b2875bcf5aee1175faa2ab1ce163642e17c4948ff5aa76967d008f75b470fc74_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:df6bf531755753b224999cb9a5f087c96e8a512666589df4763d4a14941a6f5a_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:f7e87de708186099c76426f24b53395340a672e282615164bac73afca3f36454_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:0350448bf1fb15f26c0d092ceb8b0618932f42d30ca4c7c62f2ec1b86c20dd23_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:4c8c8ef82f2f2685d76a9535523c4c93485329aa23328a68426e93789f363b53_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:7fa04ae06b25476b7b2a3f9e21279202571fd8fc5ff5012c980caf3f33edc0a5_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:8b20b6abf0399bbfc970990bc0c5b6dab46c1043ef761519dbbe8213e6fdd169_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:28aae4d07691c86cdfa9bbfcc7b68e1a3304402ac6c65982bfc0f7945cb9a44e_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:3b78f446debe56d01cd96dc3c3ae225a982ee6abdd7d2fabae553cf4c87e471a_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:cbc542505b4784050c96b3fb31a4867b5d94c8a6957b54a8cfad03bc16a19578_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:e0e44241bde7bfbccea69d06e5fd00ad0a0ab569bef6645687bcadcfc00aa5ef_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:5ccb9e878551c910e3a300ab8043fdc4788381c9515dc9dcaa965a738d2de059_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:7559ec0119f673e243361d4e457a8e9687beb3af60a4fd608fa211539b9034c1_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:808082ac26e53bc7f962428d8e67f721654b732eb1d40fc6e272fcb7f045797c_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:bf282440c8e3ce4d38535bb1efdcbc05f0278647d2fc6e2a13c9c28c0c101f79_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "js-yaml: js-yaml prototype pollution in merge"
},
{
"cve": "CVE-2025-64756",
"cwe": {
"id": "CWE-78",
"name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
},
"discovery_date": "2025-11-17T18:01:28.077927+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:02914a917bbea40c35be2cc7dbaf05c5ac1e1bd30b0e82b4ad9a1c58b99a076b_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:2ce063cc246e7694adf066c17390b4c8d95719b2786267a9db64390407648410_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:aeb508e1309d4a811f881f4028e1c370a5431d290aca2c4af5acdf6a58916a7f_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:fa3c9307038f92e351892be9c73cda40a3bab2038904fabcb97dad5568dcec2d_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:0f37c554cc22c9c89cc4c53739b2ef86e84287486e3f7cdbad10a6e53439d596_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:1a8207fe81e8c5bd63568eddddb41dd0da16d8340c5f5ae3615fe46ae864a163_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:9e15073c7782b0194c06e0b420573e49d5719002417faa567c99ee8409ff590d_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:f76307e201d0b2deaf0aa96bc6b62fc4535c8358b06a8e95ec5a8abf10d2da07_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:5c496cafb1e21883677c6dcb9fd7392383325b8529b98648af757545dfe59488_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:b2875bcf5aee1175faa2ab1ce163642e17c4948ff5aa76967d008f75b470fc74_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:df6bf531755753b224999cb9a5f087c96e8a512666589df4763d4a14941a6f5a_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:f7e87de708186099c76426f24b53395340a672e282615164bac73afca3f36454_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:0350448bf1fb15f26c0d092ceb8b0618932f42d30ca4c7c62f2ec1b86c20dd23_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:4c8c8ef82f2f2685d76a9535523c4c93485329aa23328a68426e93789f363b53_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:7fa04ae06b25476b7b2a3f9e21279202571fd8fc5ff5012c980caf3f33edc0a5_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:8b20b6abf0399bbfc970990bc0c5b6dab46c1043ef761519dbbe8213e6fdd169_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:28aae4d07691c86cdfa9bbfcc7b68e1a3304402ac6c65982bfc0f7945cb9a44e_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:3b78f446debe56d01cd96dc3c3ae225a982ee6abdd7d2fabae553cf4c87e471a_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:cbc542505b4784050c96b3fb31a4867b5d94c8a6957b54a8cfad03bc16a19578_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:e0e44241bde7bfbccea69d06e5fd00ad0a0ab569bef6645687bcadcfc00aa5ef_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:5ccb9e878551c910e3a300ab8043fdc4788381c9515dc9dcaa965a738d2de059_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:7559ec0119f673e243361d4e457a8e9687beb3af60a4fd608fa211539b9034c1_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:808082ac26e53bc7f962428d8e67f721654b732eb1d40fc6e272fcb7f045797c_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:bf282440c8e3ce4d38535bb1efdcbc05f0278647d2fc6e2a13c9c28c0c101f79_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2415451"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in glob. This vulnerability allows arbitrary command execution via processing files with malicious names when the glob command-line interface (CLI) is used with the -c/--cmd option, enabling shell metacharacters to trigger command injection.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "glob: glob: Command Injection Vulnerability via Malicious Filenames",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw in glob allows arbitrary command execution when the `glob` command-line interface is used with the `-c/--cmd` option to process files with malicious names. The vulnerability is triggered by shell metacharacters in filenames, leading to command injection. The glob CLI tool utilizes the -c option to execute shell commands over the files which matched the searched pattern by using the shell:true parameter when creating the subprocess which will further execute the command informed via \u0027-c\u0027 option, this parameter allows the shell meta characters to be used and processed when executing the command. Given that information glob misses to sanitize the file name to eliminate such characters and expressions from the filename, leading to code execution as when performing the shell expansion such characters will be interpreted as shell commands.\n\nTo exploit this vulnerability the targeted system should run the glob CLI over a file with a maliciously crafted filename, additionally the attacker needs to have enough permission to create such file or trick the user to download and process the required file with the glob CLI.\n\nThis flaw is present in the command line interface of the nodejs-glob package. When the package is used by npm, the command line interface is not used at all, so it cannot be triggered. However, the command line interface implementation is still present on the system, but not directly exposed to the user\u0027s $PATH. To reflect this condition, nodejs packages have been rated with a low severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:3d4903b8dbe33464c05ce219ee2e945bf1be169efbed73caee5185883c9df508_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:67d65ecfe844febb7afdfcfbdc0a31f3bd9dfb4c3c81f4734a1b146e34d8d5cb_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:a6a8bbdd49272c632edd96e1598d1e697ba3a1dabb8d36086eced4847de59cbb_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:c27690e36faf7db08a6d398cce7dbedcfe74848224a179c7278b62315516dd4a_arm64"
],
"known_not_affected": [
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:02914a917bbea40c35be2cc7dbaf05c5ac1e1bd30b0e82b4ad9a1c58b99a076b_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:2ce063cc246e7694adf066c17390b4c8d95719b2786267a9db64390407648410_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:aeb508e1309d4a811f881f4028e1c370a5431d290aca2c4af5acdf6a58916a7f_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:fa3c9307038f92e351892be9c73cda40a3bab2038904fabcb97dad5568dcec2d_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:0f37c554cc22c9c89cc4c53739b2ef86e84287486e3f7cdbad10a6e53439d596_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:1a8207fe81e8c5bd63568eddddb41dd0da16d8340c5f5ae3615fe46ae864a163_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:9e15073c7782b0194c06e0b420573e49d5719002417faa567c99ee8409ff590d_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:f76307e201d0b2deaf0aa96bc6b62fc4535c8358b06a8e95ec5a8abf10d2da07_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:5c496cafb1e21883677c6dcb9fd7392383325b8529b98648af757545dfe59488_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:b2875bcf5aee1175faa2ab1ce163642e17c4948ff5aa76967d008f75b470fc74_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:df6bf531755753b224999cb9a5f087c96e8a512666589df4763d4a14941a6f5a_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:f7e87de708186099c76426f24b53395340a672e282615164bac73afca3f36454_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:0350448bf1fb15f26c0d092ceb8b0618932f42d30ca4c7c62f2ec1b86c20dd23_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:4c8c8ef82f2f2685d76a9535523c4c93485329aa23328a68426e93789f363b53_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:7fa04ae06b25476b7b2a3f9e21279202571fd8fc5ff5012c980caf3f33edc0a5_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:8b20b6abf0399bbfc970990bc0c5b6dab46c1043ef761519dbbe8213e6fdd169_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:28aae4d07691c86cdfa9bbfcc7b68e1a3304402ac6c65982bfc0f7945cb9a44e_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:3b78f446debe56d01cd96dc3c3ae225a982ee6abdd7d2fabae553cf4c87e471a_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:cbc542505b4784050c96b3fb31a4867b5d94c8a6957b54a8cfad03bc16a19578_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:e0e44241bde7bfbccea69d06e5fd00ad0a0ab569bef6645687bcadcfc00aa5ef_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:5ccb9e878551c910e3a300ab8043fdc4788381c9515dc9dcaa965a738d2de059_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:7559ec0119f673e243361d4e457a8e9687beb3af60a4fd608fa211539b9034c1_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:808082ac26e53bc7f962428d8e67f721654b732eb1d40fc6e272fcb7f045797c_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:bf282440c8e3ce4d38535bb1efdcbc05f0278647d2fc6e2a13c9c28c0c101f79_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-64756"
},
{
"category": "external",
"summary": "RHBZ#2415451",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2415451"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-64756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64756"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-64756",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-64756"
},
{
"category": "external",
"summary": "https://github.com/isaacs/node-glob/commit/47473c046b91c67269df7a66eab782a6c2716146",
"url": "https://github.com/isaacs/node-glob/commit/47473c046b91c67269df7a66eab782a6c2716146"
},
{
"category": "external",
"summary": "https://github.com/isaacs/node-glob/security/advisories/GHSA-5j98-mcp5-4vw2",
"url": "https://github.com/isaacs/node-glob/security/advisories/GHSA-5j98-mcp5-4vw2"
}
],
"release_date": "2025-11-17T17:29:08.029000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-05-11T11:23:46+00:00",
"details": "The container images provided by this update can be downloaded from the\nRed Hat container registry at registry.redhat.io using the \"podman pull\" command.",
"product_ids": [
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:3d4903b8dbe33464c05ce219ee2e945bf1be169efbed73caee5185883c9df508_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:67d65ecfe844febb7afdfcfbdc0a31f3bd9dfb4c3c81f4734a1b146e34d8d5cb_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:a6a8bbdd49272c632edd96e1598d1e697ba3a1dabb8d36086eced4847de59cbb_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:c27690e36faf7db08a6d398cce7dbedcfe74848224a179c7278b62315516dd4a_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:15979"
},
{
"category": "workaround",
"details": "To mitigate this issue, avoid using the `glob` command-line interface with the `-c` or `--cmd` option when processing filenames from untrusted sources. If programmatic use of `glob` is necessary, ensure that filenames are thoroughly sanitized before being passed to commands executed with shell interpretation enabled.",
"product_ids": [
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:3d4903b8dbe33464c05ce219ee2e945bf1be169efbed73caee5185883c9df508_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:67d65ecfe844febb7afdfcfbdc0a31f3bd9dfb4c3c81f4734a1b146e34d8d5cb_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:a6a8bbdd49272c632edd96e1598d1e697ba3a1dabb8d36086eced4847de59cbb_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:c27690e36faf7db08a6d398cce7dbedcfe74848224a179c7278b62315516dd4a_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:02914a917bbea40c35be2cc7dbaf05c5ac1e1bd30b0e82b4ad9a1c58b99a076b_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:2ce063cc246e7694adf066c17390b4c8d95719b2786267a9db64390407648410_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:aeb508e1309d4a811f881f4028e1c370a5431d290aca2c4af5acdf6a58916a7f_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:fa3c9307038f92e351892be9c73cda40a3bab2038904fabcb97dad5568dcec2d_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:0f37c554cc22c9c89cc4c53739b2ef86e84287486e3f7cdbad10a6e53439d596_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:1a8207fe81e8c5bd63568eddddb41dd0da16d8340c5f5ae3615fe46ae864a163_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:9e15073c7782b0194c06e0b420573e49d5719002417faa567c99ee8409ff590d_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:f76307e201d0b2deaf0aa96bc6b62fc4535c8358b06a8e95ec5a8abf10d2da07_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:5c496cafb1e21883677c6dcb9fd7392383325b8529b98648af757545dfe59488_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:b2875bcf5aee1175faa2ab1ce163642e17c4948ff5aa76967d008f75b470fc74_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:df6bf531755753b224999cb9a5f087c96e8a512666589df4763d4a14941a6f5a_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:f7e87de708186099c76426f24b53395340a672e282615164bac73afca3f36454_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:0350448bf1fb15f26c0d092ceb8b0618932f42d30ca4c7c62f2ec1b86c20dd23_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:4c8c8ef82f2f2685d76a9535523c4c93485329aa23328a68426e93789f363b53_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:7fa04ae06b25476b7b2a3f9e21279202571fd8fc5ff5012c980caf3f33edc0a5_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:8b20b6abf0399bbfc970990bc0c5b6dab46c1043ef761519dbbe8213e6fdd169_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:28aae4d07691c86cdfa9bbfcc7b68e1a3304402ac6c65982bfc0f7945cb9a44e_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:3b78f446debe56d01cd96dc3c3ae225a982ee6abdd7d2fabae553cf4c87e471a_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:cbc542505b4784050c96b3fb31a4867b5d94c8a6957b54a8cfad03bc16a19578_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:e0e44241bde7bfbccea69d06e5fd00ad0a0ab569bef6645687bcadcfc00aa5ef_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:5ccb9e878551c910e3a300ab8043fdc4788381c9515dc9dcaa965a738d2de059_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:7559ec0119f673e243361d4e457a8e9687beb3af60a4fd608fa211539b9034c1_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:808082ac26e53bc7f962428d8e67f721654b732eb1d40fc6e272fcb7f045797c_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:bf282440c8e3ce4d38535bb1efdcbc05f0278647d2fc6e2a13c9c28c0c101f79_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:3d4903b8dbe33464c05ce219ee2e945bf1be169efbed73caee5185883c9df508_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:67d65ecfe844febb7afdfcfbdc0a31f3bd9dfb4c3c81f4734a1b146e34d8d5cb_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:a6a8bbdd49272c632edd96e1598d1e697ba3a1dabb8d36086eced4847de59cbb_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:c27690e36faf7db08a6d398cce7dbedcfe74848224a179c7278b62315516dd4a_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:02914a917bbea40c35be2cc7dbaf05c5ac1e1bd30b0e82b4ad9a1c58b99a076b_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:2ce063cc246e7694adf066c17390b4c8d95719b2786267a9db64390407648410_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:aeb508e1309d4a811f881f4028e1c370a5431d290aca2c4af5acdf6a58916a7f_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:fa3c9307038f92e351892be9c73cda40a3bab2038904fabcb97dad5568dcec2d_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:0f37c554cc22c9c89cc4c53739b2ef86e84287486e3f7cdbad10a6e53439d596_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:1a8207fe81e8c5bd63568eddddb41dd0da16d8340c5f5ae3615fe46ae864a163_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:9e15073c7782b0194c06e0b420573e49d5719002417faa567c99ee8409ff590d_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:f76307e201d0b2deaf0aa96bc6b62fc4535c8358b06a8e95ec5a8abf10d2da07_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:5c496cafb1e21883677c6dcb9fd7392383325b8529b98648af757545dfe59488_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:b2875bcf5aee1175faa2ab1ce163642e17c4948ff5aa76967d008f75b470fc74_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:df6bf531755753b224999cb9a5f087c96e8a512666589df4763d4a14941a6f5a_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:f7e87de708186099c76426f24b53395340a672e282615164bac73afca3f36454_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:0350448bf1fb15f26c0d092ceb8b0618932f42d30ca4c7c62f2ec1b86c20dd23_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:4c8c8ef82f2f2685d76a9535523c4c93485329aa23328a68426e93789f363b53_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:7fa04ae06b25476b7b2a3f9e21279202571fd8fc5ff5012c980caf3f33edc0a5_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:8b20b6abf0399bbfc970990bc0c5b6dab46c1043ef761519dbbe8213e6fdd169_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:28aae4d07691c86cdfa9bbfcc7b68e1a3304402ac6c65982bfc0f7945cb9a44e_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:3b78f446debe56d01cd96dc3c3ae225a982ee6abdd7d2fabae553cf4c87e471a_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:cbc542505b4784050c96b3fb31a4867b5d94c8a6957b54a8cfad03bc16a19578_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:e0e44241bde7bfbccea69d06e5fd00ad0a0ab569bef6645687bcadcfc00aa5ef_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:5ccb9e878551c910e3a300ab8043fdc4788381c9515dc9dcaa965a738d2de059_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:7559ec0119f673e243361d4e457a8e9687beb3af60a4fd608fa211539b9034c1_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:808082ac26e53bc7f962428d8e67f721654b732eb1d40fc6e272fcb7f045797c_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:bf282440c8e3ce4d38535bb1efdcbc05f0278647d2fc6e2a13c9c28c0c101f79_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "glob: glob: Command Injection Vulnerability via Malicious Filenames"
},
{
"cve": "CVE-2025-68156",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2025-12-16T19:01:42.049157+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:02914a917bbea40c35be2cc7dbaf05c5ac1e1bd30b0e82b4ad9a1c58b99a076b_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:2ce063cc246e7694adf066c17390b4c8d95719b2786267a9db64390407648410_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:aeb508e1309d4a811f881f4028e1c370a5431d290aca2c4af5acdf6a58916a7f_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:fa3c9307038f92e351892be9c73cda40a3bab2038904fabcb97dad5568dcec2d_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:0f37c554cc22c9c89cc4c53739b2ef86e84287486e3f7cdbad10a6e53439d596_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:1a8207fe81e8c5bd63568eddddb41dd0da16d8340c5f5ae3615fe46ae864a163_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:9e15073c7782b0194c06e0b420573e49d5719002417faa567c99ee8409ff590d_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:f76307e201d0b2deaf0aa96bc6b62fc4535c8358b06a8e95ec5a8abf10d2da07_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:5c496cafb1e21883677c6dcb9fd7392383325b8529b98648af757545dfe59488_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:b2875bcf5aee1175faa2ab1ce163642e17c4948ff5aa76967d008f75b470fc74_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:df6bf531755753b224999cb9a5f087c96e8a512666589df4763d4a14941a6f5a_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:f7e87de708186099c76426f24b53395340a672e282615164bac73afca3f36454_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:0350448bf1fb15f26c0d092ceb8b0618932f42d30ca4c7c62f2ec1b86c20dd23_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:4c8c8ef82f2f2685d76a9535523c4c93485329aa23328a68426e93789f363b53_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:7fa04ae06b25476b7b2a3f9e21279202571fd8fc5ff5012c980caf3f33edc0a5_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:8b20b6abf0399bbfc970990bc0c5b6dab46c1043ef761519dbbe8213e6fdd169_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:28aae4d07691c86cdfa9bbfcc7b68e1a3304402ac6c65982bfc0f7945cb9a44e_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:3b78f446debe56d01cd96dc3c3ae225a982ee6abdd7d2fabae553cf4c87e471a_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:cbc542505b4784050c96b3fb31a4867b5d94c8a6957b54a8cfad03bc16a19578_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:e0e44241bde7bfbccea69d06e5fd00ad0a0ab569bef6645687bcadcfc00aa5ef_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:5ccb9e878551c910e3a300ab8043fdc4788381c9515dc9dcaa965a738d2de059_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:7559ec0119f673e243361d4e457a8e9687beb3af60a4fd608fa211539b9034c1_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:808082ac26e53bc7f962428d8e67f721654b732eb1d40fc6e272fcb7f045797c_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:bf282440c8e3ce4d38535bb1efdcbc05f0278647d2fc6e2a13c9c28c0c101f79_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2422891"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Expr, an expression language and expression evaluation for Go. This vulnerability allows a denial of service (DoS) via recursive traversal over user-provided deeply nested or cyclic data structures without enforcing a maximum recursion depth, leading to a stack overflow panic and application crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "github.com/expr-lang/expr: Expr: Denial of Service via uncontrolled recursion in expression evaluation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat products utilizing the `Expr` Go library because it can lead to a denial-of-service. Exploitation requires an application to evaluate expressions against untrusted or insufficiently validated data structures containing deeply nested or cyclic references, which can cause a stack overflow and application crash. Products that do not process untrusted input with `Expr` are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:3d4903b8dbe33464c05ce219ee2e945bf1be169efbed73caee5185883c9df508_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:67d65ecfe844febb7afdfcfbdc0a31f3bd9dfb4c3c81f4734a1b146e34d8d5cb_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:a6a8bbdd49272c632edd96e1598d1e697ba3a1dabb8d36086eced4847de59cbb_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:c27690e36faf7db08a6d398cce7dbedcfe74848224a179c7278b62315516dd4a_arm64"
],
"known_not_affected": [
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:02914a917bbea40c35be2cc7dbaf05c5ac1e1bd30b0e82b4ad9a1c58b99a076b_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:2ce063cc246e7694adf066c17390b4c8d95719b2786267a9db64390407648410_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:aeb508e1309d4a811f881f4028e1c370a5431d290aca2c4af5acdf6a58916a7f_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:fa3c9307038f92e351892be9c73cda40a3bab2038904fabcb97dad5568dcec2d_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:0f37c554cc22c9c89cc4c53739b2ef86e84287486e3f7cdbad10a6e53439d596_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:1a8207fe81e8c5bd63568eddddb41dd0da16d8340c5f5ae3615fe46ae864a163_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:9e15073c7782b0194c06e0b420573e49d5719002417faa567c99ee8409ff590d_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:f76307e201d0b2deaf0aa96bc6b62fc4535c8358b06a8e95ec5a8abf10d2da07_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:5c496cafb1e21883677c6dcb9fd7392383325b8529b98648af757545dfe59488_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:b2875bcf5aee1175faa2ab1ce163642e17c4948ff5aa76967d008f75b470fc74_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:df6bf531755753b224999cb9a5f087c96e8a512666589df4763d4a14941a6f5a_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:f7e87de708186099c76426f24b53395340a672e282615164bac73afca3f36454_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:0350448bf1fb15f26c0d092ceb8b0618932f42d30ca4c7c62f2ec1b86c20dd23_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:4c8c8ef82f2f2685d76a9535523c4c93485329aa23328a68426e93789f363b53_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:7fa04ae06b25476b7b2a3f9e21279202571fd8fc5ff5012c980caf3f33edc0a5_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:8b20b6abf0399bbfc970990bc0c5b6dab46c1043ef761519dbbe8213e6fdd169_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:28aae4d07691c86cdfa9bbfcc7b68e1a3304402ac6c65982bfc0f7945cb9a44e_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:3b78f446debe56d01cd96dc3c3ae225a982ee6abdd7d2fabae553cf4c87e471a_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:cbc542505b4784050c96b3fb31a4867b5d94c8a6957b54a8cfad03bc16a19578_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:e0e44241bde7bfbccea69d06e5fd00ad0a0ab569bef6645687bcadcfc00aa5ef_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:5ccb9e878551c910e3a300ab8043fdc4788381c9515dc9dcaa965a738d2de059_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:7559ec0119f673e243361d4e457a8e9687beb3af60a4fd608fa211539b9034c1_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:808082ac26e53bc7f962428d8e67f721654b732eb1d40fc6e272fcb7f045797c_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:bf282440c8e3ce4d38535bb1efdcbc05f0278647d2fc6e2a13c9c28c0c101f79_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-68156"
},
{
"category": "external",
"summary": "RHBZ#2422891",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2422891"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-68156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68156"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-68156",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68156"
},
{
"category": "external",
"summary": "https://github.com/expr-lang/expr/pull/870",
"url": "https://github.com/expr-lang/expr/pull/870"
},
{
"category": "external",
"summary": "https://github.com/expr-lang/expr/security/advisories/GHSA-cfpf-hrx2-8rv6",
"url": "https://github.com/expr-lang/expr/security/advisories/GHSA-cfpf-hrx2-8rv6"
}
],
"release_date": "2025-12-16T18:24:11.648000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-05-11T11:23:46+00:00",
"details": "The container images provided by this update can be downloaded from the\nRed Hat container registry at registry.redhat.io using the \"podman pull\" command.",
"product_ids": [
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:3d4903b8dbe33464c05ce219ee2e945bf1be169efbed73caee5185883c9df508_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:67d65ecfe844febb7afdfcfbdc0a31f3bd9dfb4c3c81f4734a1b146e34d8d5cb_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:a6a8bbdd49272c632edd96e1598d1e697ba3a1dabb8d36086eced4847de59cbb_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:c27690e36faf7db08a6d398cce7dbedcfe74848224a179c7278b62315516dd4a_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:15979"
},
{
"category": "workaround",
"details": "To mitigate this issue, applications using the `Expr` library should ensure that evaluation environments do not contain cyclic references. Additionally, externally supplied data structures must be validated or sanitized before being passed to `Expr` for evaluation. As a last-resort defensive measure, expression evaluation can be wrapped with panic recovery to prevent a full process crash.",
"product_ids": [
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:3d4903b8dbe33464c05ce219ee2e945bf1be169efbed73caee5185883c9df508_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:67d65ecfe844febb7afdfcfbdc0a31f3bd9dfb4c3c81f4734a1b146e34d8d5cb_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:a6a8bbdd49272c632edd96e1598d1e697ba3a1dabb8d36086eced4847de59cbb_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:c27690e36faf7db08a6d398cce7dbedcfe74848224a179c7278b62315516dd4a_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:02914a917bbea40c35be2cc7dbaf05c5ac1e1bd30b0e82b4ad9a1c58b99a076b_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:2ce063cc246e7694adf066c17390b4c8d95719b2786267a9db64390407648410_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:aeb508e1309d4a811f881f4028e1c370a5431d290aca2c4af5acdf6a58916a7f_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:fa3c9307038f92e351892be9c73cda40a3bab2038904fabcb97dad5568dcec2d_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:0f37c554cc22c9c89cc4c53739b2ef86e84287486e3f7cdbad10a6e53439d596_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:1a8207fe81e8c5bd63568eddddb41dd0da16d8340c5f5ae3615fe46ae864a163_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:9e15073c7782b0194c06e0b420573e49d5719002417faa567c99ee8409ff590d_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:f76307e201d0b2deaf0aa96bc6b62fc4535c8358b06a8e95ec5a8abf10d2da07_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:5c496cafb1e21883677c6dcb9fd7392383325b8529b98648af757545dfe59488_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:b2875bcf5aee1175faa2ab1ce163642e17c4948ff5aa76967d008f75b470fc74_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:df6bf531755753b224999cb9a5f087c96e8a512666589df4763d4a14941a6f5a_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:f7e87de708186099c76426f24b53395340a672e282615164bac73afca3f36454_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:0350448bf1fb15f26c0d092ceb8b0618932f42d30ca4c7c62f2ec1b86c20dd23_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:4c8c8ef82f2f2685d76a9535523c4c93485329aa23328a68426e93789f363b53_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:7fa04ae06b25476b7b2a3f9e21279202571fd8fc5ff5012c980caf3f33edc0a5_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:8b20b6abf0399bbfc970990bc0c5b6dab46c1043ef761519dbbe8213e6fdd169_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:28aae4d07691c86cdfa9bbfcc7b68e1a3304402ac6c65982bfc0f7945cb9a44e_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:3b78f446debe56d01cd96dc3c3ae225a982ee6abdd7d2fabae553cf4c87e471a_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:cbc542505b4784050c96b3fb31a4867b5d94c8a6957b54a8cfad03bc16a19578_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:e0e44241bde7bfbccea69d06e5fd00ad0a0ab569bef6645687bcadcfc00aa5ef_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:5ccb9e878551c910e3a300ab8043fdc4788381c9515dc9dcaa965a738d2de059_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:7559ec0119f673e243361d4e457a8e9687beb3af60a4fd608fa211539b9034c1_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:808082ac26e53bc7f962428d8e67f721654b732eb1d40fc6e272fcb7f045797c_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:bf282440c8e3ce4d38535bb1efdcbc05f0278647d2fc6e2a13c9c28c0c101f79_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:3d4903b8dbe33464c05ce219ee2e945bf1be169efbed73caee5185883c9df508_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:67d65ecfe844febb7afdfcfbdc0a31f3bd9dfb4c3c81f4734a1b146e34d8d5cb_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:a6a8bbdd49272c632edd96e1598d1e697ba3a1dabb8d36086eced4847de59cbb_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/grafana-rhel9@sha256:c27690e36faf7db08a6d398cce7dbedcfe74848224a179c7278b62315516dd4a_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:02914a917bbea40c35be2cc7dbaf05c5ac1e1bd30b0e82b4ad9a1c58b99a076b_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:2ce063cc246e7694adf066c17390b4c8d95719b2786267a9db64390407648410_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:aeb508e1309d4a811f881f4028e1c370a5431d290aca2c4af5acdf6a58916a7f_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/keepalived-rhel9@sha256:fa3c9307038f92e351892be9c73cda40a3bab2038904fabcb97dad5568dcec2d_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:0f37c554cc22c9c89cc4c53739b2ef86e84287486e3f7cdbad10a6e53439d596_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:1a8207fe81e8c5bd63568eddddb41dd0da16d8340c5f5ae3615fe46ae864a163_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:9e15073c7782b0194c06e0b420573e49d5719002417faa567c99ee8409ff590d_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/oauth2-proxy-rhel9@sha256:f76307e201d0b2deaf0aa96bc6b62fc4535c8358b06a8e95ec5a8abf10d2da07_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:5c496cafb1e21883677c6dcb9fd7392383325b8529b98648af757545dfe59488_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:b2875bcf5aee1175faa2ab1ce163642e17c4948ff5aa76967d008f75b470fc74_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:df6bf531755753b224999cb9a5f087c96e8a512666589df4763d4a14941a6f5a_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:f7e87de708186099c76426f24b53395340a672e282615164bac73afca3f36454_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:0350448bf1fb15f26c0d092ceb8b0618932f42d30ca4c7c62f2ec1b86c20dd23_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:4c8c8ef82f2f2685d76a9535523c4c93485329aa23328a68426e93789f363b53_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:7fa04ae06b25476b7b2a3f9e21279202571fd8fc5ff5012c980caf3f33edc0a5_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:8b20b6abf0399bbfc970990bc0c5b6dab46c1043ef761519dbbe8213e6fdd169_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:28aae4d07691c86cdfa9bbfcc7b68e1a3304402ac6c65982bfc0f7945cb9a44e_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:3b78f446debe56d01cd96dc3c3ae225a982ee6abdd7d2fabae553cf4c87e471a_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:cbc542505b4784050c96b3fb31a4867b5d94c8a6957b54a8cfad03bc16a19578_ppc64le",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:e0e44241bde7bfbccea69d06e5fd00ad0a0ab569bef6645687bcadcfc00aa5ef_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:5ccb9e878551c910e3a300ab8043fdc4788381c9515dc9dcaa965a738d2de059_s390x",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:7559ec0119f673e243361d4e457a8e9687beb3af60a4fd608fa211539b9034c1_arm64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:808082ac26e53bc7f962428d8e67f721654b732eb1d40fc6e272fcb7f045797c_amd64",
"Red Hat Ceph Storage 8.1:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:bf282440c8e3ce4d38535bb1efdcbc05f0278647d2fc6e2a13c9c28c0c101f79_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "github.com/expr-lang/expr: Expr: Denial of Service via uncontrolled recursion in expression evaluation"
}
]
}
RHSA-2026:3751
Vulnerability from csaf_redhat - Published: 2026-03-04 15:00 - Updated: 2026-05-11 11:27A flaw was found in the prism-autoloader plugin of the Prism library. The prism-autoloader plugin uses `document.currentScript` as the base URL for dynamically loading other dependencies and, in certain circumstances, can be vulnerable to a DOM Clobbering attack. This issue could lead to Cross-site scripting (XSS) attacks on web pages that embed Prism and allow users to inject scriptless HTML elements, such as an `img` tag with a controlled `name` attribute.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:141aeba778033153ed7005785565c8f3a00f6353be7bb3fd9124d8ad9375d988_amd64 | — |
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:be3276aa08b84a3e897b53d27d270285a6a36012ad4444b9ee3ee97a90ab9a1a_amd64 | — | ||
| Unresolved product id: Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:c963d74818ba253dc900389712e83ee14b0d1cf499a188e16de48db826685014_amd64 | — |
A vulnerability was identified in the email parsing library due to improper handling of specially formatted recipient email addresses. An attacker can exploit this flaw by crafting a recipient address that embeds an external address within quotes. This causes the application to misdirect the email to the attacker's external address instead of the intended internal recipient. This could lead to a significant data leak of sensitive information and allow an attacker to bypass security filters and access controls.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:141aeba778033153ed7005785565c8f3a00f6353be7bb3fd9124d8ad9375d988_amd64 | — |
Vendor Fix
fix
Workaround
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:be3276aa08b84a3e897b53d27d270285a6a36012ad4444b9ee3ee97a90ab9a1a_amd64 | — |
Workaround
|
|
| Unresolved product id: Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:c963d74818ba253dc900389712e83ee14b0d1cf499a188e16de48db826685014_amd64 | — |
Workaround
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat Developer Hub 1.9.0 has been released.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat Developer Hub (RHDH) is Red Hat\u0027s enterprise-grade, self-managed, customizable developer portal based on Backstage.io. RHDH is supported on OpenShift and other major Kubernetes clusters (AKS, EKS, GKE). The core features of RHDH include a single pane of glass, a centralized software catalog, self-service via golden path templates, and Tech Docs. RHDH is extensible by plugins.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:3751",
"url": "https://access.redhat.com/errata/RHSA-2026:3751"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2024-53382",
"url": "https://access.redhat.com/security/cve/CVE-2024-53382"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-13033",
"url": "https://access.redhat.com/security/cve/CVE-2025-13033"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "external",
"summary": "https://catalog.redhat.com/search?gs\u0026searchType=containers\u0026q=rhdh",
"url": "https://catalog.redhat.com/search?gs\u0026searchType=containers\u0026q=rhdh"
},
{
"category": "external",
"summary": "https://developers.redhat.com/rhdh/overview",
"url": "https://developers.redhat.com/rhdh/overview"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/red_hat_developer_hub",
"url": "https://docs.redhat.com/en/documentation/red_hat_developer_hub"
},
{
"category": "external",
"summary": "https://issues.redhat.com/browse/RHDHBUGS-2399",
"url": "https://issues.redhat.com/browse/RHDHBUGS-2399"
},
{
"category": "external",
"summary": "https://issues.redhat.com/browse/RHDHPLAN-257",
"url": "https://issues.redhat.com/browse/RHDHPLAN-257"
},
{
"category": "external",
"summary": "https://issues.redhat.com/browse/RHIDP-9819",
"url": "https://issues.redhat.com/browse/RHIDP-9819"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_3751.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Developer Hub 1.9.0 release.",
"tracking": {
"current_release_date": "2026-05-11T11:27:39+00:00",
"generator": {
"date": "2026-05-11T11:27:39+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.9"
}
},
"id": "RHSA-2026:3751",
"initial_release_date": "2026-03-04T15:00:31+00:00",
"revision_history": [
{
"date": "2026-03-04T15:00:31+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-03-04T15:00:38+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-05-11T11:27:39+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Developer Hub 1.9",
"product": {
"name": "Red Hat Developer Hub 1.9",
"product_id": "Red Hat Developer Hub 1.9",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhdh:1.9::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat Developer Hub"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:141aeba778033153ed7005785565c8f3a00f6353be7bb3fd9124d8ad9375d988_amd64",
"product": {
"name": "registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:141aeba778033153ed7005785565c8f3a00f6353be7bb3fd9124d8ad9375d988_amd64",
"product_id": "registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:141aeba778033153ed7005785565c8f3a00f6353be7bb3fd9124d8ad9375d988_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rhdh-hub-rhel9@sha256%3A141aeba778033153ed7005785565c8f3a00f6353be7bb3fd9124d8ad9375d988?arch=amd64\u0026repository_url=registry.redhat.io/rhdh\u0026tag=1772573159"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:c963d74818ba253dc900389712e83ee14b0d1cf499a188e16de48db826685014_amd64",
"product": {
"name": "registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:c963d74818ba253dc900389712e83ee14b0d1cf499a188e16de48db826685014_amd64",
"product_id": "registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:c963d74818ba253dc900389712e83ee14b0d1cf499a188e16de48db826685014_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rhdh-rhel9-operator@sha256%3Ac963d74818ba253dc900389712e83ee14b0d1cf499a188e16de48db826685014?arch=amd64\u0026repository_url=registry.redhat.io/rhdh\u0026tag=1772575881"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:be3276aa08b84a3e897b53d27d270285a6a36012ad4444b9ee3ee97a90ab9a1a_amd64",
"product": {
"name": "registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:be3276aa08b84a3e897b53d27d270285a6a36012ad4444b9ee3ee97a90ab9a1a_amd64",
"product_id": "registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:be3276aa08b84a3e897b53d27d270285a6a36012ad4444b9ee3ee97a90ab9a1a_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rhdh-operator-bundle@sha256%3Abe3276aa08b84a3e897b53d27d270285a6a36012ad4444b9ee3ee97a90ab9a1a?arch=amd64\u0026repository_url=registry.redhat.io/rhdh\u0026tag=1772578053"
}
}
}
],
"category": "architecture",
"name": "amd64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:141aeba778033153ed7005785565c8f3a00f6353be7bb3fd9124d8ad9375d988_amd64 as a component of Red Hat Developer Hub 1.9",
"product_id": "Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:141aeba778033153ed7005785565c8f3a00f6353be7bb3fd9124d8ad9375d988_amd64"
},
"product_reference": "registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:141aeba778033153ed7005785565c8f3a00f6353be7bb3fd9124d8ad9375d988_amd64",
"relates_to_product_reference": "Red Hat Developer Hub 1.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:be3276aa08b84a3e897b53d27d270285a6a36012ad4444b9ee3ee97a90ab9a1a_amd64 as a component of Red Hat Developer Hub 1.9",
"product_id": "Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:be3276aa08b84a3e897b53d27d270285a6a36012ad4444b9ee3ee97a90ab9a1a_amd64"
},
"product_reference": "registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:be3276aa08b84a3e897b53d27d270285a6a36012ad4444b9ee3ee97a90ab9a1a_amd64",
"relates_to_product_reference": "Red Hat Developer Hub 1.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:c963d74818ba253dc900389712e83ee14b0d1cf499a188e16de48db826685014_amd64 as a component of Red Hat Developer Hub 1.9",
"product_id": "Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:c963d74818ba253dc900389712e83ee14b0d1cf499a188e16de48db826685014_amd64"
},
"product_reference": "registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:c963d74818ba253dc900389712e83ee14b0d1cf499a188e16de48db826685014_amd64",
"relates_to_product_reference": "Red Hat Developer Hub 1.9"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-53382",
"cwe": {
"id": "CWE-94",
"name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
},
"discovery_date": "2025-03-03T07:00:37.175156+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:be3276aa08b84a3e897b53d27d270285a6a36012ad4444b9ee3ee97a90ab9a1a_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:c963d74818ba253dc900389712e83ee14b0d1cf499a188e16de48db826685014_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2349390"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the prism-autoloader plugin of the Prism library. The prism-autoloader plugin uses `document.currentScript` as the base URL for dynamically loading other dependencies and, in certain circumstances, can be vulnerable to a DOM Clobbering attack. This issue could lead to Cross-site scripting (XSS) attacks on web pages that embed Prism and allow users to inject scriptless HTML elements, such as an `img` tag with a controlled `name` attribute.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "prismjs: DOM Clobbering vulnerability within the Prism library\u0027s prism-autoloader plugin",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:141aeba778033153ed7005785565c8f3a00f6353be7bb3fd9124d8ad9375d988_amd64"
],
"known_not_affected": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:be3276aa08b84a3e897b53d27d270285a6a36012ad4444b9ee3ee97a90ab9a1a_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:c963d74818ba253dc900389712e83ee14b0d1cf499a188e16de48db826685014_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-53382"
},
{
"category": "external",
"summary": "RHBZ#2349390",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2349390"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-53382",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53382"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-53382",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-53382"
},
{
"category": "external",
"summary": "https://gist.github.com/jackfromeast/aeb128e44f05f95828a1a824708df660",
"url": "https://gist.github.com/jackfromeast/aeb128e44f05f95828a1a824708df660"
},
{
"category": "external",
"summary": "https://github.com/PrismJS/prism/blob/59e5a3471377057de1f401ba38337aca27b80e03/prism.js#L226-L259",
"url": "https://github.com/PrismJS/prism/blob/59e5a3471377057de1f401ba38337aca27b80e03/prism.js#L226-L259"
}
],
"release_date": "2025-03-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-04T15:00:31+00:00",
"details": "For more about Red Hat Developer Hub, see References links",
"product_ids": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:141aeba778033153ed7005785565c8f3a00f6353be7bb3fd9124d8ad9375d988_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3751"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:141aeba778033153ed7005785565c8f3a00f6353be7bb3fd9124d8ad9375d988_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:be3276aa08b84a3e897b53d27d270285a6a36012ad4444b9ee3ee97a90ab9a1a_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:c963d74818ba253dc900389712e83ee14b0d1cf499a188e16de48db826685014_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "prismjs: DOM Clobbering vulnerability within the Prism library\u0027s prism-autoloader plugin"
},
{
"cve": "CVE-2025-13033",
"cwe": {
"id": "CWE-1286",
"name": "Improper Validation of Syntactic Correctness of Input"
},
"discovery_date": "2025-10-07T15:03:14.483722+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:be3276aa08b84a3e897b53d27d270285a6a36012ad4444b9ee3ee97a90ab9a1a_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:c963d74818ba253dc900389712e83ee14b0d1cf499a188e16de48db826685014_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2402179"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was identified in the email parsing library due to improper handling of specially formatted recipient email addresses. An attacker can exploit this flaw by crafting a recipient address that embeds an external address within quotes. This causes the application to misdirect the email to the attacker\u0027s external address instead of the intended internal recipient. This could lead to a significant data leak of sensitive information and allow an attacker to bypass security filters and access controls.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodemailer: Nodemailer: Email to an unintended domain can occur due to Interpretation Conflict",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability allows an attacker to force nodemailer to send an email to an attacker-owned email address by leveraging the incorrect handling of quoted local-parts containing the \u0027@\u0027 character in the destination email address. When successfully exploited, this vulnerability may allow an attacker to exfiltrate data by misrouting emails to an unintended domain, presenting a high impact on data confidentiality.\n\nThis vulnerability has been assessed as having a Moderate impact on Red Hat Products by the Red Hat Product Security team. This is because for an attacker successfully exploit this vulnerability, the malicious actor needs to have direct control over the destination email input.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:141aeba778033153ed7005785565c8f3a00f6353be7bb3fd9124d8ad9375d988_amd64"
],
"known_not_affected": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:be3276aa08b84a3e897b53d27d270285a6a36012ad4444b9ee3ee97a90ab9a1a_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:c963d74818ba253dc900389712e83ee14b0d1cf499a188e16de48db826685014_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-13033"
},
{
"category": "external",
"summary": "RHBZ#2402179",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402179"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-13033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13033"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-13033",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-13033"
},
{
"category": "external",
"summary": "https://github.com/nodemailer/nodemailer",
"url": "https://github.com/nodemailer/nodemailer"
},
{
"category": "external",
"summary": "https://github.com/nodemailer/nodemailer/commit/1150d99fba77280df2cfb1885c43df23109a8626",
"url": "https://github.com/nodemailer/nodemailer/commit/1150d99fba77280df2cfb1885c43df23109a8626"
},
{
"category": "external",
"summary": "https://github.com/nodemailer/nodemailer/security/advisories/GHSA-mm7p-fcc7-pg87",
"url": "https://github.com/nodemailer/nodemailer/security/advisories/GHSA-mm7p-fcc7-pg87"
}
],
"release_date": "2025-10-07T13:42:02+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-04T15:00:31+00:00",
"details": "For more about Red Hat Developer Hub, see References links",
"product_ids": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:141aeba778033153ed7005785565c8f3a00f6353be7bb3fd9124d8ad9375d988_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3751"
},
{
"category": "workaround",
"details": "Currently there\u0027s no available mitigation for this flaw.",
"product_ids": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:141aeba778033153ed7005785565c8f3a00f6353be7bb3fd9124d8ad9375d988_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:be3276aa08b84a3e897b53d27d270285a6a36012ad4444b9ee3ee97a90ab9a1a_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:c963d74818ba253dc900389712e83ee14b0d1cf499a188e16de48db826685014_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:141aeba778033153ed7005785565c8f3a00f6353be7bb3fd9124d8ad9375d988_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:be3276aa08b84a3e897b53d27d270285a6a36012ad4444b9ee3ee97a90ab9a1a_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:c963d74818ba253dc900389712e83ee14b0d1cf499a188e16de48db826685014_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nodemailer: Nodemailer: Email to an unintended domain can occur due to Interpretation Conflict"
}
]
}
CERTFR-2026-AVI-0281
Vulnerability from certfr_avis - Published: 2026-03-12 - Updated: 2026-03-12
De multiples vulnérabilités ont été découvertes dans les produits Splunk. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une atteinte à la confidentialité des données et une injection de code indirecte à distance (XSS).
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Splunk | Splunk AppDynamics Private Synthetic Agent | Splunk AppDynamics Private Synthetic Agent versions 26.1.x antérieures à 26.1.0 | ||
| Splunk | Splunk AppDynamics On-Premises Enterprise Console | Splunk AppDynamics On-Premises Enterprise Console versions 26.1.x antérieures à 26.1.1 | ||
| Splunk | Splunk AppDynamics Database Agent | Splunk AppDynamics Database Agent versions 26.1.x antérieures à 26.1.0 | ||
| Splunk | Splunk Cloud Platform | Splunk Cloud Platform versions 10.0.2503 antérieures à 10.0.2503.12 | ||
| Splunk | Splunk Cloud Platform | Splunk Cloud Platform versions 9.3.2411 antérieures à 9.3.2411.124 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise versions 9.4.x antérieures à 9.4.9 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise versions 10.2.x antérieures à 10.2.1 | ||
| Splunk | Splunk AppDynamics NodeJS Agent | Splunk AppDynamics NodeJS Agent versions 25.12.x antérieures à 25.12.1 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise versions 10.0.x antérieures à 10.0.4 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise versions 9.3.x antérieures à 9.3.10 | ||
| Splunk | Splunk Cloud Platform | Splunk Cloud Platform versions 10.1.2507 antérieures à 10.1.2507.17 | ||
| Splunk | Splunk AppDynamics Java Agent | Splunk AppDynamics Java Agent versions 26.1.x antérieures à 26.1.0 | ||
| Splunk | Splunk Cloud Platform | Splunk Cloud Platform versions 10.2.2510 antérieures à 10.2.2510.7 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Splunk AppDynamics Private Synthetic Agent versions 26.1.x ant\u00e9rieures \u00e0 26.1.0",
"product": {
"name": "Splunk AppDynamics Private Synthetic Agent",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk AppDynamics On-Premises Enterprise Console versions 26.1.x ant\u00e9rieures \u00e0 26.1.1",
"product": {
"name": "Splunk AppDynamics On-Premises Enterprise Console",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk AppDynamics Database Agent versions 26.1.x ant\u00e9rieures \u00e0 26.1.0",
"product": {
"name": "Splunk AppDynamics Database Agent",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Cloud Platform versions 10.0.2503 ant\u00e9rieures \u00e0 10.0.2503.12",
"product": {
"name": "Splunk Cloud Platform",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Cloud Platform versions 9.3.2411 ant\u00e9rieures \u00e0 9.3.2411.124",
"product": {
"name": "Splunk Cloud Platform",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise versions 9.4.x ant\u00e9rieures \u00e0 9.4.9",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise versions 10.2.x ant\u00e9rieures \u00e0 10.2.1",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk AppDynamics NodeJS Agent versions 25.12.x ant\u00e9rieures \u00e0 25.12.1",
"product": {
"name": "Splunk AppDynamics NodeJS Agent",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise versions 10.0.x ant\u00e9rieures \u00e0 10.0.4",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise versions 9.3.x ant\u00e9rieures \u00e0 9.3.10",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Cloud Platform versions 10.1.2507 ant\u00e9rieures \u00e0 10.1.2507.17",
"product": {
"name": "Splunk Cloud Platform",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk AppDynamics Java Agent versions 26.1.x ant\u00e9rieures \u00e0 26.1.0",
"product": {
"name": "Splunk AppDynamics Java Agent",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Cloud Platform versions 10.2.2510 ant\u00e9rieures \u00e0 10.2.2510.7",
"product": {
"name": "Splunk Cloud Platform",
"vendor": {
"name": "Splunk",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-6395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6395"
},
{
"name": "CVE-2018-16864",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16864"
},
{
"name": "CVE-2025-48073",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48073"
},
{
"name": "CVE-2025-31651",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31651"
},
{
"name": "CVE-2025-11219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11219"
},
{
"name": "CVE-2026-21933",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21933"
},
{
"name": "CVE-2025-58183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58183"
},
{
"name": "CVE-2026-21932",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21932"
},
{
"name": "CVE-2025-66199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66199"
},
{
"name": "CVE-2025-53042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53042"
},
{
"name": "CVE-2025-9231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9231"
},
{
"name": "CVE-2025-1594",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1594"
},
{
"name": "CVE-2025-3887",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3887"
},
{
"name": "CVE-2025-68973",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68973"
},
{
"name": "CVE-2025-4574",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4574"
},
{
"name": "CVE-2025-9714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9714"
},
{
"name": "CVE-2025-10148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10148"
},
{
"name": "CVE-2025-14087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14087"
},
{
"name": "CVE-2025-12433",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12433"
},
{
"name": "CVE-2025-12444",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12444"
},
{
"name": "CVE-2023-33201",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33201"
},
{
"name": "CVE-2024-38286",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38286"
},
{
"name": "CVE-2025-11213",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11213"
},
{
"name": "CVE-2025-8556",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8556"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2025-12036",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12036"
},
{
"name": "CVE-2012-0871",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0871"
},
{
"name": "CVE-2025-4056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4056"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2025-53062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53062"
},
{
"name": "CVE-2025-0518",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0518"
},
{
"name": "CVE-2025-69223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69223"
},
{
"name": "CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"name": "CVE-2025-12084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12084"
},
{
"name": "CVE-2018-15688",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15688"
},
{
"name": "CVE-2025-45582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45582"
},
{
"name": "CVE-2025-12438",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12438"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2023-26464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26464"
},
{
"name": "CVE-2025-69419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69419"
},
{
"name": "CVE-2025-24813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24813"
},
{
"name": "CVE-2025-12435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12435"
},
{
"name": "CVE-2025-6075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6075"
},
{
"name": "CVE-2013-4394",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4394"
},
{
"name": "CVE-2019-20386",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20386"
},
{
"name": "CVE-2025-64183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64183"
},
{
"name": "CVE-2025-13226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13226"
},
{
"name": "CVE-2025-58185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58185"
},
{
"name": "CVE-2025-47808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47808"
},
{
"name": "CVE-2021-46877",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46877"
},
{
"name": "CVE-2026-2391",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2391"
},
{
"name": "CVE-2017-18078",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18078"
},
{
"name": "CVE-2025-55752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55752"
},
{
"name": "CVE-2025-53905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53905"
},
{
"name": "CVE-2019-17571",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17571"
},
{
"name": "CVE-2025-11207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11207"
},
{
"name": "CVE-2021-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35939"
},
{
"name": "CVE-2025-13223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13223"
},
{
"name": "CVE-2025-12431",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12431"
},
{
"name": "CVE-2026-23745",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23745"
},
{
"name": "CVE-2025-15467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15467"
},
{
"name": "CVE-2024-58251",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58251"
},
{
"name": "CVE-2025-9820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9820"
},
{
"name": "CVE-2024-7246",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7246"
},
{
"name": "CVE-2025-4598",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4598"
},
{
"name": "CVE-2026-21226",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21226"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2024-29857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
},
{
"name": "CVE-2023-33202",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33202"
},
{
"name": "CVE-2025-12726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12726"
},
{
"name": "CVE-2025-12445",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12445"
},
{
"name": "CVE-2025-12437",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12437"
},
{
"name": "CVE-2025-15284",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15284"
},
{
"name": "CVE-2025-69230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69230"
},
{
"name": "CVE-2025-49125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49125"
},
{
"name": "CVE-2025-50106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50106"
},
{
"name": "CVE-2025-14512",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14512"
},
{
"name": "CVE-2025-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58057"
},
{
"name": "CVE-2025-8291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8291"
},
{
"name": "CVE-2026-22795",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22795"
},
{
"name": "CVE-2026-21925",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21925"
},
{
"name": "CVE-2025-0716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0716"
},
{
"name": "CVE-2025-64718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64718"
},
{
"name": "CVE-2025-30754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30754"
},
{
"name": "CVE-2025-12434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12434"
},
{
"name": "CVE-2025-69225",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69225"
},
{
"name": "CVE-2025-47910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47910"
},
{
"name": "CVE-2025-12439",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12439"
},
{
"name": "CVE-2018-16865",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16865"
},
{
"name": "CVE-2025-14874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14874"
},
{
"name": "CVE-2020-17521",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-17521"
},
{
"name": "CVE-2024-54677",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54677"
},
{
"name": "CVE-2025-48072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48072"
},
{
"name": "CVE-2024-51744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51744"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2025-12432",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12432"
},
{
"name": "CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"name": "CVE-2025-10966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10966"
},
{
"name": "CVE-2025-47906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47906"
},
{
"name": "CVE-2026-20165",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20165"
},
{
"name": "CVE-2025-59375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59375"
},
{
"name": "CVE-2025-22919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22919"
},
{
"name": "CVE-2024-23672",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23672"
},
{
"name": "CVE-2025-69227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69227"
},
{
"name": "CVE-2021-33910",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33910"
},
{
"name": "CVE-2025-69421",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69421"
},
{
"name": "CVE-2025-58188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58188"
},
{
"name": "CVE-2025-48964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48964"
},
{
"name": "CVE-2025-12443",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12443"
},
{
"name": "CVE-2025-4565",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4565"
},
{
"name": "CVE-2024-56433",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56433"
},
{
"name": "CVE-2023-6602",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6602"
},
{
"name": "CVE-2025-11215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11215"
},
{
"name": "CVE-2013-4393",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4393"
},
{
"name": "CVE-2019-3842",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3842"
},
{
"name": "CVE-2025-11205",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11205"
},
{
"name": "CVE-2025-55754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55754"
},
{
"name": "CVE-2025-12725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12725"
},
{
"name": "CVE-2022-23305",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23305"
},
{
"name": "CVE-2025-11208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11208"
},
{
"name": "CVE-2025-68161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68161"
},
{
"name": "CVE-2024-8372",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8372"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2024-56337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56337"
},
{
"name": "CVE-2025-3360",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3360"
},
{
"name": "CVE-2026-22796",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22796"
},
{
"name": "CVE-2025-11756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11756"
},
{
"name": "CVE-2025-59730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59730"
},
{
"name": "CVE-2025-61724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61724"
},
{
"name": "CVE-2024-5642",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5642"
},
{
"name": "CVE-2020-13776",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13776"
},
{
"name": "CVE-2025-13033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13033"
},
{
"name": "CVE-2022-23307",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23307"
},
{
"name": "CVE-2025-61723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61723"
},
{
"name": "CVE-2025-9232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9232"
},
{
"name": "CVE-2025-11212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11212"
},
{
"name": "CVE-2025-12495",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12495"
},
{
"name": "CVE-2025-61795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61795"
},
{
"name": "CVE-2025-46394",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46394"
},
{
"name": "CVE-2021-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35937"
},
{
"name": "CVE-2025-12840",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12840"
},
{
"name": "CVE-2025-52520",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52520"
},
{
"name": "CVE-2025-61725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61725"
},
{
"name": "CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"name": "CVE-2025-11458",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11458"
},
{
"name": "CVE-2020-1712",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1712"
},
{
"name": "CVE-2025-32990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32990"
},
{
"name": "CVE-2025-12429",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12429"
},
{
"name": "CVE-2026-20164",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20164"
},
{
"name": "CVE-2025-48989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48989"
},
{
"name": "CVE-2026-24842",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24842"
},
{
"name": "CVE-2025-11211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11211"
},
{
"name": "CVE-2025-32989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32989"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2025-53069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53069"
},
{
"name": "CVE-2026-23950",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23950"
},
{
"name": "CVE-2023-26118",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26118"
},
{
"name": "CVE-2025-50059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50059"
},
{
"name": "CVE-2025-69228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69228"
},
{
"name": "CVE-2025-59250",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59250"
},
{
"name": "CVE-2025-14104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14104"
},
{
"name": "CVE-2025-53044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53044"
},
{
"name": "CVE-2025-47807",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47807"
},
{
"name": "CVE-2025-47806",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47806"
},
{
"name": "CVE-2025-47912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47912"
},
{
"name": "CVE-2025-64182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64182"
},
{
"name": "CVE-2023-52428",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52428"
},
{
"name": "CVE-2023-6604",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6604"
},
{
"name": "CVE-2025-48988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48988"
},
{
"name": "CVE-2025-68160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68160"
},
{
"name": "CVE-2022-3821",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3821"
},
{
"name": "CVE-2017-9217",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9217"
},
{
"name": "CVE-2025-60753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-60753"
},
{
"name": "CVE-2025-64181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64181"
},
{
"name": "CVE-2025-67735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-67735"
},
{
"name": "CVE-2025-12436",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12436"
},
{
"name": "CVE-2022-42004",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42004"
},
{
"name": "CVE-2025-13230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13230"
},
{
"name": "CVE-2013-4327",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4327"
},
{
"name": "CVE-2025-58186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58186"
},
{
"name": "CVE-2025-9086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9086"
},
{
"name": "CVE-2025-12446",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12446"
},
{
"name": "CVE-2025-13228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13228"
},
{
"name": "CVE-2013-4391",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4391"
},
{
"name": "CVE-2026-20166",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20166"
},
{
"name": "CVE-2025-58187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58187"
},
{
"name": "CVE-2025-12441",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12441"
},
{
"name": "CVE-2024-29371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29371"
},
{
"name": "CVE-2025-47183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47183"
},
{
"name": "CVE-2025-13601",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13601"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2023-6601",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6601"
},
{
"name": "CVE-2018-16888",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16888"
},
{
"name": "CVE-2025-58056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58056"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2025-69226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69226"
},
{
"name": "CVE-2025-32988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32988"
},
{
"name": "CVE-2025-13224",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13224"
},
{
"name": "CVE-2025-13042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13042"
},
{
"name": "CVE-2024-34750",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34750"
},
{
"name": "CVE-2025-11460",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11460"
},
{
"name": "CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"name": "CVE-2025-47913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47913"
},
{
"name": "CVE-2025-13229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13229"
},
{
"name": "CVE-2024-24549",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24549"
},
{
"name": "CVE-2025-12440",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12440"
},
{
"name": "CVE-2025-58181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58181"
},
{
"name": "CVE-2025-53054",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53054"
},
{
"name": "CVE-2025-11216",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11216"
},
{
"name": "CVE-2025-47914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47914"
},
{
"name": "CVE-2018-1049",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1049"
},
{
"name": "CVE-2025-69418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69418"
},
{
"name": "CVE-2025-8114",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8114"
},
{
"name": "CVE-2025-15468",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15468"
},
{
"name": "CVE-2025-58189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58189"
},
{
"name": "CVE-2025-55668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55668"
},
{
"name": "CVE-2025-11210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11210"
},
{
"name": "CVE-2020-36518",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36518"
},
{
"name": "CVE-2026-21945",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21945"
},
{
"name": "CVE-2022-31159",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31159"
},
{
"name": "CVE-2025-12729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12729"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2025-46701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46701"
},
{
"name": "CVE-2025-13227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13227"
},
{
"name": "CVE-2024-30171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30171"
},
{
"name": "CVE-2025-10256",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10256"
},
{
"name": "CVE-2026-20162",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20162"
},
{
"name": "CVE-2025-30749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30749"
},
{
"name": "CVE-2025-12839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12839"
},
{
"name": "CVE-2025-9230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9230"
},
{
"name": "CVE-2025-37727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37727"
},
{
"name": "CVE-2025-53040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53040"
},
{
"name": "CVE-2019-3844",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3844"
},
{
"name": "CVE-2025-53906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53906"
},
{
"name": "CVE-2025-12728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12728"
},
{
"name": "CVE-2025-8916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8916"
},
{
"name": "CVE-2023-6605",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6605"
},
{
"name": "CVE-2025-8885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8885"
},
{
"name": "CVE-2022-23302",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23302"
},
{
"name": "CVE-2025-12430",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12430"
},
{
"name": "CVE-2025-11187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11187"
},
{
"name": "CVE-2025-11206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11206"
},
{
"name": "CVE-2025-62408",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62408"
},
{
"name": "CVE-2018-15686",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15686"
},
{
"name": "CVE-2021-35938",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35938"
},
{
"name": "CVE-2025-9951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9951"
},
{
"name": "CVE-2025-53045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53045"
},
{
"name": "CVE-2024-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12243"
},
{
"name": "CVE-2025-59729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59729"
},
{
"name": "CVE-2025-48071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48071"
},
{
"name": "CVE-2022-42003",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42003"
},
{
"name": "CVE-2025-53506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53506"
},
{
"name": "CVE-2023-26604",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26604"
},
{
"name": "CVE-2025-69224",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69224"
},
{
"name": "CVE-2025-2759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2759"
},
{
"name": "CVE-2025-53864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53864"
},
{
"name": "CVE-2025-53053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53053"
},
{
"name": "CVE-2025-30153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30153"
},
{
"name": "CVE-2025-59419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59419"
},
{
"name": "CVE-2025-69229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69229"
},
{
"name": "CVE-2024-8373",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8373"
},
{
"name": "CVE-2025-11209",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11209"
},
{
"name": "CVE-2025-30204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30204"
},
{
"name": "CVE-2024-21490",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21490"
},
{
"name": "CVE-2024-50379",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50379"
},
{
"name": "CVE-2023-49501",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49501"
},
{
"name": "CVE-2019-3843",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3843"
},
{
"name": "CVE-2018-6954",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-6954"
},
{
"name": "CVE-2025-53057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53057"
},
{
"name": "CVE-2026-26981",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26981"
},
{
"name": "CVE-2025-12447",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12447"
},
{
"name": "CVE-2025-53066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53066"
},
{
"name": "CVE-2013-4392",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4392"
},
{
"name": "CVE-2025-48074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48074"
},
{
"name": "CVE-2024-52316",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52316"
},
{
"name": "CVE-2016-7795",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7795"
},
{
"name": "CVE-2025-12727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12727"
},
{
"name": "CVE-2025-69420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69420"
},
{
"name": "CVE-2025-12428",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12428"
},
{
"name": "CVE-2026-20163",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20163"
},
{
"name": "CVE-2025-11226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11226"
}
],
"initial_release_date": "2026-03-12T00:00:00",
"last_revision_date": "2026-03-12T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0281",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-03-12T00:00:00.000000"
}
],
"risks": [
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Splunk. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une injection de code indirecte \u00e0 distance (XSS).",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Splunk",
"vendor_advisories": [
{
"published_at": "2026-03-11",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2026-0302",
"url": "https://advisory.splunk.com/advisories/SVD-2026-0302"
},
{
"published_at": "2026-03-11",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2026-0311",
"url": "https://advisory.splunk.com/advisories/SVD-2026-0311"
},
{
"published_at": "2026-03-11",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2026-0308",
"url": "https://advisory.splunk.com/advisories/SVD-2026-0308"
},
{
"published_at": "2026-03-11",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2026-0309",
"url": "https://advisory.splunk.com/advisories/SVD-2026-0309"
},
{
"published_at": "2026-03-11",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2026-0305",
"url": "https://advisory.splunk.com/advisories/SVD-2026-0305"
},
{
"published_at": "2026-03-11",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2026-0310",
"url": "https://advisory.splunk.com/advisories/SVD-2026-0310"
},
{
"published_at": "2026-03-11",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2026-0304",
"url": "https://advisory.splunk.com/advisories/SVD-2026-0304"
},
{
"published_at": "2026-03-11",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2026-0301",
"url": "https://advisory.splunk.com/advisories/SVD-2026-0301"
},
{
"published_at": "2026-03-11",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2026-0313",
"url": "https://advisory.splunk.com/advisories/SVD-2026-0313"
},
{
"published_at": "2026-03-11",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2026-0306",
"url": "https://advisory.splunk.com/advisories/SVD-2026-0306"
},
{
"published_at": "2026-03-11",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2026-0303",
"url": "https://advisory.splunk.com/advisories/SVD-2026-0303"
},
{
"published_at": "2026-03-11",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2026-0307",
"url": "https://advisory.splunk.com/advisories/SVD-2026-0307"
},
{
"published_at": "2026-03-11",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2026-0312",
"url": "https://advisory.splunk.com/advisories/SVD-2026-0312"
}
]
}
FKIE_CVE-2025-13033
Vulnerability from fkie_nvd - Published: 2025-11-14 20:15 - Updated: 2026-05-11 13:16| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was identified in the email parsing library due to improper handling of specially formatted recipient email addresses. An attacker can exploit this flaw by crafting a recipient address that embeds an external address within quotes. This causes the application to misdirect the email to the attacker\u0027s external address instead of the intended internal recipient. This could lead to a significant data leak of sensitive information and allow an attacker to bypass security filters and access controls."
}
],
"id": "CVE-2025-13033",
"lastModified": "2026-05-11T13:16:10.037",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "secalert@redhat.com",
"type": "Secondary"
}
]
},
"published": "2025-11-14T20:15:45.957",
"references": [
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2026:15979"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2026:3751"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/security/cve/CVE-2025-13033"
},
{
"source": "secalert@redhat.com",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402179"
},
{
"source": "secalert@redhat.com",
"url": "https://github.com/nodemailer/nodemailer"
},
{
"source": "secalert@redhat.com",
"url": "https://github.com/nodemailer/nodemailer/commit/1150d99fba77280df2cfb1885c43df23109a8626"
},
{
"source": "secalert@redhat.com",
"url": "https://github.com/nodemailer/nodemailer/security/advisories/GHSA-mm7p-fcc7-pg87"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-1286"
}
],
"source": "secalert@redhat.com",
"type": "Secondary"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.