Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-68131 (GCVE-0-2025-68131)
Vulnerability from cvelistv5 – Published: 2025-12-31 01:15 – Updated: 2026-01-02 14:37- CWE-212 - Improper Removal of Sensitive Information Before Storage or Transfer
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-68131",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-01-02T14:22:41.499483Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-01-02T14:37:55.705Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"references": [
{
"tags": [
"exploit"
],
"url": "https://github.com/agronholm/cbor2/security/advisories/GHSA-wcj4-jw5j-44wh"
}
],
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "cbor2",
"vendor": "agronholm",
"versions": [
{
"status": "affected",
"version": "\u003e= 3.0.0, \u003c 5.8.0"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "cbor2 provides encoding and decoding for the Concise Binary Object Representation (CBOR) serialization format. Starting in version 3.0.0 and prior to version 5.8.0, whhen a CBORDecoder instance is reused across multiple decode operations, values marked with the shareable tag (28) persist in memory and can be accessed by subsequent CBOR messages using the sharedref tag (29). This allows an attacker-controlled message to read data from previously decoded messages if the decoder is reused across trust boundaries. Version 5.8.0 patches the issue."
}
],
"metrics": [
{
"cvssV4_0": {
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"privilegesRequired": "NONE",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N/E:P",
"version": "4.0",
"vulnAvailabilityImpact": "LOW",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "NONE"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-212",
"description": "CWE-212: Improper Removal of Sensitive Information Before Storage or Transfer",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-12-31T01:15:36.827Z",
"orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"shortName": "GitHub_M"
},
"references": [
{
"name": "https://github.com/agronholm/cbor2/security/advisories/GHSA-wcj4-jw5j-44wh",
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/agronholm/cbor2/security/advisories/GHSA-wcj4-jw5j-44wh"
},
{
"name": "https://github.com/agronholm/cbor2/pull/268",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/agronholm/cbor2/pull/268"
}
],
"source": {
"advisory": "GHSA-wcj4-jw5j-44wh",
"discovery": "UNKNOWN"
},
"title": "CBORDecoder reuse can leak shareable values across decode calls"
}
},
"cveMetadata": {
"assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"assignerShortName": "GitHub_M",
"cveId": "CVE-2025-68131",
"datePublished": "2025-12-31T01:15:36.827Z",
"dateReserved": "2025-12-15T18:05:52.210Z",
"dateUpdated": "2026-01-02T14:37:55.705Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-68131\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2025-12-31T02:15:42.527\",\"lastModified\":\"2026-01-02T16:40:40.337\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"cbor2 provides encoding and decoding for the Concise Binary Object Representation (CBOR) serialization format. Starting in version 3.0.0 and prior to version 5.8.0, whhen a CBORDecoder instance is reused across multiple decode operations, values marked with the shareable tag (28) persist in memory and can be accessed by subsequent CBOR messages using the sharedref tag (29). This allows an attacker-controlled message to read data from previously decoded messages if the decoder is reused across trust boundaries. Version 5.8.0 patches the issue.\"}],\"metrics\":{\"cvssMetricV40\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"4.0\",\"vectorString\":\"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"attackRequirements\":\"NONE\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"vulnConfidentialityImpact\":\"LOW\",\"vulnIntegrityImpact\":\"NONE\",\"vulnAvailabilityImpact\":\"LOW\",\"subConfidentialityImpact\":\"NONE\",\"subIntegrityImpact\":\"NONE\",\"subAvailabilityImpact\":\"NONE\",\"exploitMaturity\":\"PROOF_OF_CONCEPT\",\"confidentialityRequirement\":\"NOT_DEFINED\",\"integrityRequirement\":\"NOT_DEFINED\",\"availabilityRequirement\":\"NOT_DEFINED\",\"modifiedAttackVector\":\"NOT_DEFINED\",\"modifiedAttackComplexity\":\"NOT_DEFINED\",\"modifiedAttackRequirements\":\"NOT_DEFINED\",\"modifiedPrivilegesRequired\":\"NOT_DEFINED\",\"modifiedUserInteraction\":\"NOT_DEFINED\",\"modifiedVulnConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedVulnIntegrityImpact\":\"NOT_DEFINED\",\"modifiedVulnAvailabilityImpact\":\"NOT_DEFINED\",\"modifiedSubConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedSubIntegrityImpact\":\"NOT_DEFINED\",\"modifiedSubAvailabilityImpact\":\"NOT_DEFINED\",\"Safety\":\"NOT_DEFINED\",\"Automatable\":\"NOT_DEFINED\",\"Recovery\":\"NOT_DEFINED\",\"valueDensity\":\"NOT_DEFINED\",\"vulnerabilityResponseEffort\":\"NOT_DEFINED\",\"providerUrgency\":\"NOT_DEFINED\"}}],\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-212\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:agronholm:cbor2:*:*:*:*:*:python:*:*\",\"versionStartIncluding\":\"3.0.0\",\"versionEndExcluding\":\"5.8.0\",\"matchCriteriaId\":\"B7E7A985-D868-475E-BAD5-51FBC147198A\"}]}]}],\"references\":[{\"url\":\"https://github.com/agronholm/cbor2/pull/268\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Exploit\",\"Patch\"]},{\"url\":\"https://github.com/agronholm/cbor2/security/advisories/GHSA-wcj4-jw5j-44wh\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Exploit\",\"Vendor Advisory\"]},{\"url\":\"https://github.com/agronholm/cbor2/security/advisories/GHSA-wcj4-jw5j-44wh\",\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"tags\":[\"Exploit\",\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"cna\": {\"title\": \"CBORDecoder reuse can leak shareable values across decode calls\", \"problemTypes\": [{\"descriptions\": [{\"cweId\": \"CWE-212\", \"lang\": \"en\", \"description\": \"CWE-212: Improper Removal of Sensitive Information Before Storage or Transfer\", \"type\": \"CWE\"}]}], \"metrics\": [{\"cvssV4_0\": {\"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"attackRequirements\": \"NONE\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"vulnConfidentialityImpact\": \"LOW\", \"vulnIntegrityImpact\": \"NONE\", \"vulnAvailabilityImpact\": \"LOW\", \"subConfidentialityImpact\": \"NONE\", \"subIntegrityImpact\": \"NONE\", \"subAvailabilityImpact\": \"NONE\", \"baseScore\": 5.5, \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N/E:P\", \"version\": \"4.0\"}}], \"references\": [{\"name\": \"https://github.com/agronholm/cbor2/security/advisories/GHSA-wcj4-jw5j-44wh\", \"tags\": [\"x_refsource_CONFIRM\"], \"url\": \"https://github.com/agronholm/cbor2/security/advisories/GHSA-wcj4-jw5j-44wh\"}, {\"name\": \"https://github.com/agronholm/cbor2/pull/268\", \"tags\": [\"x_refsource_MISC\"], \"url\": \"https://github.com/agronholm/cbor2/pull/268\"}], \"affected\": [{\"vendor\": \"agronholm\", \"product\": \"cbor2\", \"versions\": [{\"version\": \"\u003e= 3.0.0, \u003c 5.8.0\", \"status\": \"affected\"}]}], \"providerMetadata\": {\"orgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"shortName\": \"GitHub_M\", \"dateUpdated\": \"2025-12-31T01:15:36.827Z\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"cbor2 provides encoding and decoding for the Concise Binary Object Representation (CBOR) serialization format. Starting in version 3.0.0 and prior to version 5.8.0, whhen a CBORDecoder instance is reused across multiple decode operations, values marked with the shareable tag (28) persist in memory and can be accessed by subsequent CBOR messages using the sharedref tag (29). This allows an attacker-controlled message to read data from previously decoded messages if the decoder is reused across trust boundaries. Version 5.8.0 patches the issue.\"}], \"source\": {\"advisory\": \"GHSA-wcj4-jw5j-44wh\", \"discovery\": \"UNKNOWN\"}}, \"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-68131\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"poc\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2026-01-02T14:22:41.499483Z\"}}}], \"references\": [{\"url\": \"https://github.com/agronholm/cbor2/security/advisories/GHSA-wcj4-jw5j-44wh\", \"tags\": [\"exploit\"]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2026-01-02T14:22:43.319Z\"}}]}",
"cveMetadata": "{\"cveId\": \"CVE-2025-68131\", \"assignerOrgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"state\": \"PUBLISHED\", \"assignerShortName\": \"GitHub_M\", \"dateReserved\": \"2025-12-15T18:05:52.210Z\", \"datePublished\": \"2025-12-31T01:15:36.827Z\", \"dateUpdated\": \"2026-01-02T14:37:55.705Z\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
RHSA-2026:6761
Vulnerability from csaf_redhat - Published: 2026-04-07 08:44 - Updated: 2026-04-08 13:34A flaw was found in cbor2. When a CBORDecoder instance is reused across multiple decode operations, values marked with the shareable tag (28) persist in memory. This allows an attacker-controlled message to read sensitive data from previously decoded messages if the decoder is reused across trust boundaries, leading to information disclosure.
A flaw was found in aiohttp, an asynchronous HTTP client/server framework for Python. A remote attacker could exploit this vulnerability by sending a specially crafted POST request to an application using the Request.post() method, provided that Python optimizations are enabled. This could lead to an infinite loop, resulting in a Denial of Service (DoS) attack, making the affected application unavailable.
A flaw was found in aiohttp. A remote attacker can craft a malicious request that, when processed by an aiohttp server using the `Request.post()` method, causes the server's memory to fill uncontrollably. This can lead to a Denial of Service (DoS) by freezing the server, making it unavailable to legitimate users.
A flaw was found in xgrammar, an open-source library for structured generation. This vulnerability allows an attacker to trigger a segmentation fault, causing the program to crash and resulting in a Denial of Service (DoS). The issue occurs due to improper handling of multi-level nested syntax.
A flaw was found in multipart. The parse_options_header function in multipart.py uses a regular expression with an ambiguous alternation, causing an exponential backtracking (ReDoS) when parsing a specially crafted HTTP or multipart segment headers. A web application parsing request headers or multipart/form-data streams can block request handling threads for multiple seconds per request, eventually resulting in a denial of service.
A path traversal flaw has been identified in Ray Dashboard in the Ray Pypi package. Due to improper validation and sanitization of user-supplied paths in the static file handling mechanism, an attacker can use traversal sequences (e.g., ../) to access files outside the intended static directory, resulting in local file disclosure.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat AI Inference Server Model Optimization Tools 3.2.2 (CUDA) is now available.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat\u00ae AI Inference Server Model Optimization Tools",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:6761",
"url": "https://access.redhat.com/errata/RHSA-2026:6761"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-68131",
"url": "https://access.redhat.com/security/cve/CVE-2025-68131"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-69227",
"url": "https://access.redhat.com/security/cve/CVE-2025-69227"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-69228",
"url": "https://access.redhat.com/security/cve/CVE-2025-69228"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-25048",
"url": "https://access.redhat.com/security/cve/CVE-2026-25048"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-28356",
"url": "https://access.redhat.com/security/cve/CVE-2026-28356"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-32981",
"url": "https://access.redhat.com/security/cve/CVE-2026-32981"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "external",
"summary": "https://www.redhat.com/en/products/ai/inference-server",
"url": "https://www.redhat.com/en/products/ai/inference-server"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_6761.json"
}
],
"title": "Red Hat Security Advisory: Red Hat AI Inference Server Model Optimization Tools 3.2.2 (CUDA)",
"tracking": {
"current_release_date": "2026-04-08T13:34:49+00:00",
"generator": {
"date": "2026-04-08T13:34:49+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.5"
}
},
"id": "RHSA-2026:6761",
"initial_release_date": "2026-04-07T08:44:07+00:00",
"revision_history": [
{
"date": "2026-04-07T08:44:07+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-04-07T08:44:13+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-08T13:34:49+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat AI Inference Server 3.2",
"product": {
"name": "Red Hat AI Inference Server 3.2",
"product_id": "Red Hat AI Inference Server 3.2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:ai_inference_server:3.2::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat AI Inference Server"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rhaiis/model-opt-cuda-rhel9@sha256:950e0d72a64f8a7b6414be2d9ab01ba8342a900e3b4c272295a3d63ef0a6d22c_amd64",
"product": {
"name": "registry.redhat.io/rhaiis/model-opt-cuda-rhel9@sha256:950e0d72a64f8a7b6414be2d9ab01ba8342a900e3b4c272295a3d63ef0a6d22c_amd64",
"product_id": "registry.redhat.io/rhaiis/model-opt-cuda-rhel9@sha256:950e0d72a64f8a7b6414be2d9ab01ba8342a900e3b4c272295a3d63ef0a6d22c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/model-opt-cuda-rhel9@sha256%3A950e0d72a64f8a7b6414be2d9ab01ba8342a900e3b4c272295a3d63ef0a6d22c?arch=amd64\u0026repository_url=registry.redhat.io/rhaiis\u0026tag=1774547384"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rhaiis/model-opt-cuda-rhel9@sha256:e2fc16946f33c8e701f4eff7fc5de9910df865051de0141114cebd3e2c10f0aa_arm64",
"product": {
"name": "registry.redhat.io/rhaiis/model-opt-cuda-rhel9@sha256:e2fc16946f33c8e701f4eff7fc5de9910df865051de0141114cebd3e2c10f0aa_arm64",
"product_id": "registry.redhat.io/rhaiis/model-opt-cuda-rhel9@sha256:e2fc16946f33c8e701f4eff7fc5de9910df865051de0141114cebd3e2c10f0aa_arm64",
"product_identification_helper": {
"purl": "pkg:oci/model-opt-cuda-rhel9@sha256%3Ae2fc16946f33c8e701f4eff7fc5de9910df865051de0141114cebd3e2c10f0aa?arch=arm64\u0026repository_url=registry.redhat.io/rhaiis\u0026tag=1774547384"
}
}
}
],
"category": "architecture",
"name": "arm64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhaiis/model-opt-cuda-rhel9@sha256:950e0d72a64f8a7b6414be2d9ab01ba8342a900e3b4c272295a3d63ef0a6d22c_amd64 as a component of Red Hat AI Inference Server 3.2",
"product_id": "Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/model-opt-cuda-rhel9@sha256:950e0d72a64f8a7b6414be2d9ab01ba8342a900e3b4c272295a3d63ef0a6d22c_amd64"
},
"product_reference": "registry.redhat.io/rhaiis/model-opt-cuda-rhel9@sha256:950e0d72a64f8a7b6414be2d9ab01ba8342a900e3b4c272295a3d63ef0a6d22c_amd64",
"relates_to_product_reference": "Red Hat AI Inference Server 3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhaiis/model-opt-cuda-rhel9@sha256:e2fc16946f33c8e701f4eff7fc5de9910df865051de0141114cebd3e2c10f0aa_arm64 as a component of Red Hat AI Inference Server 3.2",
"product_id": "Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/model-opt-cuda-rhel9@sha256:e2fc16946f33c8e701f4eff7fc5de9910df865051de0141114cebd3e2c10f0aa_arm64"
},
"product_reference": "registry.redhat.io/rhaiis/model-opt-cuda-rhel9@sha256:e2fc16946f33c8e701f4eff7fc5de9910df865051de0141114cebd3e2c10f0aa_arm64",
"relates_to_product_reference": "Red Hat AI Inference Server 3.2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-68131",
"cwe": {
"id": "CWE-212",
"name": "Improper Removal of Sensitive Information Before Storage or Transfer"
},
"discovery_date": "2025-12-31T02:00:55.240416+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2426395"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in cbor2. When a CBORDecoder instance is reused across multiple decode operations, values marked with the shareable tag (28) persist in memory. This allows an attacker-controlled message to read sensitive data from previously decoded messages if the decoder is reused across trust boundaries, leading to information disclosure.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "cbor2: cbor2: Information Disclosure via shared memory in CBORDecoder reuse",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Moderate for Red Hat products. The flaw in cbor2 allows information disclosure if a CBORDecoder instance is reused across trust boundaries. This could lead to an attacker-controlled message reading sensitive data from previously decoded messages. This affects Red Hat AI Inference Server, Red Hat Enterprise Linux AI, and Red Hat OpenShift AI when processing untrusted CBOR data with a reused decoder.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/model-opt-cuda-rhel9@sha256:950e0d72a64f8a7b6414be2d9ab01ba8342a900e3b4c272295a3d63ef0a6d22c_amd64",
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/model-opt-cuda-rhel9@sha256:e2fc16946f33c8e701f4eff7fc5de9910df865051de0141114cebd3e2c10f0aa_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-68131"
},
{
"category": "external",
"summary": "RHBZ#2426395",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426395"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-68131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68131"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-68131",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68131"
},
{
"category": "external",
"summary": "https://github.com/agronholm/cbor2/pull/268",
"url": "https://github.com/agronholm/cbor2/pull/268"
},
{
"category": "external",
"summary": "https://github.com/agronholm/cbor2/security/advisories/GHSA-wcj4-jw5j-44wh",
"url": "https://github.com/agronholm/cbor2/security/advisories/GHSA-wcj4-jw5j-44wh"
}
],
"release_date": "2025-12-31T01:15:36.827000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-07T08:44:07+00:00",
"details": "For more information visit https://access.redhat.com/errata/RHSA-2026:6761",
"product_ids": [
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/model-opt-cuda-rhel9@sha256:950e0d72a64f8a7b6414be2d9ab01ba8342a900e3b4c272295a3d63ef0a6d22c_amd64",
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/model-opt-cuda-rhel9@sha256:e2fc16946f33c8e701f4eff7fc5de9910df865051de0141114cebd3e2c10f0aa_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:6761"
},
{
"category": "workaround",
"details": "To mitigate this issue, applications utilizing the `cbor2` library should avoid reusing `CBORDecoder` instances when processing data from different trust levels. If `CBORDecoder` reuse is unavoidable, ensure that sensitive data is not processed by a decoder instance that will subsequently handle untrusted input. This operational control prevents an attacker from accessing prior decoded information.",
"product_ids": [
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/model-opt-cuda-rhel9@sha256:950e0d72a64f8a7b6414be2d9ab01ba8342a900e3b4c272295a3d63ef0a6d22c_amd64",
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/model-opt-cuda-rhel9@sha256:e2fc16946f33c8e701f4eff7fc5de9910df865051de0141114cebd3e2c10f0aa_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/model-opt-cuda-rhel9@sha256:950e0d72a64f8a7b6414be2d9ab01ba8342a900e3b4c272295a3d63ef0a6d22c_amd64",
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/model-opt-cuda-rhel9@sha256:e2fc16946f33c8e701f4eff7fc5de9910df865051de0141114cebd3e2c10f0aa_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "cbor2: cbor2: Information Disclosure via shared memory in CBORDecoder reuse"
},
{
"cve": "CVE-2025-69227",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2026-01-06T00:01:17.036900+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2427256"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in aiohttp, an asynchronous HTTP client/server framework for Python. A remote attacker could exploit this vulnerability by sending a specially crafted POST request to an application using the Request.post() method, provided that Python optimizations are enabled. This could lead to an infinite loop, resulting in a Denial of Service (DoS) attack, making the affected application unavailable.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "aiohttp: aiohttp: Denial of Service via specially crafted POST request",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Moderate for Red Hat products as it can lead to a Denial of Service (DoS) in applications utilizing the `aiohttp` library. Exploitation requires Python optimizations to be explicitly enabled (e.g., via `-O` or `PYTHONOPTIMIZE=1`) and the application to process POST requests using the `Request.post()` method. Red Hat products are affected if they meet these specific configuration and usage criteria.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/model-opt-cuda-rhel9@sha256:950e0d72a64f8a7b6414be2d9ab01ba8342a900e3b4c272295a3d63ef0a6d22c_amd64",
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/model-opt-cuda-rhel9@sha256:e2fc16946f33c8e701f4eff7fc5de9910df865051de0141114cebd3e2c10f0aa_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-69227"
},
{
"category": "external",
"summary": "RHBZ#2427256",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2427256"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-69227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69227"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-69227",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-69227"
},
{
"category": "external",
"summary": "https://github.com/aio-libs/aiohttp/commit/bc1319ec3cbff9438a758951a30907b072561259",
"url": "https://github.com/aio-libs/aiohttp/commit/bc1319ec3cbff9438a758951a30907b072561259"
},
{
"category": "external",
"summary": "https://github.com/aio-libs/aiohttp/security/advisories/GHSA-jj3x-wxrx-4x23",
"url": "https://github.com/aio-libs/aiohttp/security/advisories/GHSA-jj3x-wxrx-4x23"
}
],
"release_date": "2026-01-05T23:19:31.396000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-07T08:44:07+00:00",
"details": "For more information visit https://access.redhat.com/errata/RHSA-2026:6761",
"product_ids": [
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/model-opt-cuda-rhel9@sha256:950e0d72a64f8a7b6414be2d9ab01ba8342a900e3b4c272295a3d63ef0a6d22c_amd64",
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/model-opt-cuda-rhel9@sha256:e2fc16946f33c8e701f4eff7fc5de9910df865051de0141114cebd3e2c10f0aa_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:6761"
},
{
"category": "workaround",
"details": "No mitigation is currently available that meets Red Hat Product Security\u2019s standards for usability, deployment, applicability, or stability.",
"product_ids": [
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/model-opt-cuda-rhel9@sha256:950e0d72a64f8a7b6414be2d9ab01ba8342a900e3b4c272295a3d63ef0a6d22c_amd64",
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/model-opt-cuda-rhel9@sha256:e2fc16946f33c8e701f4eff7fc5de9910df865051de0141114cebd3e2c10f0aa_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/model-opt-cuda-rhel9@sha256:950e0d72a64f8a7b6414be2d9ab01ba8342a900e3b4c272295a3d63ef0a6d22c_amd64",
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/model-opt-cuda-rhel9@sha256:e2fc16946f33c8e701f4eff7fc5de9910df865051de0141114cebd3e2c10f0aa_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "aiohttp: aiohttp: Denial of Service via specially crafted POST request"
},
{
"cve": "CVE-2025-69228",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-06T00:01:02.119065+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2427254"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in aiohttp. A remote attacker can craft a malicious request that, when processed by an aiohttp server using the `Request.post()` method, causes the server\u0027s memory to fill uncontrollably. This can lead to a Denial of Service (DoS) by freezing the server, making it unavailable to legitimate users.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "aiohttp: aiohttp: Denial of Service via memory exhaustion from crafted POST request",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Moderate for Red Hat products. A flaw in aiohttp allows a remote attacker to cause a Denial of Service (DoS) by sending a specially crafted POST request to an aiohttp server that utilizes the `Request.post()` method. This can lead to uncontrolled memory consumption, freezing the server and making the server unavailable.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/model-opt-cuda-rhel9@sha256:950e0d72a64f8a7b6414be2d9ab01ba8342a900e3b4c272295a3d63ef0a6d22c_amd64",
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/model-opt-cuda-rhel9@sha256:e2fc16946f33c8e701f4eff7fc5de9910df865051de0141114cebd3e2c10f0aa_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-69228"
},
{
"category": "external",
"summary": "RHBZ#2427254",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2427254"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-69228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69228"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-69228",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-69228"
},
{
"category": "external",
"summary": "https://github.com/aio-libs/aiohttp/commit/b7dbd35375aedbcd712cbae8ad513d56d11cce60",
"url": "https://github.com/aio-libs/aiohttp/commit/b7dbd35375aedbcd712cbae8ad513d56d11cce60"
},
{
"category": "external",
"summary": "https://github.com/aio-libs/aiohttp/security/advisories/GHSA-6jhg-hg63-jvvf",
"url": "https://github.com/aio-libs/aiohttp/security/advisories/GHSA-6jhg-hg63-jvvf"
}
],
"release_date": "2026-01-05T23:30:33.440000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-07T08:44:07+00:00",
"details": "For more information visit https://access.redhat.com/errata/RHSA-2026:6761",
"product_ids": [
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/model-opt-cuda-rhel9@sha256:950e0d72a64f8a7b6414be2d9ab01ba8342a900e3b4c272295a3d63ef0a6d22c_amd64",
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/model-opt-cuda-rhel9@sha256:e2fc16946f33c8e701f4eff7fc5de9910df865051de0141114cebd3e2c10f0aa_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:6761"
},
{
"category": "workaround",
"details": "No mitigation is currently available that meets Red Hat Product Security\u2019s standards for usability, deployment, applicability, or stability.",
"product_ids": [
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/model-opt-cuda-rhel9@sha256:950e0d72a64f8a7b6414be2d9ab01ba8342a900e3b4c272295a3d63ef0a6d22c_amd64",
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/model-opt-cuda-rhel9@sha256:e2fc16946f33c8e701f4eff7fc5de9910df865051de0141114cebd3e2c10f0aa_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/model-opt-cuda-rhel9@sha256:950e0d72a64f8a7b6414be2d9ab01ba8342a900e3b4c272295a3d63ef0a6d22c_amd64",
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/model-opt-cuda-rhel9@sha256:e2fc16946f33c8e701f4eff7fc5de9910df865051de0141114cebd3e2c10f0aa_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "aiohttp: aiohttp: Denial of Service via memory exhaustion from crafted POST request"
},
{
"cve": "CVE-2026-25048",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"discovery_date": "2026-03-05T16:01:14.634884+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2444840"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in xgrammar, an open-source library for structured generation. This vulnerability allows an attacker to trigger a segmentation fault, causing the program to crash and resulting in a Denial of Service (DoS). The issue occurs due to improper handling of multi-level nested syntax.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xgrammar: xgrammar: Denial of Service via multi-level nested syntax",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/model-opt-cuda-rhel9@sha256:950e0d72a64f8a7b6414be2d9ab01ba8342a900e3b4c272295a3d63ef0a6d22c_amd64",
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/model-opt-cuda-rhel9@sha256:e2fc16946f33c8e701f4eff7fc5de9910df865051de0141114cebd3e2c10f0aa_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-25048"
},
{
"category": "external",
"summary": "RHBZ#2444840",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2444840"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-25048",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25048"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-25048",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25048"
},
{
"category": "external",
"summary": "https://github.com/mlc-ai/xgrammar/releases/tag/v0.1.32",
"url": "https://github.com/mlc-ai/xgrammar/releases/tag/v0.1.32"
},
{
"category": "external",
"summary": "https://github.com/mlc-ai/xgrammar/security/advisories/GHSA-7rgv-gqhr-fxg3",
"url": "https://github.com/mlc-ai/xgrammar/security/advisories/GHSA-7rgv-gqhr-fxg3"
}
],
"release_date": "2026-03-05T15:34:42.095000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-07T08:44:07+00:00",
"details": "For more information visit https://access.redhat.com/errata/RHSA-2026:6761",
"product_ids": [
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/model-opt-cuda-rhel9@sha256:950e0d72a64f8a7b6414be2d9ab01ba8342a900e3b4c272295a3d63ef0a6d22c_amd64",
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/model-opt-cuda-rhel9@sha256:e2fc16946f33c8e701f4eff7fc5de9910df865051de0141114cebd3e2c10f0aa_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:6761"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/model-opt-cuda-rhel9@sha256:950e0d72a64f8a7b6414be2d9ab01ba8342a900e3b4c272295a3d63ef0a6d22c_amd64",
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/model-opt-cuda-rhel9@sha256:e2fc16946f33c8e701f4eff7fc5de9910df865051de0141114cebd3e2c10f0aa_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/model-opt-cuda-rhel9@sha256:950e0d72a64f8a7b6414be2d9ab01ba8342a900e3b4c272295a3d63ef0a6d22c_amd64",
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/model-opt-cuda-rhel9@sha256:e2fc16946f33c8e701f4eff7fc5de9910df865051de0141114cebd3e2c10f0aa_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xgrammar: xgrammar: Denial of Service via multi-level nested syntax"
},
{
"cve": "CVE-2026-28356",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"discovery_date": "2026-03-12T18:01:57.290176+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2447059"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in multipart. The parse_options_header function in multipart.py uses a regular expression with an ambiguous alternation, causing an exponential backtracking (ReDoS) when parsing a specially crafted HTTP or multipart segment headers. A web application parsing request headers or multipart/form-data streams can block request handling threads for multiple seconds per request, eventually resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "multipart: denial of service via maliciously crafted HTTP or multipart segment headers",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is only exploitable in applications using the multipart.parse_form_data function directly or indirectly when parsing request headers or multipart/form-data streams. Also, the security impact of this flaw is limited to a denial of service, there is no corruption of memory or arbitrary code execution. Due to these reasons, this vulnerability has been rated with an important severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/model-opt-cuda-rhel9@sha256:950e0d72a64f8a7b6414be2d9ab01ba8342a900e3b4c272295a3d63ef0a6d22c_amd64",
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/model-opt-cuda-rhel9@sha256:e2fc16946f33c8e701f4eff7fc5de9910df865051de0141114cebd3e2c10f0aa_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-28356"
},
{
"category": "external",
"summary": "RHBZ#2447059",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447059"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-28356",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28356"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-28356",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-28356"
},
{
"category": "external",
"summary": "https://github.com/defnull/multipart/security/advisories/GHSA-p2m9-wcp5-6qw3",
"url": "https://github.com/defnull/multipart/security/advisories/GHSA-p2m9-wcp5-6qw3"
}
],
"release_date": "2026-03-12T16:45:01.070000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-07T08:44:07+00:00",
"details": "For more information visit https://access.redhat.com/errata/RHSA-2026:6761",
"product_ids": [
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/model-opt-cuda-rhel9@sha256:950e0d72a64f8a7b6414be2d9ab01ba8342a900e3b4c272295a3d63ef0a6d22c_amd64",
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/model-opt-cuda-rhel9@sha256:e2fc16946f33c8e701f4eff7fc5de9910df865051de0141114cebd3e2c10f0aa_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:6761"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/model-opt-cuda-rhel9@sha256:950e0d72a64f8a7b6414be2d9ab01ba8342a900e3b4c272295a3d63ef0a6d22c_amd64",
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/model-opt-cuda-rhel9@sha256:e2fc16946f33c8e701f4eff7fc5de9910df865051de0141114cebd3e2c10f0aa_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/model-opt-cuda-rhel9@sha256:950e0d72a64f8a7b6414be2d9ab01ba8342a900e3b4c272295a3d63ef0a6d22c_amd64",
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/model-opt-cuda-rhel9@sha256:e2fc16946f33c8e701f4eff7fc5de9910df865051de0141114cebd3e2c10f0aa_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "multipart: denial of service via maliciously crafted HTTP or multipart segment headers"
},
{
"cve": "CVE-2026-32981",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2026-03-17T20:01:37.453284+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2448440"
}
],
"notes": [
{
"category": "description",
"text": "A path traversal flaw has been identified in Ray Dashboard in the Ray Pypi package. Due to improper validation and sanitization of user-supplied paths in the static file handling mechanism, an attacker can use traversal sequences (e.g., ../) to access files outside the intended static directory, resulting in local file disclosure.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ray: Ray Dashboard Path Traversal Leading to Local File Disclosure",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/model-opt-cuda-rhel9@sha256:950e0d72a64f8a7b6414be2d9ab01ba8342a900e3b4c272295a3d63ef0a6d22c_amd64",
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/model-opt-cuda-rhel9@sha256:e2fc16946f33c8e701f4eff7fc5de9910df865051de0141114cebd3e2c10f0aa_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-32981"
},
{
"category": "external",
"summary": "RHBZ#2448440",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448440"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-32981",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32981"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-32981",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32981"
},
{
"category": "external",
"summary": "https://github.com/ray-project/ray",
"url": "https://github.com/ray-project/ray"
},
{
"category": "external",
"summary": "https://packetstorm.news/files/id/215801/",
"url": "https://packetstorm.news/files/id/215801/"
},
{
"category": "external",
"summary": "https://www.vulncheck.com/advisories/ray-dashboard-path-traversal-leading-to-local-file-disclosure",
"url": "https://www.vulncheck.com/advisories/ray-dashboard-path-traversal-leading-to-local-file-disclosure"
}
],
"release_date": "2026-03-17T19:33:50.107000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-07T08:44:07+00:00",
"details": "For more information visit https://access.redhat.com/errata/RHSA-2026:6761",
"product_ids": [
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/model-opt-cuda-rhel9@sha256:950e0d72a64f8a7b6414be2d9ab01ba8342a900e3b4c272295a3d63ef0a6d22c_amd64",
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/model-opt-cuda-rhel9@sha256:e2fc16946f33c8e701f4eff7fc5de9910df865051de0141114cebd3e2c10f0aa_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:6761"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/model-opt-cuda-rhel9@sha256:950e0d72a64f8a7b6414be2d9ab01ba8342a900e3b4c272295a3d63ef0a6d22c_amd64",
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/model-opt-cuda-rhel9@sha256:e2fc16946f33c8e701f4eff7fc5de9910df865051de0141114cebd3e2c10f0aa_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/model-opt-cuda-rhel9@sha256:950e0d72a64f8a7b6414be2d9ab01ba8342a900e3b4c272295a3d63ef0a6d22c_amd64",
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/model-opt-cuda-rhel9@sha256:e2fc16946f33c8e701f4eff7fc5de9910df865051de0141114cebd3e2c10f0aa_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "ray: Ray Dashboard Path Traversal Leading to Local File Disclosure"
}
]
}
RHSA-2026:6762
Vulnerability from csaf_redhat - Published: 2026-04-07 08:45 - Updated: 2026-04-08 13:34A flaw was found in cbor2. When a CBORDecoder instance is reused across multiple decode operations, values marked with the shareable tag (28) persist in memory. This allows an attacker-controlled message to read sensitive data from previously decoded messages if the decoder is reused across trust boundaries, leading to information disclosure.
A flaw was found in aiohttp, an asynchronous HTTP client/server framework for Python. A remote attacker could exploit this vulnerability by sending a specially crafted POST request to an application using the Request.post() method, provided that Python optimizations are enabled. This could lead to an infinite loop, resulting in a Denial of Service (DoS) attack, making the affected application unavailable.
A flaw was found in aiohttp. A remote attacker can craft a malicious request that, when processed by an aiohttp server using the `Request.post()` method, causes the server's memory to fill uncontrollably. This can lead to a Denial of Service (DoS) by freezing the server, making it unavailable to legitimate users.
A flaw was found in xgrammar, an open-source library for structured generation. This vulnerability allows an attacker to trigger a segmentation fault, causing the program to crash and resulting in a Denial of Service (DoS). The issue occurs due to improper handling of multi-level nested syntax.
A flaw was found in multipart. The parse_options_header function in multipart.py uses a regular expression with an ambiguous alternation, causing an exponential backtracking (ReDoS) when parsing a specially crafted HTTP or multipart segment headers. A web application parsing request headers or multipart/form-data streams can block request handling threads for multiple seconds per request, eventually resulting in a denial of service.
A path traversal flaw has been identified in Ray Dashboard in the Ray Pypi package. Due to improper validation and sanitization of user-supplied paths in the static file handling mechanism, an attacker can use traversal sequences (e.g., ../) to access files outside the intended static directory, resulting in local file disclosure.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat AI Inference Server 3.2.2 (ROCm) is now available.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat\u00ae AI Inference Server",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:6762",
"url": "https://access.redhat.com/errata/RHSA-2026:6762"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-68131",
"url": "https://access.redhat.com/security/cve/CVE-2025-68131"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-69227",
"url": "https://access.redhat.com/security/cve/CVE-2025-69227"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-69228",
"url": "https://access.redhat.com/security/cve/CVE-2025-69228"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-25048",
"url": "https://access.redhat.com/security/cve/CVE-2026-25048"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-28356",
"url": "https://access.redhat.com/security/cve/CVE-2026-28356"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-32981",
"url": "https://access.redhat.com/security/cve/CVE-2026-32981"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "external",
"summary": "https://www.redhat.com/en/products/ai/inference-server",
"url": "https://www.redhat.com/en/products/ai/inference-server"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_6762.json"
}
],
"title": "Red Hat Security Advisory: Red Hat AI Inference Server 3.2.2 (ROCm)",
"tracking": {
"current_release_date": "2026-04-08T13:34:47+00:00",
"generator": {
"date": "2026-04-08T13:34:47+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.5"
}
},
"id": "RHSA-2026:6762",
"initial_release_date": "2026-04-07T08:45:04+00:00",
"revision_history": [
{
"date": "2026-04-07T08:45:04+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-04-07T08:45:19+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-08T13:34:47+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat AI Inference Server 3.2",
"product": {
"name": "Red Hat AI Inference Server 3.2",
"product_id": "Red Hat AI Inference Server 3.2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:ai_inference_server:3.2::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat AI Inference Server"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rhaiis/vllm-rocm-rhel9@sha256:3e9fbe1a078889d05d0291ef5cfba07924540609f8315c1c88d0f1a13eca5d45_amd64",
"product": {
"name": "registry.redhat.io/rhaiis/vllm-rocm-rhel9@sha256:3e9fbe1a078889d05d0291ef5cfba07924540609f8315c1c88d0f1a13eca5d45_amd64",
"product_id": "registry.redhat.io/rhaiis/vllm-rocm-rhel9@sha256:3e9fbe1a078889d05d0291ef5cfba07924540609f8315c1c88d0f1a13eca5d45_amd64",
"product_identification_helper": {
"purl": "pkg:oci/vllm-rocm-rhel9@sha256%3A3e9fbe1a078889d05d0291ef5cfba07924540609f8315c1c88d0f1a13eca5d45?arch=amd64\u0026repository_url=registry.redhat.io/rhaiis\u0026tag=1775252598"
}
}
}
],
"category": "architecture",
"name": "amd64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhaiis/vllm-rocm-rhel9@sha256:3e9fbe1a078889d05d0291ef5cfba07924540609f8315c1c88d0f1a13eca5d45_amd64 as a component of Red Hat AI Inference Server 3.2",
"product_id": "Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/vllm-rocm-rhel9@sha256:3e9fbe1a078889d05d0291ef5cfba07924540609f8315c1c88d0f1a13eca5d45_amd64"
},
"product_reference": "registry.redhat.io/rhaiis/vllm-rocm-rhel9@sha256:3e9fbe1a078889d05d0291ef5cfba07924540609f8315c1c88d0f1a13eca5d45_amd64",
"relates_to_product_reference": "Red Hat AI Inference Server 3.2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-68131",
"cwe": {
"id": "CWE-212",
"name": "Improper Removal of Sensitive Information Before Storage or Transfer"
},
"discovery_date": "2025-12-31T02:00:55.240416+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2426395"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in cbor2. When a CBORDecoder instance is reused across multiple decode operations, values marked with the shareable tag (28) persist in memory. This allows an attacker-controlled message to read sensitive data from previously decoded messages if the decoder is reused across trust boundaries, leading to information disclosure.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "cbor2: cbor2: Information Disclosure via shared memory in CBORDecoder reuse",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Moderate for Red Hat products. The flaw in cbor2 allows information disclosure if a CBORDecoder instance is reused across trust boundaries. This could lead to an attacker-controlled message reading sensitive data from previously decoded messages. This affects Red Hat AI Inference Server, Red Hat Enterprise Linux AI, and Red Hat OpenShift AI when processing untrusted CBOR data with a reused decoder.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/vllm-rocm-rhel9@sha256:3e9fbe1a078889d05d0291ef5cfba07924540609f8315c1c88d0f1a13eca5d45_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-68131"
},
{
"category": "external",
"summary": "RHBZ#2426395",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426395"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-68131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68131"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-68131",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68131"
},
{
"category": "external",
"summary": "https://github.com/agronholm/cbor2/pull/268",
"url": "https://github.com/agronholm/cbor2/pull/268"
},
{
"category": "external",
"summary": "https://github.com/agronholm/cbor2/security/advisories/GHSA-wcj4-jw5j-44wh",
"url": "https://github.com/agronholm/cbor2/security/advisories/GHSA-wcj4-jw5j-44wh"
}
],
"release_date": "2025-12-31T01:15:36.827000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-07T08:45:04+00:00",
"details": "For more information visit https://access.redhat.com/errata/RHSA-2026:6762",
"product_ids": [
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/vllm-rocm-rhel9@sha256:3e9fbe1a078889d05d0291ef5cfba07924540609f8315c1c88d0f1a13eca5d45_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:6762"
},
{
"category": "workaround",
"details": "To mitigate this issue, applications utilizing the `cbor2` library should avoid reusing `CBORDecoder` instances when processing data from different trust levels. If `CBORDecoder` reuse is unavoidable, ensure that sensitive data is not processed by a decoder instance that will subsequently handle untrusted input. This operational control prevents an attacker from accessing prior decoded information.",
"product_ids": [
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/vllm-rocm-rhel9@sha256:3e9fbe1a078889d05d0291ef5cfba07924540609f8315c1c88d0f1a13eca5d45_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/vllm-rocm-rhel9@sha256:3e9fbe1a078889d05d0291ef5cfba07924540609f8315c1c88d0f1a13eca5d45_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "cbor2: cbor2: Information Disclosure via shared memory in CBORDecoder reuse"
},
{
"cve": "CVE-2025-69227",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2026-01-06T00:01:17.036900+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2427256"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in aiohttp, an asynchronous HTTP client/server framework for Python. A remote attacker could exploit this vulnerability by sending a specially crafted POST request to an application using the Request.post() method, provided that Python optimizations are enabled. This could lead to an infinite loop, resulting in a Denial of Service (DoS) attack, making the affected application unavailable.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "aiohttp: aiohttp: Denial of Service via specially crafted POST request",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Moderate for Red Hat products as it can lead to a Denial of Service (DoS) in applications utilizing the `aiohttp` library. Exploitation requires Python optimizations to be explicitly enabled (e.g., via `-O` or `PYTHONOPTIMIZE=1`) and the application to process POST requests using the `Request.post()` method. Red Hat products are affected if they meet these specific configuration and usage criteria.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/vllm-rocm-rhel9@sha256:3e9fbe1a078889d05d0291ef5cfba07924540609f8315c1c88d0f1a13eca5d45_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-69227"
},
{
"category": "external",
"summary": "RHBZ#2427256",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2427256"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-69227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69227"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-69227",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-69227"
},
{
"category": "external",
"summary": "https://github.com/aio-libs/aiohttp/commit/bc1319ec3cbff9438a758951a30907b072561259",
"url": "https://github.com/aio-libs/aiohttp/commit/bc1319ec3cbff9438a758951a30907b072561259"
},
{
"category": "external",
"summary": "https://github.com/aio-libs/aiohttp/security/advisories/GHSA-jj3x-wxrx-4x23",
"url": "https://github.com/aio-libs/aiohttp/security/advisories/GHSA-jj3x-wxrx-4x23"
}
],
"release_date": "2026-01-05T23:19:31.396000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-07T08:45:04+00:00",
"details": "For more information visit https://access.redhat.com/errata/RHSA-2026:6762",
"product_ids": [
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/vllm-rocm-rhel9@sha256:3e9fbe1a078889d05d0291ef5cfba07924540609f8315c1c88d0f1a13eca5d45_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:6762"
},
{
"category": "workaround",
"details": "No mitigation is currently available that meets Red Hat Product Security\u2019s standards for usability, deployment, applicability, or stability.",
"product_ids": [
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/vllm-rocm-rhel9@sha256:3e9fbe1a078889d05d0291ef5cfba07924540609f8315c1c88d0f1a13eca5d45_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/vllm-rocm-rhel9@sha256:3e9fbe1a078889d05d0291ef5cfba07924540609f8315c1c88d0f1a13eca5d45_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "aiohttp: aiohttp: Denial of Service via specially crafted POST request"
},
{
"cve": "CVE-2025-69228",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-06T00:01:02.119065+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2427254"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in aiohttp. A remote attacker can craft a malicious request that, when processed by an aiohttp server using the `Request.post()` method, causes the server\u0027s memory to fill uncontrollably. This can lead to a Denial of Service (DoS) by freezing the server, making it unavailable to legitimate users.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "aiohttp: aiohttp: Denial of Service via memory exhaustion from crafted POST request",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Moderate for Red Hat products. A flaw in aiohttp allows a remote attacker to cause a Denial of Service (DoS) by sending a specially crafted POST request to an aiohttp server that utilizes the `Request.post()` method. This can lead to uncontrolled memory consumption, freezing the server and making the server unavailable.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/vllm-rocm-rhel9@sha256:3e9fbe1a078889d05d0291ef5cfba07924540609f8315c1c88d0f1a13eca5d45_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-69228"
},
{
"category": "external",
"summary": "RHBZ#2427254",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2427254"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-69228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69228"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-69228",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-69228"
},
{
"category": "external",
"summary": "https://github.com/aio-libs/aiohttp/commit/b7dbd35375aedbcd712cbae8ad513d56d11cce60",
"url": "https://github.com/aio-libs/aiohttp/commit/b7dbd35375aedbcd712cbae8ad513d56d11cce60"
},
{
"category": "external",
"summary": "https://github.com/aio-libs/aiohttp/security/advisories/GHSA-6jhg-hg63-jvvf",
"url": "https://github.com/aio-libs/aiohttp/security/advisories/GHSA-6jhg-hg63-jvvf"
}
],
"release_date": "2026-01-05T23:30:33.440000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-07T08:45:04+00:00",
"details": "For more information visit https://access.redhat.com/errata/RHSA-2026:6762",
"product_ids": [
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/vllm-rocm-rhel9@sha256:3e9fbe1a078889d05d0291ef5cfba07924540609f8315c1c88d0f1a13eca5d45_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:6762"
},
{
"category": "workaround",
"details": "No mitigation is currently available that meets Red Hat Product Security\u2019s standards for usability, deployment, applicability, or stability.",
"product_ids": [
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/vllm-rocm-rhel9@sha256:3e9fbe1a078889d05d0291ef5cfba07924540609f8315c1c88d0f1a13eca5d45_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/vllm-rocm-rhel9@sha256:3e9fbe1a078889d05d0291ef5cfba07924540609f8315c1c88d0f1a13eca5d45_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "aiohttp: aiohttp: Denial of Service via memory exhaustion from crafted POST request"
},
{
"cve": "CVE-2026-25048",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"discovery_date": "2026-03-05T16:01:14.634884+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2444840"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in xgrammar, an open-source library for structured generation. This vulnerability allows an attacker to trigger a segmentation fault, causing the program to crash and resulting in a Denial of Service (DoS). The issue occurs due to improper handling of multi-level nested syntax.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xgrammar: xgrammar: Denial of Service via multi-level nested syntax",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/vllm-rocm-rhel9@sha256:3e9fbe1a078889d05d0291ef5cfba07924540609f8315c1c88d0f1a13eca5d45_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-25048"
},
{
"category": "external",
"summary": "RHBZ#2444840",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2444840"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-25048",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25048"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-25048",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25048"
},
{
"category": "external",
"summary": "https://github.com/mlc-ai/xgrammar/releases/tag/v0.1.32",
"url": "https://github.com/mlc-ai/xgrammar/releases/tag/v0.1.32"
},
{
"category": "external",
"summary": "https://github.com/mlc-ai/xgrammar/security/advisories/GHSA-7rgv-gqhr-fxg3",
"url": "https://github.com/mlc-ai/xgrammar/security/advisories/GHSA-7rgv-gqhr-fxg3"
}
],
"release_date": "2026-03-05T15:34:42.095000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-07T08:45:04+00:00",
"details": "For more information visit https://access.redhat.com/errata/RHSA-2026:6762",
"product_ids": [
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/vllm-rocm-rhel9@sha256:3e9fbe1a078889d05d0291ef5cfba07924540609f8315c1c88d0f1a13eca5d45_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:6762"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/vllm-rocm-rhel9@sha256:3e9fbe1a078889d05d0291ef5cfba07924540609f8315c1c88d0f1a13eca5d45_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/vllm-rocm-rhel9@sha256:3e9fbe1a078889d05d0291ef5cfba07924540609f8315c1c88d0f1a13eca5d45_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xgrammar: xgrammar: Denial of Service via multi-level nested syntax"
},
{
"cve": "CVE-2026-28356",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"discovery_date": "2026-03-12T18:01:57.290176+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2447059"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in multipart. The parse_options_header function in multipart.py uses a regular expression with an ambiguous alternation, causing an exponential backtracking (ReDoS) when parsing a specially crafted HTTP or multipart segment headers. A web application parsing request headers or multipart/form-data streams can block request handling threads for multiple seconds per request, eventually resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "multipart: denial of service via maliciously crafted HTTP or multipart segment headers",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is only exploitable in applications using the multipart.parse_form_data function directly or indirectly when parsing request headers or multipart/form-data streams. Also, the security impact of this flaw is limited to a denial of service, there is no corruption of memory or arbitrary code execution. Due to these reasons, this vulnerability has been rated with an important severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/vllm-rocm-rhel9@sha256:3e9fbe1a078889d05d0291ef5cfba07924540609f8315c1c88d0f1a13eca5d45_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-28356"
},
{
"category": "external",
"summary": "RHBZ#2447059",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447059"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-28356",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28356"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-28356",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-28356"
},
{
"category": "external",
"summary": "https://github.com/defnull/multipart/security/advisories/GHSA-p2m9-wcp5-6qw3",
"url": "https://github.com/defnull/multipart/security/advisories/GHSA-p2m9-wcp5-6qw3"
}
],
"release_date": "2026-03-12T16:45:01.070000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-07T08:45:04+00:00",
"details": "For more information visit https://access.redhat.com/errata/RHSA-2026:6762",
"product_ids": [
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/vllm-rocm-rhel9@sha256:3e9fbe1a078889d05d0291ef5cfba07924540609f8315c1c88d0f1a13eca5d45_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:6762"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/vllm-rocm-rhel9@sha256:3e9fbe1a078889d05d0291ef5cfba07924540609f8315c1c88d0f1a13eca5d45_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/vllm-rocm-rhel9@sha256:3e9fbe1a078889d05d0291ef5cfba07924540609f8315c1c88d0f1a13eca5d45_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "multipart: denial of service via maliciously crafted HTTP or multipart segment headers"
},
{
"cve": "CVE-2026-32981",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2026-03-17T20:01:37.453284+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2448440"
}
],
"notes": [
{
"category": "description",
"text": "A path traversal flaw has been identified in Ray Dashboard in the Ray Pypi package. Due to improper validation and sanitization of user-supplied paths in the static file handling mechanism, an attacker can use traversal sequences (e.g., ../) to access files outside the intended static directory, resulting in local file disclosure.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ray: Ray Dashboard Path Traversal Leading to Local File Disclosure",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/vllm-rocm-rhel9@sha256:3e9fbe1a078889d05d0291ef5cfba07924540609f8315c1c88d0f1a13eca5d45_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-32981"
},
{
"category": "external",
"summary": "RHBZ#2448440",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448440"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-32981",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32981"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-32981",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32981"
},
{
"category": "external",
"summary": "https://github.com/ray-project/ray",
"url": "https://github.com/ray-project/ray"
},
{
"category": "external",
"summary": "https://packetstorm.news/files/id/215801/",
"url": "https://packetstorm.news/files/id/215801/"
},
{
"category": "external",
"summary": "https://www.vulncheck.com/advisories/ray-dashboard-path-traversal-leading-to-local-file-disclosure",
"url": "https://www.vulncheck.com/advisories/ray-dashboard-path-traversal-leading-to-local-file-disclosure"
}
],
"release_date": "2026-03-17T19:33:50.107000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-07T08:45:04+00:00",
"details": "For more information visit https://access.redhat.com/errata/RHSA-2026:6762",
"product_ids": [
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/vllm-rocm-rhel9@sha256:3e9fbe1a078889d05d0291ef5cfba07924540609f8315c1c88d0f1a13eca5d45_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:6762"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/vllm-rocm-rhel9@sha256:3e9fbe1a078889d05d0291ef5cfba07924540609f8315c1c88d0f1a13eca5d45_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/vllm-rocm-rhel9@sha256:3e9fbe1a078889d05d0291ef5cfba07924540609f8315c1c88d0f1a13eca5d45_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "ray: Ray Dashboard Path Traversal Leading to Local File Disclosure"
}
]
}
RHSA-2026:5809
Vulnerability from csaf_redhat - Published: 2026-03-25 13:08 - Updated: 2026-04-08 13:34A flaw was found in cbor2. When a CBORDecoder instance is reused across multiple decode operations, values marked with the shareable tag (28) persist in memory. This allows an attacker-controlled message to read sensitive data from previously decoded messages if the decoder is reused across trust boundaries, leading to information disclosure.
A flaw was found in aiohttp, an asynchronous HTTP client/server framework for Python. A remote attacker could exploit this vulnerability by sending a specially crafted POST request to an application using the Request.post() method, provided that Python optimizations are enabled. This could lead to an infinite loop, resulting in a Denial of Service (DoS) attack, making the affected application unavailable.
A flaw was found in aiohttp. A remote attacker can craft a malicious request that, when processed by an aiohttp server using the `Request.post()` method, causes the server's memory to fill uncontrollably. This can lead to a Denial of Service (DoS) by freezing the server, making it unavailable to legitimate users.
A flaw was found in xgrammar, an open-source library for structured generation. This vulnerability allows an attacker to trigger a segmentation fault, causing the program to crash and resulting in a Denial of Service (DoS). The issue occurs due to improper handling of multi-level nested syntax.
A flaw was found in multipart. The parse_options_header function in multipart.py uses a regular expression with an ambiguous alternation, causing an exponential backtracking (ReDoS) when parsing a specially crafted HTTP or multipart segment headers. A web application parsing request headers or multipart/form-data streams can block request handling threads for multiple seconds per request, eventually resulting in a denial of service.
A path traversal flaw has been identified in Ray Dashboard in the Ray Pypi package. Due to improper validation and sanitization of user-supplied paths in the static file handling mechanism, an attacker can use traversal sequences (e.g., ../) to access files outside the intended static directory, resulting in local file disclosure.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat AI Inference Server 3.2.2 (cuda-ubi9) is now available.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat\u00ae AI Inference Server",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:5809",
"url": "https://access.redhat.com/errata/RHSA-2026:5809"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-68131",
"url": "https://access.redhat.com/security/cve/CVE-2025-68131"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-69227",
"url": "https://access.redhat.com/security/cve/CVE-2025-69227"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-69228",
"url": "https://access.redhat.com/security/cve/CVE-2025-69228"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-25048",
"url": "https://access.redhat.com/security/cve/CVE-2026-25048"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-28356",
"url": "https://access.redhat.com/security/cve/CVE-2026-28356"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-32981",
"url": "https://access.redhat.com/security/cve/CVE-2026-32981"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "external",
"summary": "https://www.redhat.com/en/products/ai/inference-server",
"url": "https://www.redhat.com/en/products/ai/inference-server"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_5809.json"
}
],
"title": "Red Hat Security Advisory: Red Hat AI Inference Server 3.2.2 (cuda-ubi9)",
"tracking": {
"current_release_date": "2026-04-08T13:34:47+00:00",
"generator": {
"date": "2026-04-08T13:34:47+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.5"
}
},
"id": "RHSA-2026:5809",
"initial_release_date": "2026-03-25T13:08:34+00:00",
"revision_history": [
{
"date": "2026-03-25T13:08:34+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-03-25T13:08:45+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-08T13:34:47+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat AI Inference Server 3.2",
"product": {
"name": "Red Hat AI Inference Server 3.2",
"product_id": "Red Hat AI Inference Server 3.2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:ai_inference_server:3.2::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat AI Inference Server"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rhaiis/vllm-cuda-rhel9@sha256:bd371b1b8785b2f5799cbca4a12a1c66a1e8a37017334a79eaa1067b24b6a6ba_amd64",
"product": {
"name": "registry.redhat.io/rhaiis/vllm-cuda-rhel9@sha256:bd371b1b8785b2f5799cbca4a12a1c66a1e8a37017334a79eaa1067b24b6a6ba_amd64",
"product_id": "registry.redhat.io/rhaiis/vllm-cuda-rhel9@sha256:bd371b1b8785b2f5799cbca4a12a1c66a1e8a37017334a79eaa1067b24b6a6ba_amd64",
"product_identification_helper": {
"purl": "pkg:oci/vllm-cuda-rhel9@sha256%3Abd371b1b8785b2f5799cbca4a12a1c66a1e8a37017334a79eaa1067b24b6a6ba?arch=amd64\u0026repository_url=registry.redhat.io/rhaiis\u0026tag=1774351144"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rhaiis/vllm-cuda-rhel9@sha256:ee2846fae19a57151e878992484359bb834d91cada6b53c58e5c2a0b5675aa68_arm64",
"product": {
"name": "registry.redhat.io/rhaiis/vllm-cuda-rhel9@sha256:ee2846fae19a57151e878992484359bb834d91cada6b53c58e5c2a0b5675aa68_arm64",
"product_id": "registry.redhat.io/rhaiis/vllm-cuda-rhel9@sha256:ee2846fae19a57151e878992484359bb834d91cada6b53c58e5c2a0b5675aa68_arm64",
"product_identification_helper": {
"purl": "pkg:oci/vllm-cuda-rhel9@sha256%3Aee2846fae19a57151e878992484359bb834d91cada6b53c58e5c2a0b5675aa68?arch=arm64\u0026repository_url=registry.redhat.io/rhaiis\u0026tag=1774351144"
}
}
}
],
"category": "architecture",
"name": "arm64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhaiis/vllm-cuda-rhel9@sha256:bd371b1b8785b2f5799cbca4a12a1c66a1e8a37017334a79eaa1067b24b6a6ba_amd64 as a component of Red Hat AI Inference Server 3.2",
"product_id": "Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/vllm-cuda-rhel9@sha256:bd371b1b8785b2f5799cbca4a12a1c66a1e8a37017334a79eaa1067b24b6a6ba_amd64"
},
"product_reference": "registry.redhat.io/rhaiis/vllm-cuda-rhel9@sha256:bd371b1b8785b2f5799cbca4a12a1c66a1e8a37017334a79eaa1067b24b6a6ba_amd64",
"relates_to_product_reference": "Red Hat AI Inference Server 3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhaiis/vllm-cuda-rhel9@sha256:ee2846fae19a57151e878992484359bb834d91cada6b53c58e5c2a0b5675aa68_arm64 as a component of Red Hat AI Inference Server 3.2",
"product_id": "Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/vllm-cuda-rhel9@sha256:ee2846fae19a57151e878992484359bb834d91cada6b53c58e5c2a0b5675aa68_arm64"
},
"product_reference": "registry.redhat.io/rhaiis/vllm-cuda-rhel9@sha256:ee2846fae19a57151e878992484359bb834d91cada6b53c58e5c2a0b5675aa68_arm64",
"relates_to_product_reference": "Red Hat AI Inference Server 3.2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-68131",
"cwe": {
"id": "CWE-212",
"name": "Improper Removal of Sensitive Information Before Storage or Transfer"
},
"discovery_date": "2025-12-31T02:00:55.240416+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2426395"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in cbor2. When a CBORDecoder instance is reused across multiple decode operations, values marked with the shareable tag (28) persist in memory. This allows an attacker-controlled message to read sensitive data from previously decoded messages if the decoder is reused across trust boundaries, leading to information disclosure.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "cbor2: cbor2: Information Disclosure via shared memory in CBORDecoder reuse",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Moderate for Red Hat products. The flaw in cbor2 allows information disclosure if a CBORDecoder instance is reused across trust boundaries. This could lead to an attacker-controlled message reading sensitive data from previously decoded messages. This affects Red Hat AI Inference Server, Red Hat Enterprise Linux AI, and Red Hat OpenShift AI when processing untrusted CBOR data with a reused decoder.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/vllm-cuda-rhel9@sha256:bd371b1b8785b2f5799cbca4a12a1c66a1e8a37017334a79eaa1067b24b6a6ba_amd64",
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/vllm-cuda-rhel9@sha256:ee2846fae19a57151e878992484359bb834d91cada6b53c58e5c2a0b5675aa68_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-68131"
},
{
"category": "external",
"summary": "RHBZ#2426395",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426395"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-68131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68131"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-68131",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68131"
},
{
"category": "external",
"summary": "https://github.com/agronholm/cbor2/pull/268",
"url": "https://github.com/agronholm/cbor2/pull/268"
},
{
"category": "external",
"summary": "https://github.com/agronholm/cbor2/security/advisories/GHSA-wcj4-jw5j-44wh",
"url": "https://github.com/agronholm/cbor2/security/advisories/GHSA-wcj4-jw5j-44wh"
}
],
"release_date": "2025-12-31T01:15:36.827000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-25T13:08:34+00:00",
"details": "For more information visit https://access.redhat.com/errata/RHSA-2026:5809",
"product_ids": [
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/vllm-cuda-rhel9@sha256:bd371b1b8785b2f5799cbca4a12a1c66a1e8a37017334a79eaa1067b24b6a6ba_amd64",
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/vllm-cuda-rhel9@sha256:ee2846fae19a57151e878992484359bb834d91cada6b53c58e5c2a0b5675aa68_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:5809"
},
{
"category": "workaround",
"details": "To mitigate this issue, applications utilizing the `cbor2` library should avoid reusing `CBORDecoder` instances when processing data from different trust levels. If `CBORDecoder` reuse is unavoidable, ensure that sensitive data is not processed by a decoder instance that will subsequently handle untrusted input. This operational control prevents an attacker from accessing prior decoded information.",
"product_ids": [
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/vllm-cuda-rhel9@sha256:bd371b1b8785b2f5799cbca4a12a1c66a1e8a37017334a79eaa1067b24b6a6ba_amd64",
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/vllm-cuda-rhel9@sha256:ee2846fae19a57151e878992484359bb834d91cada6b53c58e5c2a0b5675aa68_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/vllm-cuda-rhel9@sha256:bd371b1b8785b2f5799cbca4a12a1c66a1e8a37017334a79eaa1067b24b6a6ba_amd64",
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/vllm-cuda-rhel9@sha256:ee2846fae19a57151e878992484359bb834d91cada6b53c58e5c2a0b5675aa68_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "cbor2: cbor2: Information Disclosure via shared memory in CBORDecoder reuse"
},
{
"cve": "CVE-2025-69227",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2026-01-06T00:01:17.036900+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2427256"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in aiohttp, an asynchronous HTTP client/server framework for Python. A remote attacker could exploit this vulnerability by sending a specially crafted POST request to an application using the Request.post() method, provided that Python optimizations are enabled. This could lead to an infinite loop, resulting in a Denial of Service (DoS) attack, making the affected application unavailable.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "aiohttp: aiohttp: Denial of Service via specially crafted POST request",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Moderate for Red Hat products as it can lead to a Denial of Service (DoS) in applications utilizing the `aiohttp` library. Exploitation requires Python optimizations to be explicitly enabled (e.g., via `-O` or `PYTHONOPTIMIZE=1`) and the application to process POST requests using the `Request.post()` method. Red Hat products are affected if they meet these specific configuration and usage criteria.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/vllm-cuda-rhel9@sha256:bd371b1b8785b2f5799cbca4a12a1c66a1e8a37017334a79eaa1067b24b6a6ba_amd64",
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/vllm-cuda-rhel9@sha256:ee2846fae19a57151e878992484359bb834d91cada6b53c58e5c2a0b5675aa68_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-69227"
},
{
"category": "external",
"summary": "RHBZ#2427256",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2427256"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-69227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69227"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-69227",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-69227"
},
{
"category": "external",
"summary": "https://github.com/aio-libs/aiohttp/commit/bc1319ec3cbff9438a758951a30907b072561259",
"url": "https://github.com/aio-libs/aiohttp/commit/bc1319ec3cbff9438a758951a30907b072561259"
},
{
"category": "external",
"summary": "https://github.com/aio-libs/aiohttp/security/advisories/GHSA-jj3x-wxrx-4x23",
"url": "https://github.com/aio-libs/aiohttp/security/advisories/GHSA-jj3x-wxrx-4x23"
}
],
"release_date": "2026-01-05T23:19:31.396000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-25T13:08:34+00:00",
"details": "For more information visit https://access.redhat.com/errata/RHSA-2026:5809",
"product_ids": [
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/vllm-cuda-rhel9@sha256:bd371b1b8785b2f5799cbca4a12a1c66a1e8a37017334a79eaa1067b24b6a6ba_amd64",
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/vllm-cuda-rhel9@sha256:ee2846fae19a57151e878992484359bb834d91cada6b53c58e5c2a0b5675aa68_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:5809"
},
{
"category": "workaround",
"details": "No mitigation is currently available that meets Red Hat Product Security\u2019s standards for usability, deployment, applicability, or stability.",
"product_ids": [
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/vllm-cuda-rhel9@sha256:bd371b1b8785b2f5799cbca4a12a1c66a1e8a37017334a79eaa1067b24b6a6ba_amd64",
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/vllm-cuda-rhel9@sha256:ee2846fae19a57151e878992484359bb834d91cada6b53c58e5c2a0b5675aa68_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/vllm-cuda-rhel9@sha256:bd371b1b8785b2f5799cbca4a12a1c66a1e8a37017334a79eaa1067b24b6a6ba_amd64",
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/vllm-cuda-rhel9@sha256:ee2846fae19a57151e878992484359bb834d91cada6b53c58e5c2a0b5675aa68_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "aiohttp: aiohttp: Denial of Service via specially crafted POST request"
},
{
"cve": "CVE-2025-69228",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-06T00:01:02.119065+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2427254"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in aiohttp. A remote attacker can craft a malicious request that, when processed by an aiohttp server using the `Request.post()` method, causes the server\u0027s memory to fill uncontrollably. This can lead to a Denial of Service (DoS) by freezing the server, making it unavailable to legitimate users.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "aiohttp: aiohttp: Denial of Service via memory exhaustion from crafted POST request",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Moderate for Red Hat products. A flaw in aiohttp allows a remote attacker to cause a Denial of Service (DoS) by sending a specially crafted POST request to an aiohttp server that utilizes the `Request.post()` method. This can lead to uncontrolled memory consumption, freezing the server and making the server unavailable.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/vllm-cuda-rhel9@sha256:bd371b1b8785b2f5799cbca4a12a1c66a1e8a37017334a79eaa1067b24b6a6ba_amd64",
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/vllm-cuda-rhel9@sha256:ee2846fae19a57151e878992484359bb834d91cada6b53c58e5c2a0b5675aa68_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-69228"
},
{
"category": "external",
"summary": "RHBZ#2427254",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2427254"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-69228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69228"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-69228",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-69228"
},
{
"category": "external",
"summary": "https://github.com/aio-libs/aiohttp/commit/b7dbd35375aedbcd712cbae8ad513d56d11cce60",
"url": "https://github.com/aio-libs/aiohttp/commit/b7dbd35375aedbcd712cbae8ad513d56d11cce60"
},
{
"category": "external",
"summary": "https://github.com/aio-libs/aiohttp/security/advisories/GHSA-6jhg-hg63-jvvf",
"url": "https://github.com/aio-libs/aiohttp/security/advisories/GHSA-6jhg-hg63-jvvf"
}
],
"release_date": "2026-01-05T23:30:33.440000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-25T13:08:34+00:00",
"details": "For more information visit https://access.redhat.com/errata/RHSA-2026:5809",
"product_ids": [
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/vllm-cuda-rhel9@sha256:bd371b1b8785b2f5799cbca4a12a1c66a1e8a37017334a79eaa1067b24b6a6ba_amd64",
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/vllm-cuda-rhel9@sha256:ee2846fae19a57151e878992484359bb834d91cada6b53c58e5c2a0b5675aa68_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:5809"
},
{
"category": "workaround",
"details": "No mitigation is currently available that meets Red Hat Product Security\u2019s standards for usability, deployment, applicability, or stability.",
"product_ids": [
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/vllm-cuda-rhel9@sha256:bd371b1b8785b2f5799cbca4a12a1c66a1e8a37017334a79eaa1067b24b6a6ba_amd64",
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/vllm-cuda-rhel9@sha256:ee2846fae19a57151e878992484359bb834d91cada6b53c58e5c2a0b5675aa68_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/vllm-cuda-rhel9@sha256:bd371b1b8785b2f5799cbca4a12a1c66a1e8a37017334a79eaa1067b24b6a6ba_amd64",
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/vllm-cuda-rhel9@sha256:ee2846fae19a57151e878992484359bb834d91cada6b53c58e5c2a0b5675aa68_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "aiohttp: aiohttp: Denial of Service via memory exhaustion from crafted POST request"
},
{
"cve": "CVE-2026-25048",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"discovery_date": "2026-03-05T16:01:14.634884+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2444840"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in xgrammar, an open-source library for structured generation. This vulnerability allows an attacker to trigger a segmentation fault, causing the program to crash and resulting in a Denial of Service (DoS). The issue occurs due to improper handling of multi-level nested syntax.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xgrammar: xgrammar: Denial of Service via multi-level nested syntax",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/vllm-cuda-rhel9@sha256:bd371b1b8785b2f5799cbca4a12a1c66a1e8a37017334a79eaa1067b24b6a6ba_amd64",
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/vllm-cuda-rhel9@sha256:ee2846fae19a57151e878992484359bb834d91cada6b53c58e5c2a0b5675aa68_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-25048"
},
{
"category": "external",
"summary": "RHBZ#2444840",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2444840"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-25048",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25048"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-25048",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25048"
},
{
"category": "external",
"summary": "https://github.com/mlc-ai/xgrammar/releases/tag/v0.1.32",
"url": "https://github.com/mlc-ai/xgrammar/releases/tag/v0.1.32"
},
{
"category": "external",
"summary": "https://github.com/mlc-ai/xgrammar/security/advisories/GHSA-7rgv-gqhr-fxg3",
"url": "https://github.com/mlc-ai/xgrammar/security/advisories/GHSA-7rgv-gqhr-fxg3"
}
],
"release_date": "2026-03-05T15:34:42.095000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-25T13:08:34+00:00",
"details": "For more information visit https://access.redhat.com/errata/RHSA-2026:5809",
"product_ids": [
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/vllm-cuda-rhel9@sha256:bd371b1b8785b2f5799cbca4a12a1c66a1e8a37017334a79eaa1067b24b6a6ba_amd64",
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/vllm-cuda-rhel9@sha256:ee2846fae19a57151e878992484359bb834d91cada6b53c58e5c2a0b5675aa68_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:5809"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/vllm-cuda-rhel9@sha256:bd371b1b8785b2f5799cbca4a12a1c66a1e8a37017334a79eaa1067b24b6a6ba_amd64",
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/vllm-cuda-rhel9@sha256:ee2846fae19a57151e878992484359bb834d91cada6b53c58e5c2a0b5675aa68_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/vllm-cuda-rhel9@sha256:bd371b1b8785b2f5799cbca4a12a1c66a1e8a37017334a79eaa1067b24b6a6ba_amd64",
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/vllm-cuda-rhel9@sha256:ee2846fae19a57151e878992484359bb834d91cada6b53c58e5c2a0b5675aa68_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xgrammar: xgrammar: Denial of Service via multi-level nested syntax"
},
{
"cve": "CVE-2026-28356",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"discovery_date": "2026-03-12T18:01:57.290176+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2447059"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in multipart. The parse_options_header function in multipart.py uses a regular expression with an ambiguous alternation, causing an exponential backtracking (ReDoS) when parsing a specially crafted HTTP or multipart segment headers. A web application parsing request headers or multipart/form-data streams can block request handling threads for multiple seconds per request, eventually resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "multipart: denial of service via maliciously crafted HTTP or multipart segment headers",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is only exploitable in applications using the multipart.parse_form_data function directly or indirectly when parsing request headers or multipart/form-data streams. Also, the security impact of this flaw is limited to a denial of service, there is no corruption of memory or arbitrary code execution. Due to these reasons, this vulnerability has been rated with an important severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/vllm-cuda-rhel9@sha256:bd371b1b8785b2f5799cbca4a12a1c66a1e8a37017334a79eaa1067b24b6a6ba_amd64",
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/vllm-cuda-rhel9@sha256:ee2846fae19a57151e878992484359bb834d91cada6b53c58e5c2a0b5675aa68_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-28356"
},
{
"category": "external",
"summary": "RHBZ#2447059",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447059"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-28356",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28356"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-28356",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-28356"
},
{
"category": "external",
"summary": "https://github.com/defnull/multipart/security/advisories/GHSA-p2m9-wcp5-6qw3",
"url": "https://github.com/defnull/multipart/security/advisories/GHSA-p2m9-wcp5-6qw3"
}
],
"release_date": "2026-03-12T16:45:01.070000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-25T13:08:34+00:00",
"details": "For more information visit https://access.redhat.com/errata/RHSA-2026:5809",
"product_ids": [
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/vllm-cuda-rhel9@sha256:bd371b1b8785b2f5799cbca4a12a1c66a1e8a37017334a79eaa1067b24b6a6ba_amd64",
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/vllm-cuda-rhel9@sha256:ee2846fae19a57151e878992484359bb834d91cada6b53c58e5c2a0b5675aa68_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:5809"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/vllm-cuda-rhel9@sha256:bd371b1b8785b2f5799cbca4a12a1c66a1e8a37017334a79eaa1067b24b6a6ba_amd64",
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/vllm-cuda-rhel9@sha256:ee2846fae19a57151e878992484359bb834d91cada6b53c58e5c2a0b5675aa68_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/vllm-cuda-rhel9@sha256:bd371b1b8785b2f5799cbca4a12a1c66a1e8a37017334a79eaa1067b24b6a6ba_amd64",
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/vllm-cuda-rhel9@sha256:ee2846fae19a57151e878992484359bb834d91cada6b53c58e5c2a0b5675aa68_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "multipart: denial of service via maliciously crafted HTTP or multipart segment headers"
},
{
"cve": "CVE-2026-32981",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2026-03-17T20:01:37.453284+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2448440"
}
],
"notes": [
{
"category": "description",
"text": "A path traversal flaw has been identified in Ray Dashboard in the Ray Pypi package. Due to improper validation and sanitization of user-supplied paths in the static file handling mechanism, an attacker can use traversal sequences (e.g., ../) to access files outside the intended static directory, resulting in local file disclosure.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ray: Ray Dashboard Path Traversal Leading to Local File Disclosure",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/vllm-cuda-rhel9@sha256:bd371b1b8785b2f5799cbca4a12a1c66a1e8a37017334a79eaa1067b24b6a6ba_amd64",
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/vllm-cuda-rhel9@sha256:ee2846fae19a57151e878992484359bb834d91cada6b53c58e5c2a0b5675aa68_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-32981"
},
{
"category": "external",
"summary": "RHBZ#2448440",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448440"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-32981",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32981"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-32981",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32981"
},
{
"category": "external",
"summary": "https://github.com/ray-project/ray",
"url": "https://github.com/ray-project/ray"
},
{
"category": "external",
"summary": "https://packetstorm.news/files/id/215801/",
"url": "https://packetstorm.news/files/id/215801/"
},
{
"category": "external",
"summary": "https://www.vulncheck.com/advisories/ray-dashboard-path-traversal-leading-to-local-file-disclosure",
"url": "https://www.vulncheck.com/advisories/ray-dashboard-path-traversal-leading-to-local-file-disclosure"
}
],
"release_date": "2026-03-17T19:33:50.107000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-25T13:08:34+00:00",
"details": "For more information visit https://access.redhat.com/errata/RHSA-2026:5809",
"product_ids": [
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/vllm-cuda-rhel9@sha256:bd371b1b8785b2f5799cbca4a12a1c66a1e8a37017334a79eaa1067b24b6a6ba_amd64",
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/vllm-cuda-rhel9@sha256:ee2846fae19a57151e878992484359bb834d91cada6b53c58e5c2a0b5675aa68_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:5809"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/vllm-cuda-rhel9@sha256:bd371b1b8785b2f5799cbca4a12a1c66a1e8a37017334a79eaa1067b24b6a6ba_amd64",
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/vllm-cuda-rhel9@sha256:ee2846fae19a57151e878992484359bb834d91cada6b53c58e5c2a0b5675aa68_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/vllm-cuda-rhel9@sha256:bd371b1b8785b2f5799cbca4a12a1c66a1e8a37017334a79eaa1067b24b6a6ba_amd64",
"Red Hat AI Inference Server 3.2:registry.redhat.io/rhaiis/vllm-cuda-rhel9@sha256:ee2846fae19a57151e878992484359bb834d91cada6b53c58e5c2a0b5675aa68_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "ray: Ray Dashboard Path Traversal Leading to Local File Disclosure"
}
]
}
OPENSUSE-SU-2026:10014-1
Vulnerability from csaf_opensuse - Published: 2026-01-07 00:00 - Updated: 2026-01-07 00:00{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "python311-cbor2-5.8.0-2.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the python311-cbor2-5.8.0-2.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2026-10014",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2026_10014-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68131 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68131/"
}
],
"title": "python311-cbor2-5.8.0-2.1 on GA media",
"tracking": {
"current_release_date": "2026-01-07T00:00:00Z",
"generator": {
"date": "2026-01-07T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2026:10014-1",
"initial_release_date": "2026-01-07T00:00:00Z",
"revision_history": [
{
"date": "2026-01-07T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "python311-cbor2-5.8.0-2.1.aarch64",
"product": {
"name": "python311-cbor2-5.8.0-2.1.aarch64",
"product_id": "python311-cbor2-5.8.0-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "python312-cbor2-5.8.0-2.1.aarch64",
"product": {
"name": "python312-cbor2-5.8.0-2.1.aarch64",
"product_id": "python312-cbor2-5.8.0-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "python313-cbor2-5.8.0-2.1.aarch64",
"product": {
"name": "python313-cbor2-5.8.0-2.1.aarch64",
"product_id": "python313-cbor2-5.8.0-2.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "python311-cbor2-5.8.0-2.1.ppc64le",
"product": {
"name": "python311-cbor2-5.8.0-2.1.ppc64le",
"product_id": "python311-cbor2-5.8.0-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python312-cbor2-5.8.0-2.1.ppc64le",
"product": {
"name": "python312-cbor2-5.8.0-2.1.ppc64le",
"product_id": "python312-cbor2-5.8.0-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python313-cbor2-5.8.0-2.1.ppc64le",
"product": {
"name": "python313-cbor2-5.8.0-2.1.ppc64le",
"product_id": "python313-cbor2-5.8.0-2.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "python311-cbor2-5.8.0-2.1.s390x",
"product": {
"name": "python311-cbor2-5.8.0-2.1.s390x",
"product_id": "python311-cbor2-5.8.0-2.1.s390x"
}
},
{
"category": "product_version",
"name": "python312-cbor2-5.8.0-2.1.s390x",
"product": {
"name": "python312-cbor2-5.8.0-2.1.s390x",
"product_id": "python312-cbor2-5.8.0-2.1.s390x"
}
},
{
"category": "product_version",
"name": "python313-cbor2-5.8.0-2.1.s390x",
"product": {
"name": "python313-cbor2-5.8.0-2.1.s390x",
"product_id": "python313-cbor2-5.8.0-2.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "python311-cbor2-5.8.0-2.1.x86_64",
"product": {
"name": "python311-cbor2-5.8.0-2.1.x86_64",
"product_id": "python311-cbor2-5.8.0-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "python312-cbor2-5.8.0-2.1.x86_64",
"product": {
"name": "python312-cbor2-5.8.0-2.1.x86_64",
"product_id": "python312-cbor2-5.8.0-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "python313-cbor2-5.8.0-2.1.x86_64",
"product": {
"name": "python313-cbor2-5.8.0-2.1.x86_64",
"product_id": "python313-cbor2-5.8.0-2.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-cbor2-5.8.0-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python311-cbor2-5.8.0-2.1.aarch64"
},
"product_reference": "python311-cbor2-5.8.0-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-cbor2-5.8.0-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python311-cbor2-5.8.0-2.1.ppc64le"
},
"product_reference": "python311-cbor2-5.8.0-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-cbor2-5.8.0-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python311-cbor2-5.8.0-2.1.s390x"
},
"product_reference": "python311-cbor2-5.8.0-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-cbor2-5.8.0-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python311-cbor2-5.8.0-2.1.x86_64"
},
"product_reference": "python311-cbor2-5.8.0-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-cbor2-5.8.0-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python312-cbor2-5.8.0-2.1.aarch64"
},
"product_reference": "python312-cbor2-5.8.0-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-cbor2-5.8.0-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python312-cbor2-5.8.0-2.1.ppc64le"
},
"product_reference": "python312-cbor2-5.8.0-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-cbor2-5.8.0-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python312-cbor2-5.8.0-2.1.s390x"
},
"product_reference": "python312-cbor2-5.8.0-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-cbor2-5.8.0-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python312-cbor2-5.8.0-2.1.x86_64"
},
"product_reference": "python312-cbor2-5.8.0-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python313-cbor2-5.8.0-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python313-cbor2-5.8.0-2.1.aarch64"
},
"product_reference": "python313-cbor2-5.8.0-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python313-cbor2-5.8.0-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python313-cbor2-5.8.0-2.1.ppc64le"
},
"product_reference": "python313-cbor2-5.8.0-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python313-cbor2-5.8.0-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python313-cbor2-5.8.0-2.1.s390x"
},
"product_reference": "python313-cbor2-5.8.0-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python313-cbor2-5.8.0-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python313-cbor2-5.8.0-2.1.x86_64"
},
"product_reference": "python313-cbor2-5.8.0-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-68131",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68131"
}
],
"notes": [
{
"category": "general",
"text": "cbor2 provides encoding and decoding for the Concise Binary Object Representation (CBOR) serialization format. Starting in version 3.0.0 and prior to version 5.8.0, whhen a CBORDecoder instance is reused across multiple decode operations, values marked with the shareable tag (28) persist in memory and can be accessed by subsequent CBOR messages using the sharedref tag (29). This allows an attacker-controlled message to read data from previously decoded messages if the decoder is reused across trust boundaries. Version 5.8.0 patches the issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python311-cbor2-5.8.0-2.1.aarch64",
"openSUSE Tumbleweed:python311-cbor2-5.8.0-2.1.ppc64le",
"openSUSE Tumbleweed:python311-cbor2-5.8.0-2.1.s390x",
"openSUSE Tumbleweed:python311-cbor2-5.8.0-2.1.x86_64",
"openSUSE Tumbleweed:python312-cbor2-5.8.0-2.1.aarch64",
"openSUSE Tumbleweed:python312-cbor2-5.8.0-2.1.ppc64le",
"openSUSE Tumbleweed:python312-cbor2-5.8.0-2.1.s390x",
"openSUSE Tumbleweed:python312-cbor2-5.8.0-2.1.x86_64",
"openSUSE Tumbleweed:python313-cbor2-5.8.0-2.1.aarch64",
"openSUSE Tumbleweed:python313-cbor2-5.8.0-2.1.ppc64le",
"openSUSE Tumbleweed:python313-cbor2-5.8.0-2.1.s390x",
"openSUSE Tumbleweed:python313-cbor2-5.8.0-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68131",
"url": "https://www.suse.com/security/cve/CVE-2025-68131"
},
{
"category": "external",
"summary": "SUSE Bug 1255783 for CVE-2025-68131",
"url": "https://bugzilla.suse.com/1255783"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python311-cbor2-5.8.0-2.1.aarch64",
"openSUSE Tumbleweed:python311-cbor2-5.8.0-2.1.ppc64le",
"openSUSE Tumbleweed:python311-cbor2-5.8.0-2.1.s390x",
"openSUSE Tumbleweed:python311-cbor2-5.8.0-2.1.x86_64",
"openSUSE Tumbleweed:python312-cbor2-5.8.0-2.1.aarch64",
"openSUSE Tumbleweed:python312-cbor2-5.8.0-2.1.ppc64le",
"openSUSE Tumbleweed:python312-cbor2-5.8.0-2.1.s390x",
"openSUSE Tumbleweed:python312-cbor2-5.8.0-2.1.x86_64",
"openSUSE Tumbleweed:python313-cbor2-5.8.0-2.1.aarch64",
"openSUSE Tumbleweed:python313-cbor2-5.8.0-2.1.ppc64le",
"openSUSE Tumbleweed:python313-cbor2-5.8.0-2.1.s390x",
"openSUSE Tumbleweed:python313-cbor2-5.8.0-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python311-cbor2-5.8.0-2.1.aarch64",
"openSUSE Tumbleweed:python311-cbor2-5.8.0-2.1.ppc64le",
"openSUSE Tumbleweed:python311-cbor2-5.8.0-2.1.s390x",
"openSUSE Tumbleweed:python311-cbor2-5.8.0-2.1.x86_64",
"openSUSE Tumbleweed:python312-cbor2-5.8.0-2.1.aarch64",
"openSUSE Tumbleweed:python312-cbor2-5.8.0-2.1.ppc64le",
"openSUSE Tumbleweed:python312-cbor2-5.8.0-2.1.s390x",
"openSUSE Tumbleweed:python312-cbor2-5.8.0-2.1.x86_64",
"openSUSE Tumbleweed:python313-cbor2-5.8.0-2.1.aarch64",
"openSUSE Tumbleweed:python313-cbor2-5.8.0-2.1.ppc64le",
"openSUSE Tumbleweed:python313-cbor2-5.8.0-2.1.s390x",
"openSUSE Tumbleweed:python313-cbor2-5.8.0-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-68131"
}
]
}
GHSA-WCJ4-JW5J-44WH
Vulnerability from github – Published: 2025-12-31 22:01 – Updated: 2026-01-07 15:18Summary
When a CBORDecoder instance is reused across multiple decode operations, values marked with the shareable tag (28) persist in memory and can be accessed by subsequent CBOR messages using the sharedref tag (29). This allows an attacker-controlled message to read data from previously decoded messages if the decoder is reused across trust boundaries.
Details
The issue is in the decoder's handling of the shareables list, which stores values tagged with CBOR tag 28 (shareable) for later reference by tag 29 (sharedref).
When decode_from_bytes() is called or when .fp is set to a new stream, the shareables list is not cleared. This allows references to persist across separate decode operations.
The issue exists in both the C extension and the pure Python decoder.
In the C extension (source/decoder.c), the _CBORDecoder_set_fp function (line ~202) updates the file pointer but does not reset the shareables state:
static int
_CBORDecoder_set_fp(CBORDecoderObject *self, PyObject *value, void *closure)
{
// ... validation ...
tmp = self->read;
self->read = read;
Py_DECREF(tmp);
return 0;
// Missing: PyList_Clear(self->shareables) or equivalent
}
In the pure Python decoder (cbor2/_decoder.py), the fp setter similarly fails to clear self._shareables.
Similarly, decode_from_bytes() in both implementations saves and restores the read pointer but does not clear the shareables list between decodes.
The shareable/sharedref tags are defined in the CBOR value sharing extension (http://cbor.schmorp.de/value-sharing) with scope limited to a single CBOR data item, not across separate messages.
PoC
import cbor2
from io import BytesIO
# Message from trusted source containing a shareable value
msg1 = cbor2.dumps(cbor2.CBORTag(28, "secret"))
# Attacker-controlled message referencing index 0
msg2 = cbor2.dumps(cbor2.CBORTag(29, 0))
# Decoder reused across trust boundaries
decoder = cbor2.CBORDecoder(BytesIO(b''))
decoder.decode_from_bytes(msg1)
print(decoder.decode_from_bytes(msg2)) # prints "secret"
No special configuration required. Affects any application that reuses a CBORDecoder instance to decode messages from different sources.
Impact
Information disclosure. Applications that reuse a CBORDecoder across trust boundaries are vulnerable if the trusted messages use value sharing (tag 28) and an attacker can send messages containing shared references (tag 29). An attacker who can send a crafted CBOR message containing a sharedref tag can read values from previously decoded messages, potentially exposing sensitive data such as credentials, tokens, or private user data.
Related
A similar issue in the encoder could produce invalid CBOR with dangling shared references:
import cbor2
from io import BytesIO
# Create encoder with value sharing enabled
encoder = cbor2.CBOREncoder(BytesIO(), value_sharing=True)
# Persistent object that will be encoded multiple times
shared_obj = ['hello']
# First encode: array containing shared_obj twice
encoder.encode([shared_obj, shared_obj])
print(f'First encode: {encoder.fp.getvalue().hex()}')
# Output: d81c82d81c816568656c6c6fd81d01
# Second encode: just shared_obj
encoder.fp = BytesIO()
encoder.encode(shared_obj)
result = encoder.fp.getvalue()
print(f'Second encode: {result.hex()}')
# Output: d81d01 (just a shared reference to index 1!)
# Try to decode the second result as standalone CBOR
decoder = cbor2.CBORDecoder(BytesIO(result))
decoded = decoder.decode()
# FAILS: shared reference 1 not found
While primarily a correctness bug, it could cause denial of service if invalid CBOR is transmitted to downstream systems that fail to parse it, or cause silent data corruption if the dangling reference happens to resolve to an unrelated value.
It can also be considered a memory leak in both the decoder and encoder as references are held that will never be released as long as the decoder/encoder remains alive.
Suggested resolution
Add dedicated boolean flags to track when an encode/decode operation is in progress. Reset shared state only when the flag is False (top-level call). This ensures state is reset for standalone calls while preserving shared references for nested calls from hooks (which need access to the registry for cyclic structures).
Decoder (_decoding flag): - decode(): set flag True, reset state, decode, set flag False - decode_from_bytes(): reset state only when flag is False
Encoder (_encoding flag): - encode(): set flag True, reset state, encode, set flag False - encode_to_bytes(): reset state only when flag is False
{
"affected": [
{
"package": {
"ecosystem": "PyPI",
"name": "cbor2"
},
"ranges": [
{
"events": [
{
"introduced": "3.0.0"
},
{
"fixed": "5.8.0"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2025-68131"
],
"database_specific": {
"cwe_ids": [
"CWE-212"
],
"github_reviewed": true,
"github_reviewed_at": "2025-12-31T22:01:38Z",
"nvd_published_at": "2025-12-31T02:15:42Z",
"severity": "MODERATE"
},
"details": "### Summary\nWhen a CBORDecoder instance is reused across multiple decode operations, values marked with the shareable tag (28) persist in memory and can be accessed by subsequent CBOR messages using the sharedref tag (29). This allows an attacker-controlled message to read data from previously decoded messages if the decoder is reused across trust boundaries.\n\n### Details\nThe issue is in the decoder\u0027s handling of the shareables list, which stores values tagged with CBOR tag 28 (shareable) for later reference by tag 29 (sharedref).\n\nWhen decode_from_bytes() is called or when .fp is set to a new stream, the shareables list is not cleared. This allows references to persist across separate decode operations.\n\nThe issue exists in both the C extension and the pure Python decoder.\n\nIn the C extension (source/decoder.c), the _CBORDecoder_set_fp function (line ~202) updates the file pointer but does not reset the shareables state:\n\n```\n static int\n _CBORDecoder_set_fp(CBORDecoderObject *self, PyObject *value, void *closure)\n {\n // ... validation ...\n tmp = self-\u003eread;\n self-\u003eread = read;\n Py_DECREF(tmp);\n return 0;\n // Missing: PyList_Clear(self-\u003eshareables) or equivalent\n }\n```\n\nIn the pure Python decoder (cbor2/_decoder.py), the fp setter similarly fails to clear self._shareables.\n\nSimilarly, decode_from_bytes() in both implementations saves and restores the read pointer but does not clear the shareables list between decodes.\n\nThe shareable/sharedref tags are defined in the CBOR value sharing extension (http://cbor.schmorp.de/value-sharing) with scope limited to a single CBOR data item, not across separate messages.\n\n### PoC\n\n```\nimport cbor2\nfrom io import BytesIO\n\n# Message from trusted source containing a shareable value\nmsg1 = cbor2.dumps(cbor2.CBORTag(28, \"secret\"))\n\n# Attacker-controlled message referencing index 0\nmsg2 = cbor2.dumps(cbor2.CBORTag(29, 0))\n\n# Decoder reused across trust boundaries\ndecoder = cbor2.CBORDecoder(BytesIO(b\u0027\u0027))\ndecoder.decode_from_bytes(msg1)\nprint(decoder.decode_from_bytes(msg2)) # prints \"secret\"\n```\nNo special configuration required. Affects any application that reuses a CBORDecoder instance to decode messages from different sources.\n\n### Impact\nInformation disclosure. Applications that reuse a CBORDecoder across trust boundaries are vulnerable if the trusted messages use value sharing (tag 28) and an attacker can send messages containing shared references (tag 29). An attacker who can send a crafted CBOR message containing a sharedref tag can read values from previously decoded messages, potentially exposing sensitive data such as credentials, tokens, or private user data.\n\n### Related\nA similar issue in the encoder could produce invalid CBOR with dangling shared references:\n\n```\nimport cbor2\nfrom io import BytesIO\n\n# Create encoder with value sharing enabled\nencoder = cbor2.CBOREncoder(BytesIO(), value_sharing=True)\n\n# Persistent object that will be encoded multiple times\nshared_obj = [\u0027hello\u0027]\n\n# First encode: array containing shared_obj twice\nencoder.encode([shared_obj, shared_obj])\nprint(f\u0027First encode: {encoder.fp.getvalue().hex()}\u0027)\n# Output: d81c82d81c816568656c6c6fd81d01\n\n# Second encode: just shared_obj\nencoder.fp = BytesIO()\nencoder.encode(shared_obj)\nresult = encoder.fp.getvalue()\nprint(f\u0027Second encode: {result.hex()}\u0027)\n# Output: d81d01 (just a shared reference to index 1!)\n\n# Try to decode the second result as standalone CBOR\ndecoder = cbor2.CBORDecoder(BytesIO(result))\ndecoded = decoder.decode()\n# FAILS: shared reference 1 not found\n```\n\nWhile primarily a correctness bug, it could cause denial of service if invalid CBOR is transmitted to downstream systems that fail to parse it, or cause silent data corruption if the dangling reference happens to resolve to an unrelated value.\n\nIt can also be considered a memory leak in both the decoder and encoder as references are held that will never be released as long as the decoder/encoder remains alive.\n\n### Suggested resolution\n\nAdd dedicated boolean flags to track when an encode/decode operation is in progress. Reset shared state only when the flag is False (top-level call). This ensures state is reset for standalone calls while preserving shared references for nested calls from hooks (which need access to the registry for cyclic structures).\n\nDecoder (_decoding flag):\n - decode(): set flag True, reset state, decode, set flag False\n - decode_from_bytes(): reset state only when flag is False\n\nEncoder (_encoding flag):\n - encode(): set flag True, reset state, encode, set flag False\n - encode_to_bytes(): reset state only when flag is False",
"id": "GHSA-wcj4-jw5j-44wh",
"modified": "2026-01-07T15:18:22Z",
"published": "2025-12-31T22:01:38Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/agronholm/cbor2/security/advisories/GHSA-wcj4-jw5j-44wh"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68131"
},
{
"type": "WEB",
"url": "https://github.com/agronholm/cbor2/commit/f1d701cd2c411ee40bb1fe383afe7f365f35abf0"
},
{
"type": "PACKAGE",
"url": "https://github.com/agronholm/cbor2"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N/E:P",
"type": "CVSS_V4"
}
],
"summary": "CBORDecoder reuse can leak shareable values across decode calls"
}
FKIE_CVE-2025-68131
Vulnerability from fkie_nvd - Published: 2025-12-31 02:15 - Updated: 2026-01-02 16:40| URL | Tags | ||
|---|---|---|---|
| security-advisories@github.com | https://github.com/agronholm/cbor2/pull/268 | Exploit, Patch | |
| security-advisories@github.com | https://github.com/agronholm/cbor2/security/advisories/GHSA-wcj4-jw5j-44wh | Exploit, Vendor Advisory | |
| 134c704f-9b21-4f2e-91b3-4a467353bcc0 | https://github.com/agronholm/cbor2/security/advisories/GHSA-wcj4-jw5j-44wh | Exploit, Vendor Advisory |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:agronholm:cbor2:*:*:*:*:*:python:*:*",
"matchCriteriaId": "B7E7A985-D868-475E-BAD5-51FBC147198A",
"versionEndExcluding": "5.8.0",
"versionStartIncluding": "3.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "cbor2 provides encoding and decoding for the Concise Binary Object Representation (CBOR) serialization format. Starting in version 3.0.0 and prior to version 5.8.0, whhen a CBORDecoder instance is reused across multiple decode operations, values marked with the shareable tag (28) persist in memory and can be accessed by subsequent CBOR messages using the sharedref tag (29). This allows an attacker-controlled message to read data from previously decoded messages if the decoder is reused across trust boundaries. Version 5.8.0 patches the issue."
},
{
"lang": "es",
"value": "cbor2 proporciona codificaci\u00f3n y decodificaci\u00f3n para el formato de serializaci\u00f3n Concise Binary Object Representation (CBOR). A partir de la versi\u00f3n 3.0.0 y antes de la versi\u00f3n 5.8.0, cuando una instancia de CBORDecoder se reutiliza en m\u00faltiples operaciones de decodificaci\u00f3n, los valores marcados con la etiqueta compartible (28) persisten en la memoria y pueden ser accedidos por mensajes CBOR subsiguientes usando la etiqueta sharedref (29). Esto permite que un mensaje controlado por el atacante lea datos de mensajes decodificados previamente si el decodificador se reutiliza a trav\u00e9s de l\u00edmites de confianza. La versi\u00f3n 5.8.0 corrige el problema."
}
],
"id": "CVE-2025-68131",
"lastModified": "2026-01-02T16:40:40.337",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "PROOF_OF_CONCEPT",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "LOW",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "NONE",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "security-advisories@github.com",
"type": "Secondary"
}
]
},
"published": "2025-12-31T02:15:42.527",
"references": [
{
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Patch"
],
"url": "https://github.com/agronholm/cbor2/pull/268"
},
{
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "https://github.com/agronholm/cbor2/security/advisories/GHSA-wcj4-jw5j-44wh"
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "https://github.com/agronholm/cbor2/security/advisories/GHSA-wcj4-jw5j-44wh"
}
],
"sourceIdentifier": "security-advisories@github.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-212"
}
],
"source": "security-advisories@github.com",
"type": "Secondary"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.