Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2026-27137 (GCVE-0-2026-27137)
Vulnerability from cvelistv5 – Published: 2026-03-06 21:28 – Updated: 2026-03-10 13:32- CWE-295 - Improper Certificate Validation
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Go standard library | crypto/x509 |
Affected:
1.26.0-0 , < 1.26.1
(semver)
|
{
"containers": {
"adp": [
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2026-27137",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-03-10T13:32:09.097820Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-03-10T13:32:53.202Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"collectionURL": "https://pkg.go.dev",
"defaultStatus": "unaffected",
"packageName": "crypto/x509",
"product": "crypto/x509",
"programRoutines": [
{
"name": "newEmailConstraints"
},
{
"name": "emailConstraints.query"
},
{
"name": "checkConstraints"
},
{
"name": "checkChainConstraints"
},
{
"name": "parseMailboxes"
},
{
"name": "Certificate.Verify"
}
],
"vendor": "Go standard library",
"versions": [
{
"lessThan": "1.26.1",
"status": "affected",
"version": "1.26.0-0",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Jakub Ciolek"
}
],
"descriptions": [
{
"lang": "en",
"value": "When verifying a certificate chain which contains a certificate containing multiple email address constraints which share common local portions but different domain portions, these constraints will not be properly applied, and only the last constraint will be considered."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "CWE-295: Improper Certificate Validation",
"lang": "en"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-03-08T05:56:20.771Z",
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc",
"shortName": "Go"
},
"references": [
{
"url": "https://go.dev/cl/752182"
},
{
"url": "https://go.dev/issue/77952"
},
{
"url": "https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk"
},
{
"url": "https://pkg.go.dev/vuln/GO-2026-4599"
}
],
"title": "Incorrect enforcement of email constraints in crypto/x509"
}
},
"cveMetadata": {
"assignerOrgId": "1bb62c36-49e3-4200-9d77-64a1400537cc",
"assignerShortName": "Go",
"cveId": "CVE-2026-27137",
"datePublished": "2026-03-06T21:28:13.748Z",
"dateReserved": "2026-02-17T19:57:28.434Z",
"dateUpdated": "2026-03-10T13:32:53.202Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2026-27137",
"date": "2026-04-22",
"epss": "0.00015",
"percentile": "0.03139"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2026-27137\",\"sourceIdentifier\":\"security@golang.org\",\"published\":\"2026-03-06T22:16:00.850\",\"lastModified\":\"2026-04-21T14:40:31.187\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"When verifying a certificate chain which contains a certificate containing multiple email address constraints which share common local portions but different domain portions, these constraints will not be properly applied, and only the last constraint will be considered.\"},{\"lang\":\"es\",\"value\":\"Al verificar una cadena de certificados que contiene un certificado con m\u00faltiples restricciones de direcci\u00f3n de correo electr\u00f3nico que comparten porciones locales comunes pero porciones de dominio diferentes, estas restricciones no se aplicar\u00e1n correctamente, y solo la \u00faltima restricci\u00f3n ser\u00e1 considerada.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-295\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:golang:go:1.26.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A40FE3CB-0D03-462B-8A19-4DF1920ABE82\"}]}]}],\"references\":[{\"url\":\"https://go.dev/cl/752182\",\"source\":\"security@golang.org\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://go.dev/issue/77952\",\"source\":\"security@golang.org\",\"tags\":[\"Issue Tracking\"]},{\"url\":\"https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk\",\"source\":\"security@golang.org\",\"tags\":[\"Release Notes\"]},{\"url\":\"https://pkg.go.dev/vuln/GO-2026-4599\",\"source\":\"security@golang.org\",\"tags\":[\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.5, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2026-27137\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2026-03-10T13:32:09.097820Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2026-03-10T13:32:37.164Z\"}}], \"cna\": {\"title\": \"Incorrect enforcement of email constraints in crypto/x509\", \"credits\": [{\"lang\": \"en\", \"value\": \"Jakub Ciolek\"}], \"affected\": [{\"vendor\": \"Go standard library\", \"product\": \"crypto/x509\", \"versions\": [{\"status\": \"affected\", \"version\": \"1.26.0-0\", \"lessThan\": \"1.26.1\", \"versionType\": \"semver\"}], \"packageName\": \"crypto/x509\", \"collectionURL\": \"https://pkg.go.dev\", \"defaultStatus\": \"unaffected\", \"programRoutines\": [{\"name\": \"newEmailConstraints\"}, {\"name\": \"emailConstraints.query\"}, {\"name\": \"checkConstraints\"}, {\"name\": \"checkChainConstraints\"}, {\"name\": \"parseMailboxes\"}, {\"name\": \"Certificate.Verify\"}]}], \"references\": [{\"url\": \"https://go.dev/cl/752182\"}, {\"url\": \"https://go.dev/issue/77952\"}, {\"url\": \"https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk\"}, {\"url\": \"https://pkg.go.dev/vuln/GO-2026-4599\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"When verifying a certificate chain which contains a certificate containing multiple email address constraints which share common local portions but different domain portions, these constraints will not be properly applied, and only the last constraint will be considered.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"description\": \"CWE-295: Improper Certificate Validation\"}]}], \"providerMetadata\": {\"orgId\": \"1bb62c36-49e3-4200-9d77-64a1400537cc\", \"shortName\": \"Go\", \"dateUpdated\": \"2026-03-08T05:56:20.771Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2026-27137\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-03-10T13:32:53.202Z\", \"dateReserved\": \"2026-02-17T19:57:28.434Z\", \"assignerOrgId\": \"1bb62c36-49e3-4200-9d77-64a1400537cc\", \"datePublished\": \"2026-03-06T21:28:13.748Z\", \"assignerShortName\": \"Go\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
RHSA-2026:8337
Vulnerability from csaf_redhat - Published: 2026-04-15 18:11 - Updated: 2026-04-23 06:09A flaw was found in the net/url package in the Go standard library. The package does not enforce a limit on the number of unique query parameters it parses. A Go application using the net/http.Request.ParseForm method will try to process all parameters provided in the request. A specially crafted HTTP request containing a massive number of query parameters will cause the application to consume an excessive amount of memory, eventually causing the application to crash or become unresponsive, resulting in a denial of service.
A flaw was found in golang. A remote attacker could exploit this vulnerability by providing a specially crafted certificate during the error string construction process within the `HostnameError.Error()` function. This flaw, caused by unbounded string concatenation, leads to excessive resource consumption. Successful exploitation can result in a denial of service (DoS) for the affected system.
A flaw was found in the crypto/tls component. This vulnerability occurs during Transport Layer Security (TLS) session resumption when certificate authority (CA) settings are modified between the initial and resumed handshakes. An attacker could exploit this to bypass certificate validation, allowing a client or server to establish a connection that should have been rejected. This could lead to an authentication bypass under specific conditions.
The Go standard library function net/url.Parse insufficiently validated the host/authority component and accepted some invalid URLs by effectively treating garbage before an IP-literal as ignorable. The function should have rejected this as invalid.
A certificate validation flaw has been discovered in the golang crypto/x509 module. When verifying a certificate chain which contains a certificate containing multiple email address constraints which share common local portions but different domain portions, these constraints will not be properly applied, and only the last constraint will be considered.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat Web Terminal Operator 1.14.0 has been released.",
"title": "Topic"
},
{
"category": "general",
"text": "The Web Terminal provides a way to access a fully in-browser terminal emulator within the OpenShift Console. Command-line tools for interacting with the OpenShift cluster are pre-installed.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:8337",
"url": "https://access.redhat.com/errata/RHSA-2026:8337"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61726",
"url": "https://access.redhat.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61729",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-68121",
"url": "https://access.redhat.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-25679",
"url": "https://access.redhat.com/security/cve/CVE-2026-25679"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-27137",
"url": "https://access.redhat.com/security/cve/CVE-2026-27137"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "external",
"summary": "https://redhat.atlassian.net/browse/WTO-367",
"url": "https://redhat.atlassian.net/browse/WTO-367"
},
{
"category": "external",
"summary": "https://redhat.atlassian.net/browse/WTO-372",
"url": "https://redhat.atlassian.net/browse/WTO-372"
},
{
"category": "external",
"summary": "https://redhat.atlassian.net/browse/WTO-376",
"url": "https://redhat.atlassian.net/browse/WTO-376"
},
{
"category": "external",
"summary": "https://redhat.atlassian.net/browse/WTO-382",
"url": "https://redhat.atlassian.net/browse/WTO-382"
},
{
"category": "external",
"summary": "https://redhat.atlassian.net/browse/WTO-388",
"url": "https://redhat.atlassian.net/browse/WTO-388"
},
{
"category": "external",
"summary": "https://redhat.atlassian.net/browse/WTO-392",
"url": "https://redhat.atlassian.net/browse/WTO-392"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_8337.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Web Terminal Operator 1.14.0 release.",
"tracking": {
"current_release_date": "2026-04-23T06:09:10+00:00",
"generator": {
"date": "2026-04-23T06:09:10+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.5"
}
},
"id": "RHSA-2026:8337",
"initial_release_date": "2026-04-15T18:11:57+00:00",
"revision_history": [
{
"date": "2026-04-15T18:11:57+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-04-15T18:12:08+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-23T06:09:10+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Web Terminal 1.14",
"product": {
"name": "Red Hat Web Terminal 1.14",
"product_id": "Red Hat Web Terminal 1.14",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:webterminal:1.14::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat Web Terminal"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:3c82f905387f86f41d9b8d0acd2a27b448d050bee44c2d2f37f98fefc907a7a3_amd64",
"product": {
"name": "registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:3c82f905387f86f41d9b8d0acd2a27b448d050bee44c2d2f37f98fefc907a7a3_amd64",
"product_id": "registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:3c82f905387f86f41d9b8d0acd2a27b448d050bee44c2d2f37f98fefc907a7a3_amd64",
"product_identification_helper": {
"purl": "pkg:oci/web-terminal-exec-rhel9@sha256%3A3c82f905387f86f41d9b8d0acd2a27b448d050bee44c2d2f37f98fefc907a7a3?arch=amd64\u0026repository_url=registry.redhat.io/web-terminal\u0026tag=1776199398"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:7ea6fdd34e982d2bcd7239936c7322c3d91173ce50a932e05b8995d008625cf6_amd64",
"product": {
"name": "registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:7ea6fdd34e982d2bcd7239936c7322c3d91173ce50a932e05b8995d008625cf6_amd64",
"product_id": "registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:7ea6fdd34e982d2bcd7239936c7322c3d91173ce50a932e05b8995d008625cf6_amd64",
"product_identification_helper": {
"purl": "pkg:oci/web-terminal-rhel9-operator@sha256%3A7ea6fdd34e982d2bcd7239936c7322c3d91173ce50a932e05b8995d008625cf6?arch=amd64\u0026repository_url=registry.redhat.io/web-terminal\u0026tag=1776199421"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:f729c368c8c4024a93c6cb8e46a45d1e2d6e99df5cedbc1e613a4798f5cbbfb2_amd64",
"product": {
"name": "registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:f729c368c8c4024a93c6cb8e46a45d1e2d6e99df5cedbc1e613a4798f5cbbfb2_amd64",
"product_id": "registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:f729c368c8c4024a93c6cb8e46a45d1e2d6e99df5cedbc1e613a4798f5cbbfb2_amd64",
"product_identification_helper": {
"purl": "pkg:oci/web-terminal-operator-bundle@sha256%3Af729c368c8c4024a93c6cb8e46a45d1e2d6e99df5cedbc1e613a4798f5cbbfb2?arch=amd64\u0026repository_url=registry.redhat.io/web-terminal\u0026tag=1776199340"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:d066e6bf5de5495db36fae45c2fe16b2362c2a9142248371d73283e76ac62ce0_amd64",
"product": {
"name": "registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:d066e6bf5de5495db36fae45c2fe16b2362c2a9142248371d73283e76ac62ce0_amd64",
"product_id": "registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:d066e6bf5de5495db36fae45c2fe16b2362c2a9142248371d73283e76ac62ce0_amd64",
"product_identification_helper": {
"purl": "pkg:oci/web-terminal-tooling-rhel9@sha256%3Ad066e6bf5de5495db36fae45c2fe16b2362c2a9142248371d73283e76ac62ce0?arch=amd64\u0026repository_url=registry.redhat.io/web-terminal\u0026tag=1776199491"
}
}
}
],
"category": "architecture",
"name": "amd64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:3c82f905387f86f41d9b8d0acd2a27b448d050bee44c2d2f37f98fefc907a7a3_amd64 as a component of Red Hat Web Terminal 1.14",
"product_id": "Red Hat Web Terminal 1.14:registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:3c82f905387f86f41d9b8d0acd2a27b448d050bee44c2d2f37f98fefc907a7a3_amd64"
},
"product_reference": "registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:3c82f905387f86f41d9b8d0acd2a27b448d050bee44c2d2f37f98fefc907a7a3_amd64",
"relates_to_product_reference": "Red Hat Web Terminal 1.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:f729c368c8c4024a93c6cb8e46a45d1e2d6e99df5cedbc1e613a4798f5cbbfb2_amd64 as a component of Red Hat Web Terminal 1.14",
"product_id": "Red Hat Web Terminal 1.14:registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:f729c368c8c4024a93c6cb8e46a45d1e2d6e99df5cedbc1e613a4798f5cbbfb2_amd64"
},
"product_reference": "registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:f729c368c8c4024a93c6cb8e46a45d1e2d6e99df5cedbc1e613a4798f5cbbfb2_amd64",
"relates_to_product_reference": "Red Hat Web Terminal 1.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:7ea6fdd34e982d2bcd7239936c7322c3d91173ce50a932e05b8995d008625cf6_amd64 as a component of Red Hat Web Terminal 1.14",
"product_id": "Red Hat Web Terminal 1.14:registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:7ea6fdd34e982d2bcd7239936c7322c3d91173ce50a932e05b8995d008625cf6_amd64"
},
"product_reference": "registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:7ea6fdd34e982d2bcd7239936c7322c3d91173ce50a932e05b8995d008625cf6_amd64",
"relates_to_product_reference": "Red Hat Web Terminal 1.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:d066e6bf5de5495db36fae45c2fe16b2362c2a9142248371d73283e76ac62ce0_amd64 as a component of Red Hat Web Terminal 1.14",
"product_id": "Red Hat Web Terminal 1.14:registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:d066e6bf5de5495db36fae45c2fe16b2362c2a9142248371d73283e76ac62ce0_amd64"
},
"product_reference": "registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:d066e6bf5de5495db36fae45c2fe16b2362c2a9142248371d73283e76ac62ce0_amd64",
"relates_to_product_reference": "Red Hat Web Terminal 1.14"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61726",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:42.791305+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Web Terminal 1.14:registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:f729c368c8c4024a93c6cb8e46a45d1e2d6e99df5cedbc1e613a4798f5cbbfb2_amd64",
"Red Hat Web Terminal 1.14:registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:d066e6bf5de5495db36fae45c2fe16b2362c2a9142248371d73283e76ac62ce0_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434432"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the net/url package in the Go standard library. The package does not enforce a limit on the number of unique query parameters it parses. A Go application using the net/http.Request.ParseForm method will try to process all parameters provided in the request. A specially crafted HTTP request containing a massive number of query parameters will cause the application to consume an excessive amount of memory, eventually causing the application to crash or become unresponsive, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/url: Memory exhaustion in query parameter parsing in net/url",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker must be able to send a specially crafted HTTP request to an application parsing URL-encoded forms with net/url, specifically a request containing a large number of unique query parameters. The request will cause the application to consume an excessive amount of memory and eventually result in a denial of service, with no impact to confidentiality or integrity. Due to this reason, this vulnerability has been rated with an important severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Web Terminal 1.14:registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:3c82f905387f86f41d9b8d0acd2a27b448d050bee44c2d2f37f98fefc907a7a3_amd64",
"Red Hat Web Terminal 1.14:registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:7ea6fdd34e982d2bcd7239936c7322c3d91173ce50a932e05b8995d008625cf6_amd64"
],
"known_not_affected": [
"Red Hat Web Terminal 1.14:registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:f729c368c8c4024a93c6cb8e46a45d1e2d6e99df5cedbc1e613a4798f5cbbfb2_amd64",
"Red Hat Web Terminal 1.14:registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:d066e6bf5de5495db36fae45c2fe16b2362c2a9142248371d73283e76ac62ce0_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "RHBZ#2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"category": "external",
"summary": "https://go.dev/cl/736712",
"url": "https://go.dev/cl/736712"
},
{
"category": "external",
"summary": "https://go.dev/issue/77101",
"url": "https://go.dev/issue/77101"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4341",
"url": "https://pkg.go.dev/vuln/GO-2026-4341"
}
],
"release_date": "2026-01-28T19:30:31.215000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-15T18:11:57+00:00",
"details": "To start using the Web Terminal Operator, install the Web Terminal Operator from OpenShift OperatorHub on OpenShift Container Platform 4.19 or higher.",
"product_ids": [
"Red Hat Web Terminal 1.14:registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:3c82f905387f86f41d9b8d0acd2a27b448d050bee44c2d2f37f98fefc907a7a3_amd64",
"Red Hat Web Terminal 1.14:registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:7ea6fdd34e982d2bcd7239936c7322c3d91173ce50a932e05b8995d008625cf6_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8337"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"Red Hat Web Terminal 1.14:registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:3c82f905387f86f41d9b8d0acd2a27b448d050bee44c2d2f37f98fefc907a7a3_amd64",
"Red Hat Web Terminal 1.14:registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:f729c368c8c4024a93c6cb8e46a45d1e2d6e99df5cedbc1e613a4798f5cbbfb2_amd64",
"Red Hat Web Terminal 1.14:registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:7ea6fdd34e982d2bcd7239936c7322c3d91173ce50a932e05b8995d008625cf6_amd64",
"Red Hat Web Terminal 1.14:registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:d066e6bf5de5495db36fae45c2fe16b2362c2a9142248371d73283e76ac62ce0_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Web Terminal 1.14:registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:3c82f905387f86f41d9b8d0acd2a27b448d050bee44c2d2f37f98fefc907a7a3_amd64",
"Red Hat Web Terminal 1.14:registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:f729c368c8c4024a93c6cb8e46a45d1e2d6e99df5cedbc1e613a4798f5cbbfb2_amd64",
"Red Hat Web Terminal 1.14:registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:7ea6fdd34e982d2bcd7239936c7322c3d91173ce50a932e05b8995d008625cf6_amd64",
"Red Hat Web Terminal 1.14:registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:d066e6bf5de5495db36fae45c2fe16b2362c2a9142248371d73283e76ac62ce0_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: net/url: Memory exhaustion in query parameter parsing in net/url"
},
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Web Terminal 1.14:registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:f729c368c8c4024a93c6cb8e46a45d1e2d6e99df5cedbc1e613a4798f5cbbfb2_amd64",
"Red Hat Web Terminal 1.14:registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:7ea6fdd34e982d2bcd7239936c7322c3d91173ce50a932e05b8995d008625cf6_amd64",
"Red Hat Web Terminal 1.14:registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:d066e6bf5de5495db36fae45c2fe16b2362c2a9142248371d73283e76ac62ce0_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang. A remote attacker could exploit this vulnerability by providing a specially crafted certificate during the error string construction process within the `HostnameError.Error()` function. This flaw, caused by unbounded string concatenation, leads to excessive resource consumption. Successful exploitation can result in a denial of service (DoS) for the affected system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Web Terminal 1.14:registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:3c82f905387f86f41d9b8d0acd2a27b448d050bee44c2d2f37f98fefc907a7a3_amd64"
],
"known_not_affected": [
"Red Hat Web Terminal 1.14:registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:f729c368c8c4024a93c6cb8e46a45d1e2d6e99df5cedbc1e613a4798f5cbbfb2_amd64",
"Red Hat Web Terminal 1.14:registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:7ea6fdd34e982d2bcd7239936c7322c3d91173ce50a932e05b8995d008625cf6_amd64",
"Red Hat Web Terminal 1.14:registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:d066e6bf5de5495db36fae45c2fe16b2362c2a9142248371d73283e76ac62ce0_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-15T18:11:57+00:00",
"details": "To start using the Web Terminal Operator, install the Web Terminal Operator from OpenShift OperatorHub on OpenShift Container Platform 4.19 or higher.",
"product_ids": [
"Red Hat Web Terminal 1.14:registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:3c82f905387f86f41d9b8d0acd2a27b448d050bee44c2d2f37f98fefc907a7a3_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8337"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Web Terminal 1.14:registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:3c82f905387f86f41d9b8d0acd2a27b448d050bee44c2d2f37f98fefc907a7a3_amd64",
"Red Hat Web Terminal 1.14:registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:f729c368c8c4024a93c6cb8e46a45d1e2d6e99df5cedbc1e613a4798f5cbbfb2_amd64",
"Red Hat Web Terminal 1.14:registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:7ea6fdd34e982d2bcd7239936c7322c3d91173ce50a932e05b8995d008625cf6_amd64",
"Red Hat Web Terminal 1.14:registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:d066e6bf5de5495db36fae45c2fe16b2362c2a9142248371d73283e76ac62ce0_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
},
{
"cve": "CVE-2025-68121",
"discovery_date": "2026-02-05T18:01:30.086058+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Web Terminal 1.14:registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:f729c368c8c4024a93c6cb8e46a45d1e2d6e99df5cedbc1e613a4798f5cbbfb2_amd64",
"Red Hat Web Terminal 1.14:registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:7ea6fdd34e982d2bcd7239936c7322c3d91173ce50a932e05b8995d008625cf6_amd64",
"Red Hat Web Terminal 1.14:registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:d066e6bf5de5495db36fae45c2fe16b2362c2a9142248371d73283e76ac62ce0_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2437111"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the crypto/tls component. This vulnerability occurs during Transport Layer Security (TLS) session resumption when certificate authority (CA) settings are modified between the initial and resumed handshakes. An attacker could exploit this to bypass certificate validation, allowing a client or server to establish a connection that should have been rejected. This could lead to an authentication bypass under specific conditions.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/tls: crypto/tls: Incorrect certificate validation during TLS session resumption",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This is a moderate flaw because it only occurs under specific conditions, such as TLS session resumption with runtime changes to certificate authority settings. Exploitation is not straightforward and requires a controlled setup. The impact is limited to certificate validation within the same component and does not affect system availability.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Web Terminal 1.14:registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:3c82f905387f86f41d9b8d0acd2a27b448d050bee44c2d2f37f98fefc907a7a3_amd64"
],
"known_not_affected": [
"Red Hat Web Terminal 1.14:registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:f729c368c8c4024a93c6cb8e46a45d1e2d6e99df5cedbc1e613a4798f5cbbfb2_amd64",
"Red Hat Web Terminal 1.14:registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:7ea6fdd34e982d2bcd7239936c7322c3d91173ce50a932e05b8995d008625cf6_amd64",
"Red Hat Web Terminal 1.14:registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:d066e6bf5de5495db36fae45c2fe16b2362c2a9142248371d73283e76ac62ce0_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "RHBZ#2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"category": "external",
"summary": "https://go.dev/cl/737700",
"url": "https://go.dev/cl/737700"
},
{
"category": "external",
"summary": "https://go.dev/issue/77217",
"url": "https://go.dev/issue/77217"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk",
"url": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4337",
"url": "https://pkg.go.dev/vuln/GO-2026-4337"
}
],
"release_date": "2026-02-05T17:48:44.141000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-15T18:11:57+00:00",
"details": "To start using the Web Terminal Operator, install the Web Terminal Operator from OpenShift OperatorHub on OpenShift Container Platform 4.19 or higher.",
"product_ids": [
"Red Hat Web Terminal 1.14:registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:3c82f905387f86f41d9b8d0acd2a27b448d050bee44c2d2f37f98fefc907a7a3_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8337"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Web Terminal 1.14:registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:3c82f905387f86f41d9b8d0acd2a27b448d050bee44c2d2f37f98fefc907a7a3_amd64",
"Red Hat Web Terminal 1.14:registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:f729c368c8c4024a93c6cb8e46a45d1e2d6e99df5cedbc1e613a4798f5cbbfb2_amd64",
"Red Hat Web Terminal 1.14:registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:7ea6fdd34e982d2bcd7239936c7322c3d91173ce50a932e05b8995d008625cf6_amd64",
"Red Hat Web Terminal 1.14:registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:d066e6bf5de5495db36fae45c2fe16b2362c2a9142248371d73283e76ac62ce0_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "crypto/tls: crypto/tls: Incorrect certificate validation during TLS session resumption"
},
{
"cve": "CVE-2026-25679",
"cwe": {
"id": "CWE-1286",
"name": "Improper Validation of Syntactic Correctness of Input"
},
"discovery_date": "2026-03-06T22:02:11.567841+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Web Terminal 1.14:registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:f729c368c8c4024a93c6cb8e46a45d1e2d6e99df5cedbc1e613a4798f5cbbfb2_amd64",
"Red Hat Web Terminal 1.14:registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:7ea6fdd34e982d2bcd7239936c7322c3d91173ce50a932e05b8995d008625cf6_amd64",
"Red Hat Web Terminal 1.14:registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:d066e6bf5de5495db36fae45c2fe16b2362c2a9142248371d73283e76ac62ce0_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2445356"
}
],
"notes": [
{
"category": "description",
"text": "The Go standard library function net/url.Parse insufficiently validated the host/authority component and accepted some invalid URLs by effectively treating garbage before an IP-literal as ignorable. The function should have rejected this as invalid.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "net/url: Incorrect parsing of IPv6 host literals in net/url",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Web Terminal 1.14:registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:3c82f905387f86f41d9b8d0acd2a27b448d050bee44c2d2f37f98fefc907a7a3_amd64"
],
"known_not_affected": [
"Red Hat Web Terminal 1.14:registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:f729c368c8c4024a93c6cb8e46a45d1e2d6e99df5cedbc1e613a4798f5cbbfb2_amd64",
"Red Hat Web Terminal 1.14:registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:7ea6fdd34e982d2bcd7239936c7322c3d91173ce50a932e05b8995d008625cf6_amd64",
"Red Hat Web Terminal 1.14:registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:d066e6bf5de5495db36fae45c2fe16b2362c2a9142248371d73283e76ac62ce0_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-25679"
},
{
"category": "external",
"summary": "RHBZ#2445356",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2445356"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-25679",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25679"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-25679",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25679"
},
{
"category": "external",
"summary": "https://go.dev/cl/752180",
"url": "https://go.dev/cl/752180"
},
{
"category": "external",
"summary": "https://go.dev/issue/77578",
"url": "https://go.dev/issue/77578"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk",
"url": "https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4601",
"url": "https://pkg.go.dev/vuln/GO-2026-4601"
}
],
"release_date": "2026-03-06T21:28:14.211000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-15T18:11:57+00:00",
"details": "To start using the Web Terminal Operator, install the Web Terminal Operator from OpenShift OperatorHub on OpenShift Container Platform 4.19 or higher.",
"product_ids": [
"Red Hat Web Terminal 1.14:registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:3c82f905387f86f41d9b8d0acd2a27b448d050bee44c2d2f37f98fefc907a7a3_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8337"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Web Terminal 1.14:registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:3c82f905387f86f41d9b8d0acd2a27b448d050bee44c2d2f37f98fefc907a7a3_amd64",
"Red Hat Web Terminal 1.14:registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:f729c368c8c4024a93c6cb8e46a45d1e2d6e99df5cedbc1e613a4798f5cbbfb2_amd64",
"Red Hat Web Terminal 1.14:registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:7ea6fdd34e982d2bcd7239936c7322c3d91173ce50a932e05b8995d008625cf6_amd64",
"Red Hat Web Terminal 1.14:registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:d066e6bf5de5495db36fae45c2fe16b2362c2a9142248371d73283e76ac62ce0_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Web Terminal 1.14:registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:3c82f905387f86f41d9b8d0acd2a27b448d050bee44c2d2f37f98fefc907a7a3_amd64",
"Red Hat Web Terminal 1.14:registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:f729c368c8c4024a93c6cb8e46a45d1e2d6e99df5cedbc1e613a4798f5cbbfb2_amd64",
"Red Hat Web Terminal 1.14:registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:7ea6fdd34e982d2bcd7239936c7322c3d91173ce50a932e05b8995d008625cf6_amd64",
"Red Hat Web Terminal 1.14:registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:d066e6bf5de5495db36fae45c2fe16b2362c2a9142248371d73283e76ac62ce0_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "net/url: Incorrect parsing of IPv6 host literals in net/url"
},
{
"cve": "CVE-2026-27137",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"discovery_date": "2026-03-06T22:01:38.859733+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Web Terminal 1.14:registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:f729c368c8c4024a93c6cb8e46a45d1e2d6e99df5cedbc1e613a4798f5cbbfb2_amd64",
"Red Hat Web Terminal 1.14:registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:7ea6fdd34e982d2bcd7239936c7322c3d91173ce50a932e05b8995d008625cf6_amd64",
"Red Hat Web Terminal 1.14:registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:d066e6bf5de5495db36fae45c2fe16b2362c2a9142248371d73283e76ac62ce0_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2445345"
}
],
"notes": [
{
"category": "description",
"text": "A certificate validation flaw has been discovered in the golang crypto/x509 module. When verifying a certificate chain which contains a certificate containing multiple email address constraints which share common local portions but different domain portions, these constraints will not be properly applied, and only the last constraint will be considered.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: Incorrect enforcement of email constraints in crypto/x509",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Web Terminal 1.14:registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:3c82f905387f86f41d9b8d0acd2a27b448d050bee44c2d2f37f98fefc907a7a3_amd64"
],
"known_not_affected": [
"Red Hat Web Terminal 1.14:registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:f729c368c8c4024a93c6cb8e46a45d1e2d6e99df5cedbc1e613a4798f5cbbfb2_amd64",
"Red Hat Web Terminal 1.14:registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:7ea6fdd34e982d2bcd7239936c7322c3d91173ce50a932e05b8995d008625cf6_amd64",
"Red Hat Web Terminal 1.14:registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:d066e6bf5de5495db36fae45c2fe16b2362c2a9142248371d73283e76ac62ce0_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-27137"
},
{
"category": "external",
"summary": "RHBZ#2445345",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2445345"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-27137",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27137"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-27137",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27137"
},
{
"category": "external",
"summary": "https://go.dev/cl/752182",
"url": "https://go.dev/cl/752182"
},
{
"category": "external",
"summary": "https://go.dev/issue/77952",
"url": "https://go.dev/issue/77952"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk",
"url": "https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4599",
"url": "https://pkg.go.dev/vuln/GO-2026-4599"
}
],
"release_date": "2026-03-06T21:28:13.748000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-15T18:11:57+00:00",
"details": "To start using the Web Terminal Operator, install the Web Terminal Operator from OpenShift OperatorHub on OpenShift Container Platform 4.19 or higher.",
"product_ids": [
"Red Hat Web Terminal 1.14:registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:3c82f905387f86f41d9b8d0acd2a27b448d050bee44c2d2f37f98fefc907a7a3_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8337"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Web Terminal 1.14:registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:3c82f905387f86f41d9b8d0acd2a27b448d050bee44c2d2f37f98fefc907a7a3_amd64",
"Red Hat Web Terminal 1.14:registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:f729c368c8c4024a93c6cb8e46a45d1e2d6e99df5cedbc1e613a4798f5cbbfb2_amd64",
"Red Hat Web Terminal 1.14:registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:7ea6fdd34e982d2bcd7239936c7322c3d91173ce50a932e05b8995d008625cf6_amd64",
"Red Hat Web Terminal 1.14:registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:d066e6bf5de5495db36fae45c2fe16b2362c2a9142248371d73283e76ac62ce0_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Web Terminal 1.14:registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:3c82f905387f86f41d9b8d0acd2a27b448d050bee44c2d2f37f98fefc907a7a3_amd64",
"Red Hat Web Terminal 1.14:registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:f729c368c8c4024a93c6cb8e46a45d1e2d6e99df5cedbc1e613a4798f5cbbfb2_amd64",
"Red Hat Web Terminal 1.14:registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:7ea6fdd34e982d2bcd7239936c7322c3d91173ce50a932e05b8995d008625cf6_amd64",
"Red Hat Web Terminal 1.14:registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:d066e6bf5de5495db36fae45c2fe16b2362c2a9142248371d73283e76ac62ce0_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: Incorrect enforcement of email constraints in crypto/x509"
}
]
}
RHSA-2026:9699
Vulnerability from csaf_redhat - Published: 2026-04-22 12:35 - Updated: 2026-04-23 02:09A certificate validation flaw has been discovered in the golang crypto/x509 module. When verifying a certificate chain which contains a certificate containing multiple email address constraints which share common local portions but different domain portions, these constraints will not be properly applied, and only the last constraint will be considered.
| URL | Category | ||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Important: Red Hat OpenShift GitOps v1.20.2 security update",
"title": "Topic"
},
{
"category": "general",
"text": "An update is now available for Red Hat OpenShift GitOps. ",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:9699",
"url": "https://access.redhat.com/errata/RHSA-2026:9699"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-27137",
"url": "https://access.redhat.com/security/cve/CVE-2026-27137"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/red_hat_openshift_gitops/1.20/",
"url": "https://docs.redhat.com/en/documentation/red_hat_openshift_gitops/1.20/"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_9699.json"
}
],
"title": "Red Hat Security Advisory: Red Hat OpenShift GitOps v1.20.2 security update",
"tracking": {
"current_release_date": "2026-04-23T02:09:22+00:00",
"generator": {
"date": "2026-04-23T02:09:22+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.5"
}
},
"id": "RHSA-2026:9699",
"initial_release_date": "2026-04-22T12:35:53+00:00",
"revision_history": [
{
"date": "2026-04-22T12:35:53+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-04-22T12:36:04+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-23T02:09:22+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift GitOps 1.2",
"product": {
"name": "Red Hat OpenShift GitOps 1.2",
"product_id": "Red Hat OpenShift GitOps 1.2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift_gitops:1.20::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift GitOps"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel9@sha256:1f376f53aa7d80bf48b61314480596b4837a9c80a0bbbefb428dc24ad74a6126_amd64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel9@sha256:1f376f53aa7d80bf48b61314480596b4837a9c80a0bbbefb428dc24ad74a6126_amd64",
"product_id": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel9@sha256:1f376f53aa7d80bf48b61314480596b4837a9c80a0bbbefb428dc24ad74a6126_amd64",
"product_identification_helper": {
"purl": "pkg:oci/argo-rollouts-rhel9@sha256%3A1f376f53aa7d80bf48b61314480596b4837a9c80a0bbbefb428dc24ad74a6126?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776772860"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:c7fc5b1653c5d8175d480481d44e797aa843a10a4eae753a7eb70a5871540ed8_amd64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:c7fc5b1653c5d8175d480481d44e797aa843a10a4eae753a7eb70a5871540ed8_amd64",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:c7fc5b1653c5d8175d480481d44e797aa843a10a4eae753a7eb70a5871540ed8_amd64",
"product_identification_helper": {
"purl": "pkg:oci/argocd-rhel9@sha256%3Ac7fc5b1653c5d8175d480481d44e797aa843a10a4eae753a7eb70a5871540ed8?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776772383"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel9@sha256:b7e423bf7fde922a1d8fe4adf6f5205fc4908881f496e6ebd05db0b5f890d35c_amd64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel9@sha256:b7e423bf7fde922a1d8fe4adf6f5205fc4908881f496e6ebd05db0b5f890d35c_amd64",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel9@sha256:b7e423bf7fde922a1d8fe4adf6f5205fc4908881f496e6ebd05db0b5f890d35c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/argocd-agent-rhel9@sha256%3Ab7e423bf7fde922a1d8fe4adf6f5205fc4908881f496e6ebd05db0b5f890d35c?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776772240"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel9@sha256:ddd9d15f0962e166d5e2ca0797137a135f34c558a5a51ac85a173f245d763625_amd64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel9@sha256:ddd9d15f0962e166d5e2ca0797137a135f34c558a5a51ac85a173f245d763625_amd64",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel9@sha256:ddd9d15f0962e166d5e2ca0797137a135f34c558a5a51ac85a173f245d763625_amd64",
"product_identification_helper": {
"purl": "pkg:oci/argocd-extensions-rhel9@sha256%3Addd9d15f0962e166d5e2ca0797137a135f34c558a5a51ac85a173f245d763625?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776773886"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel9@sha256:fde967c5f4e625ad901ff3635f7a9cd0e9db64dfff9083618e3d793e21e8488f_amd64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel9@sha256:fde967c5f4e625ad901ff3635f7a9cd0e9db64dfff9083618e3d793e21e8488f_amd64",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel9@sha256:fde967c5f4e625ad901ff3635f7a9cd0e9db64dfff9083618e3d793e21e8488f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/argocd-image-updater-rhel9@sha256%3Afde967c5f4e625ad901ff3635f7a9cd0e9db64dfff9083618e3d793e21e8488f?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776773869"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel9@sha256:1bbc1efa6478d85935146b7c50217204094e0c07a3d096f353567cc4aec7b7af_amd64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel9@sha256:1bbc1efa6478d85935146b7c50217204094e0c07a3d096f353567cc4aec7b7af_amd64",
"product_id": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel9@sha256:1bbc1efa6478d85935146b7c50217204094e0c07a3d096f353567cc4aec7b7af_amd64",
"product_identification_helper": {
"purl": "pkg:oci/console-plugin-rhel9@sha256%3A1bbc1efa6478d85935146b7c50217204094e0c07a3d096f353567cc4aec7b7af?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776773904"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/dex-rhel9@sha256:b61518708f23cf947a447823c7747167259faddbd8032a3c8596c8fa9d5b84af_amd64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/dex-rhel9@sha256:b61518708f23cf947a447823c7747167259faddbd8032a3c8596c8fa9d5b84af_amd64",
"product_id": "registry.redhat.io/openshift-gitops-1/dex-rhel9@sha256:b61518708f23cf947a447823c7747167259faddbd8032a3c8596c8fa9d5b84af_amd64",
"product_identification_helper": {
"purl": "pkg:oci/dex-rhel9@sha256%3Ab61518708f23cf947a447823c7747167259faddbd8032a3c8596c8fa9d5b84af?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776773421"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel9@sha256:07f30eba3f93a9e1605c27aeab76f195829443b9d454a2e8d2d5938806f165b1_amd64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel9@sha256:07f30eba3f93a9e1605c27aeab76f195829443b9d454a2e8d2d5938806f165b1_amd64",
"product_id": "registry.redhat.io/openshift-gitops-1/gitops-rhel9@sha256:07f30eba3f93a9e1605c27aeab76f195829443b9d454a2e8d2d5938806f165b1_amd64",
"product_identification_helper": {
"purl": "pkg:oci/gitops-rhel9@sha256%3A07f30eba3f93a9e1605c27aeab76f195829443b9d454a2e8d2d5938806f165b1?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776773403"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel9-operator@sha256:6aaaf3f027d5d673b70a1a5d4276416e3525e6249947b4a631df4c63856acd63_amd64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel9-operator@sha256:6aaaf3f027d5d673b70a1a5d4276416e3525e6249947b4a631df4c63856acd63_amd64",
"product_id": "registry.redhat.io/openshift-gitops-1/gitops-rhel9-operator@sha256:6aaaf3f027d5d673b70a1a5d4276416e3525e6249947b4a631df4c63856acd63_amd64",
"product_identification_helper": {
"purl": "pkg:oci/gitops-rhel9-operator@sha256%3A6aaaf3f027d5d673b70a1a5d4276416e3525e6249947b4a631df4c63856acd63?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776772334"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:247a54db35e184702d9c1d6f83cd9e3669f8aae48bd0eeaecdbeeda6176c525f_amd64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:247a54db35e184702d9c1d6f83cd9e3669f8aae48bd0eeaecdbeeda6176c525f_amd64",
"product_id": "registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:247a54db35e184702d9c1d6f83cd9e3669f8aae48bd0eeaecdbeeda6176c525f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/gitops-operator-bundle@sha256%3A247a54db35e184702d9c1d6f83cd9e3669f8aae48bd0eeaecdbeeda6176c525f?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776775591"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/must-gather-rhel9@sha256:a6596a7bcceb01a55db1f2ad9894ec8550cf4a6d9fc5976d9082684863f0ff8d_amd64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/must-gather-rhel9@sha256:a6596a7bcceb01a55db1f2ad9894ec8550cf4a6d9fc5976d9082684863f0ff8d_amd64",
"product_id": "registry.redhat.io/openshift-gitops-1/must-gather-rhel9@sha256:a6596a7bcceb01a55db1f2ad9894ec8550cf4a6d9fc5976d9082684863f0ff8d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/must-gather-rhel9@sha256%3Aa6596a7bcceb01a55db1f2ad9894ec8550cf4a6d9fc5976d9082684863f0ff8d?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776773046"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel9@sha256:1a8c1669907826bf3f711845c6d4833b2e2c5c4807bada9797b9b0d6397955b7_arm64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel9@sha256:1a8c1669907826bf3f711845c6d4833b2e2c5c4807bada9797b9b0d6397955b7_arm64",
"product_id": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel9@sha256:1a8c1669907826bf3f711845c6d4833b2e2c5c4807bada9797b9b0d6397955b7_arm64",
"product_identification_helper": {
"purl": "pkg:oci/argo-rollouts-rhel9@sha256%3A1a8c1669907826bf3f711845c6d4833b2e2c5c4807bada9797b9b0d6397955b7?arch=arm64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776772860"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:65049e2c8984f2f08c05838a407b4641285c956c440f700225bdbf67cf03c8bc_arm64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:65049e2c8984f2f08c05838a407b4641285c956c440f700225bdbf67cf03c8bc_arm64",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:65049e2c8984f2f08c05838a407b4641285c956c440f700225bdbf67cf03c8bc_arm64",
"product_identification_helper": {
"purl": "pkg:oci/argocd-rhel9@sha256%3A65049e2c8984f2f08c05838a407b4641285c956c440f700225bdbf67cf03c8bc?arch=arm64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776772383"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel9@sha256:f3b25a4b791a6d75c2bb7fa156fa5796ca0ef7e3520c432cd1e0ee094b0b44ca_arm64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel9@sha256:f3b25a4b791a6d75c2bb7fa156fa5796ca0ef7e3520c432cd1e0ee094b0b44ca_arm64",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel9@sha256:f3b25a4b791a6d75c2bb7fa156fa5796ca0ef7e3520c432cd1e0ee094b0b44ca_arm64",
"product_identification_helper": {
"purl": "pkg:oci/argocd-agent-rhel9@sha256%3Af3b25a4b791a6d75c2bb7fa156fa5796ca0ef7e3520c432cd1e0ee094b0b44ca?arch=arm64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776772240"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel9@sha256:a87ae94bb4eeaf8e00e5b60639ce8a74af2fa74d5312f1586db65ac2e7e3915e_arm64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel9@sha256:a87ae94bb4eeaf8e00e5b60639ce8a74af2fa74d5312f1586db65ac2e7e3915e_arm64",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel9@sha256:a87ae94bb4eeaf8e00e5b60639ce8a74af2fa74d5312f1586db65ac2e7e3915e_arm64",
"product_identification_helper": {
"purl": "pkg:oci/argocd-extensions-rhel9@sha256%3Aa87ae94bb4eeaf8e00e5b60639ce8a74af2fa74d5312f1586db65ac2e7e3915e?arch=arm64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776773886"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel9@sha256:13348eb0e7ca8a4517becd8f6feae39f26bca07e47568699c153747568f89c3e_arm64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel9@sha256:13348eb0e7ca8a4517becd8f6feae39f26bca07e47568699c153747568f89c3e_arm64",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel9@sha256:13348eb0e7ca8a4517becd8f6feae39f26bca07e47568699c153747568f89c3e_arm64",
"product_identification_helper": {
"purl": "pkg:oci/argocd-image-updater-rhel9@sha256%3A13348eb0e7ca8a4517becd8f6feae39f26bca07e47568699c153747568f89c3e?arch=arm64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776773869"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel9@sha256:e0d9a33cca85c936439e04862ecec780554cf34e9c6df7f62497595d61e8c1e8_arm64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel9@sha256:e0d9a33cca85c936439e04862ecec780554cf34e9c6df7f62497595d61e8c1e8_arm64",
"product_id": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel9@sha256:e0d9a33cca85c936439e04862ecec780554cf34e9c6df7f62497595d61e8c1e8_arm64",
"product_identification_helper": {
"purl": "pkg:oci/console-plugin-rhel9@sha256%3Ae0d9a33cca85c936439e04862ecec780554cf34e9c6df7f62497595d61e8c1e8?arch=arm64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776773904"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/dex-rhel9@sha256:feaaf37afd8ccab9460c39606164fbc93cdc4d60eab68e5809465e9aa484e0bf_arm64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/dex-rhel9@sha256:feaaf37afd8ccab9460c39606164fbc93cdc4d60eab68e5809465e9aa484e0bf_arm64",
"product_id": "registry.redhat.io/openshift-gitops-1/dex-rhel9@sha256:feaaf37afd8ccab9460c39606164fbc93cdc4d60eab68e5809465e9aa484e0bf_arm64",
"product_identification_helper": {
"purl": "pkg:oci/dex-rhel9@sha256%3Afeaaf37afd8ccab9460c39606164fbc93cdc4d60eab68e5809465e9aa484e0bf?arch=arm64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776773421"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel9@sha256:b406493693fdae121f128e9a18b4139a05f5e682fd8dacfa3e8fe7c6b35bcfbd_arm64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel9@sha256:b406493693fdae121f128e9a18b4139a05f5e682fd8dacfa3e8fe7c6b35bcfbd_arm64",
"product_id": "registry.redhat.io/openshift-gitops-1/gitops-rhel9@sha256:b406493693fdae121f128e9a18b4139a05f5e682fd8dacfa3e8fe7c6b35bcfbd_arm64",
"product_identification_helper": {
"purl": "pkg:oci/gitops-rhel9@sha256%3Ab406493693fdae121f128e9a18b4139a05f5e682fd8dacfa3e8fe7c6b35bcfbd?arch=arm64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776773403"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel9-operator@sha256:6467e7ef9afeb8c45da2620221257751ae2c0f20019cad986e3bda5176287321_arm64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel9-operator@sha256:6467e7ef9afeb8c45da2620221257751ae2c0f20019cad986e3bda5176287321_arm64",
"product_id": "registry.redhat.io/openshift-gitops-1/gitops-rhel9-operator@sha256:6467e7ef9afeb8c45da2620221257751ae2c0f20019cad986e3bda5176287321_arm64",
"product_identification_helper": {
"purl": "pkg:oci/gitops-rhel9-operator@sha256%3A6467e7ef9afeb8c45da2620221257751ae2c0f20019cad986e3bda5176287321?arch=arm64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776772334"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/must-gather-rhel9@sha256:9bbdc7456e80ff7adc21ee179f2ad678131b700a30f467e9cae98f52fcc1a866_arm64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/must-gather-rhel9@sha256:9bbdc7456e80ff7adc21ee179f2ad678131b700a30f467e9cae98f52fcc1a866_arm64",
"product_id": "registry.redhat.io/openshift-gitops-1/must-gather-rhel9@sha256:9bbdc7456e80ff7adc21ee179f2ad678131b700a30f467e9cae98f52fcc1a866_arm64",
"product_identification_helper": {
"purl": "pkg:oci/must-gather-rhel9@sha256%3A9bbdc7456e80ff7adc21ee179f2ad678131b700a30f467e9cae98f52fcc1a866?arch=arm64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776773046"
}
}
}
],
"category": "architecture",
"name": "arm64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel9@sha256:1eb9a401a5e48ee2536b8d869b23ec28e10452d37160740db3a09dd7f2c9e357_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel9@sha256:1eb9a401a5e48ee2536b8d869b23ec28e10452d37160740db3a09dd7f2c9e357_ppc64le",
"product_id": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel9@sha256:1eb9a401a5e48ee2536b8d869b23ec28e10452d37160740db3a09dd7f2c9e357_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/argo-rollouts-rhel9@sha256%3A1eb9a401a5e48ee2536b8d869b23ec28e10452d37160740db3a09dd7f2c9e357?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776772860"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:627f071531fb4da783c4f231fa3afd26d9eb9a56dc51b5d55a742f167b36d2f9_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:627f071531fb4da783c4f231fa3afd26d9eb9a56dc51b5d55a742f167b36d2f9_ppc64le",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:627f071531fb4da783c4f231fa3afd26d9eb9a56dc51b5d55a742f167b36d2f9_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/argocd-rhel9@sha256%3A627f071531fb4da783c4f231fa3afd26d9eb9a56dc51b5d55a742f167b36d2f9?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776772383"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel9@sha256:46c6c393d217df1c645c06d0da7ac1e82defc4ee1d773b6e288c976cdfaf1f89_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel9@sha256:46c6c393d217df1c645c06d0da7ac1e82defc4ee1d773b6e288c976cdfaf1f89_ppc64le",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel9@sha256:46c6c393d217df1c645c06d0da7ac1e82defc4ee1d773b6e288c976cdfaf1f89_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/argocd-agent-rhel9@sha256%3A46c6c393d217df1c645c06d0da7ac1e82defc4ee1d773b6e288c976cdfaf1f89?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776772240"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel9@sha256:4df95769cab0fd8fdc88f79857a7ace2fd0183fdc7ace73db480aa9de0d2d0af_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel9@sha256:4df95769cab0fd8fdc88f79857a7ace2fd0183fdc7ace73db480aa9de0d2d0af_ppc64le",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel9@sha256:4df95769cab0fd8fdc88f79857a7ace2fd0183fdc7ace73db480aa9de0d2d0af_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/argocd-extensions-rhel9@sha256%3A4df95769cab0fd8fdc88f79857a7ace2fd0183fdc7ace73db480aa9de0d2d0af?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776773886"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel9@sha256:8b19c499ebb9feeb664ff3721bdc2170fd62a21cc9f5c84d9ff10cd0a71030e7_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel9@sha256:8b19c499ebb9feeb664ff3721bdc2170fd62a21cc9f5c84d9ff10cd0a71030e7_ppc64le",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel9@sha256:8b19c499ebb9feeb664ff3721bdc2170fd62a21cc9f5c84d9ff10cd0a71030e7_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/argocd-image-updater-rhel9@sha256%3A8b19c499ebb9feeb664ff3721bdc2170fd62a21cc9f5c84d9ff10cd0a71030e7?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776773869"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel9@sha256:c01ac978ee2e58f675e45b39d13a643ceef4fb89cef6438a5be4a2bc3a1c6efa_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel9@sha256:c01ac978ee2e58f675e45b39d13a643ceef4fb89cef6438a5be4a2bc3a1c6efa_ppc64le",
"product_id": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel9@sha256:c01ac978ee2e58f675e45b39d13a643ceef4fb89cef6438a5be4a2bc3a1c6efa_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/console-plugin-rhel9@sha256%3Ac01ac978ee2e58f675e45b39d13a643ceef4fb89cef6438a5be4a2bc3a1c6efa?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776773904"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/dex-rhel9@sha256:a3996e99a9ebe783373b78f352e5c77970e66546e888bce3bc9a02594bd37ad3_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/dex-rhel9@sha256:a3996e99a9ebe783373b78f352e5c77970e66546e888bce3bc9a02594bd37ad3_ppc64le",
"product_id": "registry.redhat.io/openshift-gitops-1/dex-rhel9@sha256:a3996e99a9ebe783373b78f352e5c77970e66546e888bce3bc9a02594bd37ad3_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/dex-rhel9@sha256%3Aa3996e99a9ebe783373b78f352e5c77970e66546e888bce3bc9a02594bd37ad3?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776773421"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel9@sha256:7548ae87b7645ab79259a3e6603b471432a322d2a46d233f653c25cb8755a33d_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel9@sha256:7548ae87b7645ab79259a3e6603b471432a322d2a46d233f653c25cb8755a33d_ppc64le",
"product_id": "registry.redhat.io/openshift-gitops-1/gitops-rhel9@sha256:7548ae87b7645ab79259a3e6603b471432a322d2a46d233f653c25cb8755a33d_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/gitops-rhel9@sha256%3A7548ae87b7645ab79259a3e6603b471432a322d2a46d233f653c25cb8755a33d?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776773403"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel9-operator@sha256:aec32824bc31c868f8b40612f4e99ab9953458a4b550bb0323ff4173ebd21f53_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel9-operator@sha256:aec32824bc31c868f8b40612f4e99ab9953458a4b550bb0323ff4173ebd21f53_ppc64le",
"product_id": "registry.redhat.io/openshift-gitops-1/gitops-rhel9-operator@sha256:aec32824bc31c868f8b40612f4e99ab9953458a4b550bb0323ff4173ebd21f53_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/gitops-rhel9-operator@sha256%3Aaec32824bc31c868f8b40612f4e99ab9953458a4b550bb0323ff4173ebd21f53?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776772334"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/must-gather-rhel9@sha256:81de8e9723ec5819ecf40a8abac1218d3ca23f65db824996e697c3f5eb1c88ce_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/must-gather-rhel9@sha256:81de8e9723ec5819ecf40a8abac1218d3ca23f65db824996e697c3f5eb1c88ce_ppc64le",
"product_id": "registry.redhat.io/openshift-gitops-1/must-gather-rhel9@sha256:81de8e9723ec5819ecf40a8abac1218d3ca23f65db824996e697c3f5eb1c88ce_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/must-gather-rhel9@sha256%3A81de8e9723ec5819ecf40a8abac1218d3ca23f65db824996e697c3f5eb1c88ce?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776773046"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel9@sha256:322f13074a5f64ec486e52416112a4ce63c6fce9c21443b9909343f1391613b7_s390x",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel9@sha256:322f13074a5f64ec486e52416112a4ce63c6fce9c21443b9909343f1391613b7_s390x",
"product_id": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel9@sha256:322f13074a5f64ec486e52416112a4ce63c6fce9c21443b9909343f1391613b7_s390x",
"product_identification_helper": {
"purl": "pkg:oci/argo-rollouts-rhel9@sha256%3A322f13074a5f64ec486e52416112a4ce63c6fce9c21443b9909343f1391613b7?arch=s390x\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776772860"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:8596b4e5df8abf7771e6da9920d25186facd7bef39dc553c1e479b3ef1a9e8cd_s390x",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:8596b4e5df8abf7771e6da9920d25186facd7bef39dc553c1e479b3ef1a9e8cd_s390x",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:8596b4e5df8abf7771e6da9920d25186facd7bef39dc553c1e479b3ef1a9e8cd_s390x",
"product_identification_helper": {
"purl": "pkg:oci/argocd-rhel9@sha256%3A8596b4e5df8abf7771e6da9920d25186facd7bef39dc553c1e479b3ef1a9e8cd?arch=s390x\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776772383"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel9@sha256:09708d69743cbc7981ffa823dbdc782b0fac0b577ad6cecc4b875dd712a0c6dc_s390x",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel9@sha256:09708d69743cbc7981ffa823dbdc782b0fac0b577ad6cecc4b875dd712a0c6dc_s390x",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel9@sha256:09708d69743cbc7981ffa823dbdc782b0fac0b577ad6cecc4b875dd712a0c6dc_s390x",
"product_identification_helper": {
"purl": "pkg:oci/argocd-agent-rhel9@sha256%3A09708d69743cbc7981ffa823dbdc782b0fac0b577ad6cecc4b875dd712a0c6dc?arch=s390x\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776772240"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel9@sha256:96b8cc9a32104c7262aabc79dc01489640378717cd75d33c0aaca165ff193b2e_s390x",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel9@sha256:96b8cc9a32104c7262aabc79dc01489640378717cd75d33c0aaca165ff193b2e_s390x",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel9@sha256:96b8cc9a32104c7262aabc79dc01489640378717cd75d33c0aaca165ff193b2e_s390x",
"product_identification_helper": {
"purl": "pkg:oci/argocd-extensions-rhel9@sha256%3A96b8cc9a32104c7262aabc79dc01489640378717cd75d33c0aaca165ff193b2e?arch=s390x\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776773886"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel9@sha256:9933d9dfafd4c1085a58e305b187386b3ea3f751a483c811a81b7f3ffd31c738_s390x",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel9@sha256:9933d9dfafd4c1085a58e305b187386b3ea3f751a483c811a81b7f3ffd31c738_s390x",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel9@sha256:9933d9dfafd4c1085a58e305b187386b3ea3f751a483c811a81b7f3ffd31c738_s390x",
"product_identification_helper": {
"purl": "pkg:oci/argocd-image-updater-rhel9@sha256%3A9933d9dfafd4c1085a58e305b187386b3ea3f751a483c811a81b7f3ffd31c738?arch=s390x\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776773869"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel9@sha256:26192e97d753181a1b7cb7baf0ec130c1592151c9a46c1940c42e80267df2486_s390x",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel9@sha256:26192e97d753181a1b7cb7baf0ec130c1592151c9a46c1940c42e80267df2486_s390x",
"product_id": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel9@sha256:26192e97d753181a1b7cb7baf0ec130c1592151c9a46c1940c42e80267df2486_s390x",
"product_identification_helper": {
"purl": "pkg:oci/console-plugin-rhel9@sha256%3A26192e97d753181a1b7cb7baf0ec130c1592151c9a46c1940c42e80267df2486?arch=s390x\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776773904"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/dex-rhel9@sha256:0882d236e8887a0467687195620419c72c5064ca518b9f54d7a30dadbcc49726_s390x",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/dex-rhel9@sha256:0882d236e8887a0467687195620419c72c5064ca518b9f54d7a30dadbcc49726_s390x",
"product_id": "registry.redhat.io/openshift-gitops-1/dex-rhel9@sha256:0882d236e8887a0467687195620419c72c5064ca518b9f54d7a30dadbcc49726_s390x",
"product_identification_helper": {
"purl": "pkg:oci/dex-rhel9@sha256%3A0882d236e8887a0467687195620419c72c5064ca518b9f54d7a30dadbcc49726?arch=s390x\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776773421"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel9@sha256:122e412e01acd1a6a67b07364e280545b356488de9e1874cbff0a2a72a958525_s390x",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel9@sha256:122e412e01acd1a6a67b07364e280545b356488de9e1874cbff0a2a72a958525_s390x",
"product_id": "registry.redhat.io/openshift-gitops-1/gitops-rhel9@sha256:122e412e01acd1a6a67b07364e280545b356488de9e1874cbff0a2a72a958525_s390x",
"product_identification_helper": {
"purl": "pkg:oci/gitops-rhel9@sha256%3A122e412e01acd1a6a67b07364e280545b356488de9e1874cbff0a2a72a958525?arch=s390x\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776773403"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel9-operator@sha256:6c2e60047d0f6015418fc06e04bc6a02ada0640f27d10e09a2d3f21eba3bef6d_s390x",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel9-operator@sha256:6c2e60047d0f6015418fc06e04bc6a02ada0640f27d10e09a2d3f21eba3bef6d_s390x",
"product_id": "registry.redhat.io/openshift-gitops-1/gitops-rhel9-operator@sha256:6c2e60047d0f6015418fc06e04bc6a02ada0640f27d10e09a2d3f21eba3bef6d_s390x",
"product_identification_helper": {
"purl": "pkg:oci/gitops-rhel9-operator@sha256%3A6c2e60047d0f6015418fc06e04bc6a02ada0640f27d10e09a2d3f21eba3bef6d?arch=s390x\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776772334"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/must-gather-rhel9@sha256:ae636a937c42bce533a4e12929e0fc92f175f89be10e2857e2ce1287e1930bf1_s390x",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/must-gather-rhel9@sha256:ae636a937c42bce533a4e12929e0fc92f175f89be10e2857e2ce1287e1930bf1_s390x",
"product_id": "registry.redhat.io/openshift-gitops-1/must-gather-rhel9@sha256:ae636a937c42bce533a4e12929e0fc92f175f89be10e2857e2ce1287e1930bf1_s390x",
"product_identification_helper": {
"purl": "pkg:oci/must-gather-rhel9@sha256%3Aae636a937c42bce533a4e12929e0fc92f175f89be10e2857e2ce1287e1930bf1?arch=s390x\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776773046"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel9@sha256:1a8c1669907826bf3f711845c6d4833b2e2c5c4807bada9797b9b0d6397955b7_arm64 as a component of Red Hat OpenShift GitOps 1.2",
"product_id": "Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel9@sha256:1a8c1669907826bf3f711845c6d4833b2e2c5c4807bada9797b9b0d6397955b7_arm64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel9@sha256:1a8c1669907826bf3f711845c6d4833b2e2c5c4807bada9797b9b0d6397955b7_arm64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel9@sha256:1eb9a401a5e48ee2536b8d869b23ec28e10452d37160740db3a09dd7f2c9e357_ppc64le as a component of Red Hat OpenShift GitOps 1.2",
"product_id": "Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel9@sha256:1eb9a401a5e48ee2536b8d869b23ec28e10452d37160740db3a09dd7f2c9e357_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel9@sha256:1eb9a401a5e48ee2536b8d869b23ec28e10452d37160740db3a09dd7f2c9e357_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel9@sha256:1f376f53aa7d80bf48b61314480596b4837a9c80a0bbbefb428dc24ad74a6126_amd64 as a component of Red Hat OpenShift GitOps 1.2",
"product_id": "Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel9@sha256:1f376f53aa7d80bf48b61314480596b4837a9c80a0bbbefb428dc24ad74a6126_amd64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel9@sha256:1f376f53aa7d80bf48b61314480596b4837a9c80a0bbbefb428dc24ad74a6126_amd64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel9@sha256:322f13074a5f64ec486e52416112a4ce63c6fce9c21443b9909343f1391613b7_s390x as a component of Red Hat OpenShift GitOps 1.2",
"product_id": "Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel9@sha256:322f13074a5f64ec486e52416112a4ce63c6fce9c21443b9909343f1391613b7_s390x"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel9@sha256:322f13074a5f64ec486e52416112a4ce63c6fce9c21443b9909343f1391613b7_s390x",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel9@sha256:09708d69743cbc7981ffa823dbdc782b0fac0b577ad6cecc4b875dd712a0c6dc_s390x as a component of Red Hat OpenShift GitOps 1.2",
"product_id": "Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel9@sha256:09708d69743cbc7981ffa823dbdc782b0fac0b577ad6cecc4b875dd712a0c6dc_s390x"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel9@sha256:09708d69743cbc7981ffa823dbdc782b0fac0b577ad6cecc4b875dd712a0c6dc_s390x",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel9@sha256:46c6c393d217df1c645c06d0da7ac1e82defc4ee1d773b6e288c976cdfaf1f89_ppc64le as a component of Red Hat OpenShift GitOps 1.2",
"product_id": "Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel9@sha256:46c6c393d217df1c645c06d0da7ac1e82defc4ee1d773b6e288c976cdfaf1f89_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel9@sha256:46c6c393d217df1c645c06d0da7ac1e82defc4ee1d773b6e288c976cdfaf1f89_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel9@sha256:b7e423bf7fde922a1d8fe4adf6f5205fc4908881f496e6ebd05db0b5f890d35c_amd64 as a component of Red Hat OpenShift GitOps 1.2",
"product_id": "Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel9@sha256:b7e423bf7fde922a1d8fe4adf6f5205fc4908881f496e6ebd05db0b5f890d35c_amd64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel9@sha256:b7e423bf7fde922a1d8fe4adf6f5205fc4908881f496e6ebd05db0b5f890d35c_amd64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel9@sha256:f3b25a4b791a6d75c2bb7fa156fa5796ca0ef7e3520c432cd1e0ee094b0b44ca_arm64 as a component of Red Hat OpenShift GitOps 1.2",
"product_id": "Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel9@sha256:f3b25a4b791a6d75c2bb7fa156fa5796ca0ef7e3520c432cd1e0ee094b0b44ca_arm64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel9@sha256:f3b25a4b791a6d75c2bb7fa156fa5796ca0ef7e3520c432cd1e0ee094b0b44ca_arm64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel9@sha256:4df95769cab0fd8fdc88f79857a7ace2fd0183fdc7ace73db480aa9de0d2d0af_ppc64le as a component of Red Hat OpenShift GitOps 1.2",
"product_id": "Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel9@sha256:4df95769cab0fd8fdc88f79857a7ace2fd0183fdc7ace73db480aa9de0d2d0af_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel9@sha256:4df95769cab0fd8fdc88f79857a7ace2fd0183fdc7ace73db480aa9de0d2d0af_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel9@sha256:96b8cc9a32104c7262aabc79dc01489640378717cd75d33c0aaca165ff193b2e_s390x as a component of Red Hat OpenShift GitOps 1.2",
"product_id": "Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel9@sha256:96b8cc9a32104c7262aabc79dc01489640378717cd75d33c0aaca165ff193b2e_s390x"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel9@sha256:96b8cc9a32104c7262aabc79dc01489640378717cd75d33c0aaca165ff193b2e_s390x",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel9@sha256:a87ae94bb4eeaf8e00e5b60639ce8a74af2fa74d5312f1586db65ac2e7e3915e_arm64 as a component of Red Hat OpenShift GitOps 1.2",
"product_id": "Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel9@sha256:a87ae94bb4eeaf8e00e5b60639ce8a74af2fa74d5312f1586db65ac2e7e3915e_arm64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel9@sha256:a87ae94bb4eeaf8e00e5b60639ce8a74af2fa74d5312f1586db65ac2e7e3915e_arm64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel9@sha256:ddd9d15f0962e166d5e2ca0797137a135f34c558a5a51ac85a173f245d763625_amd64 as a component of Red Hat OpenShift GitOps 1.2",
"product_id": "Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel9@sha256:ddd9d15f0962e166d5e2ca0797137a135f34c558a5a51ac85a173f245d763625_amd64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel9@sha256:ddd9d15f0962e166d5e2ca0797137a135f34c558a5a51ac85a173f245d763625_amd64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel9@sha256:13348eb0e7ca8a4517becd8f6feae39f26bca07e47568699c153747568f89c3e_arm64 as a component of Red Hat OpenShift GitOps 1.2",
"product_id": "Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel9@sha256:13348eb0e7ca8a4517becd8f6feae39f26bca07e47568699c153747568f89c3e_arm64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel9@sha256:13348eb0e7ca8a4517becd8f6feae39f26bca07e47568699c153747568f89c3e_arm64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel9@sha256:8b19c499ebb9feeb664ff3721bdc2170fd62a21cc9f5c84d9ff10cd0a71030e7_ppc64le as a component of Red Hat OpenShift GitOps 1.2",
"product_id": "Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel9@sha256:8b19c499ebb9feeb664ff3721bdc2170fd62a21cc9f5c84d9ff10cd0a71030e7_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel9@sha256:8b19c499ebb9feeb664ff3721bdc2170fd62a21cc9f5c84d9ff10cd0a71030e7_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel9@sha256:9933d9dfafd4c1085a58e305b187386b3ea3f751a483c811a81b7f3ffd31c738_s390x as a component of Red Hat OpenShift GitOps 1.2",
"product_id": "Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel9@sha256:9933d9dfafd4c1085a58e305b187386b3ea3f751a483c811a81b7f3ffd31c738_s390x"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel9@sha256:9933d9dfafd4c1085a58e305b187386b3ea3f751a483c811a81b7f3ffd31c738_s390x",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel9@sha256:fde967c5f4e625ad901ff3635f7a9cd0e9db64dfff9083618e3d793e21e8488f_amd64 as a component of Red Hat OpenShift GitOps 1.2",
"product_id": "Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel9@sha256:fde967c5f4e625ad901ff3635f7a9cd0e9db64dfff9083618e3d793e21e8488f_amd64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel9@sha256:fde967c5f4e625ad901ff3635f7a9cd0e9db64dfff9083618e3d793e21e8488f_amd64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:627f071531fb4da783c4f231fa3afd26d9eb9a56dc51b5d55a742f167b36d2f9_ppc64le as a component of Red Hat OpenShift GitOps 1.2",
"product_id": "Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:627f071531fb4da783c4f231fa3afd26d9eb9a56dc51b5d55a742f167b36d2f9_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:627f071531fb4da783c4f231fa3afd26d9eb9a56dc51b5d55a742f167b36d2f9_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:65049e2c8984f2f08c05838a407b4641285c956c440f700225bdbf67cf03c8bc_arm64 as a component of Red Hat OpenShift GitOps 1.2",
"product_id": "Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:65049e2c8984f2f08c05838a407b4641285c956c440f700225bdbf67cf03c8bc_arm64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:65049e2c8984f2f08c05838a407b4641285c956c440f700225bdbf67cf03c8bc_arm64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:8596b4e5df8abf7771e6da9920d25186facd7bef39dc553c1e479b3ef1a9e8cd_s390x as a component of Red Hat OpenShift GitOps 1.2",
"product_id": "Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:8596b4e5df8abf7771e6da9920d25186facd7bef39dc553c1e479b3ef1a9e8cd_s390x"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:8596b4e5df8abf7771e6da9920d25186facd7bef39dc553c1e479b3ef1a9e8cd_s390x",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:c7fc5b1653c5d8175d480481d44e797aa843a10a4eae753a7eb70a5871540ed8_amd64 as a component of Red Hat OpenShift GitOps 1.2",
"product_id": "Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:c7fc5b1653c5d8175d480481d44e797aa843a10a4eae753a7eb70a5871540ed8_amd64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:c7fc5b1653c5d8175d480481d44e797aa843a10a4eae753a7eb70a5871540ed8_amd64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel9@sha256:1bbc1efa6478d85935146b7c50217204094e0c07a3d096f353567cc4aec7b7af_amd64 as a component of Red Hat OpenShift GitOps 1.2",
"product_id": "Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/console-plugin-rhel9@sha256:1bbc1efa6478d85935146b7c50217204094e0c07a3d096f353567cc4aec7b7af_amd64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel9@sha256:1bbc1efa6478d85935146b7c50217204094e0c07a3d096f353567cc4aec7b7af_amd64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel9@sha256:26192e97d753181a1b7cb7baf0ec130c1592151c9a46c1940c42e80267df2486_s390x as a component of Red Hat OpenShift GitOps 1.2",
"product_id": "Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/console-plugin-rhel9@sha256:26192e97d753181a1b7cb7baf0ec130c1592151c9a46c1940c42e80267df2486_s390x"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel9@sha256:26192e97d753181a1b7cb7baf0ec130c1592151c9a46c1940c42e80267df2486_s390x",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel9@sha256:c01ac978ee2e58f675e45b39d13a643ceef4fb89cef6438a5be4a2bc3a1c6efa_ppc64le as a component of Red Hat OpenShift GitOps 1.2",
"product_id": "Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/console-plugin-rhel9@sha256:c01ac978ee2e58f675e45b39d13a643ceef4fb89cef6438a5be4a2bc3a1c6efa_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel9@sha256:c01ac978ee2e58f675e45b39d13a643ceef4fb89cef6438a5be4a2bc3a1c6efa_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel9@sha256:e0d9a33cca85c936439e04862ecec780554cf34e9c6df7f62497595d61e8c1e8_arm64 as a component of Red Hat OpenShift GitOps 1.2",
"product_id": "Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/console-plugin-rhel9@sha256:e0d9a33cca85c936439e04862ecec780554cf34e9c6df7f62497595d61e8c1e8_arm64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel9@sha256:e0d9a33cca85c936439e04862ecec780554cf34e9c6df7f62497595d61e8c1e8_arm64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/dex-rhel9@sha256:0882d236e8887a0467687195620419c72c5064ca518b9f54d7a30dadbcc49726_s390x as a component of Red Hat OpenShift GitOps 1.2",
"product_id": "Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/dex-rhel9@sha256:0882d236e8887a0467687195620419c72c5064ca518b9f54d7a30dadbcc49726_s390x"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/dex-rhel9@sha256:0882d236e8887a0467687195620419c72c5064ca518b9f54d7a30dadbcc49726_s390x",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/dex-rhel9@sha256:a3996e99a9ebe783373b78f352e5c77970e66546e888bce3bc9a02594bd37ad3_ppc64le as a component of Red Hat OpenShift GitOps 1.2",
"product_id": "Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/dex-rhel9@sha256:a3996e99a9ebe783373b78f352e5c77970e66546e888bce3bc9a02594bd37ad3_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/dex-rhel9@sha256:a3996e99a9ebe783373b78f352e5c77970e66546e888bce3bc9a02594bd37ad3_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/dex-rhel9@sha256:b61518708f23cf947a447823c7747167259faddbd8032a3c8596c8fa9d5b84af_amd64 as a component of Red Hat OpenShift GitOps 1.2",
"product_id": "Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/dex-rhel9@sha256:b61518708f23cf947a447823c7747167259faddbd8032a3c8596c8fa9d5b84af_amd64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/dex-rhel9@sha256:b61518708f23cf947a447823c7747167259faddbd8032a3c8596c8fa9d5b84af_amd64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/dex-rhel9@sha256:feaaf37afd8ccab9460c39606164fbc93cdc4d60eab68e5809465e9aa484e0bf_arm64 as a component of Red Hat OpenShift GitOps 1.2",
"product_id": "Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/dex-rhel9@sha256:feaaf37afd8ccab9460c39606164fbc93cdc4d60eab68e5809465e9aa484e0bf_arm64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/dex-rhel9@sha256:feaaf37afd8ccab9460c39606164fbc93cdc4d60eab68e5809465e9aa484e0bf_arm64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:247a54db35e184702d9c1d6f83cd9e3669f8aae48bd0eeaecdbeeda6176c525f_amd64 as a component of Red Hat OpenShift GitOps 1.2",
"product_id": "Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:247a54db35e184702d9c1d6f83cd9e3669f8aae48bd0eeaecdbeeda6176c525f_amd64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:247a54db35e184702d9c1d6f83cd9e3669f8aae48bd0eeaecdbeeda6176c525f_amd64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel9-operator@sha256:6467e7ef9afeb8c45da2620221257751ae2c0f20019cad986e3bda5176287321_arm64 as a component of Red Hat OpenShift GitOps 1.2",
"product_id": "Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/gitops-rhel9-operator@sha256:6467e7ef9afeb8c45da2620221257751ae2c0f20019cad986e3bda5176287321_arm64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/gitops-rhel9-operator@sha256:6467e7ef9afeb8c45da2620221257751ae2c0f20019cad986e3bda5176287321_arm64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel9-operator@sha256:6aaaf3f027d5d673b70a1a5d4276416e3525e6249947b4a631df4c63856acd63_amd64 as a component of Red Hat OpenShift GitOps 1.2",
"product_id": "Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/gitops-rhel9-operator@sha256:6aaaf3f027d5d673b70a1a5d4276416e3525e6249947b4a631df4c63856acd63_amd64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/gitops-rhel9-operator@sha256:6aaaf3f027d5d673b70a1a5d4276416e3525e6249947b4a631df4c63856acd63_amd64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel9-operator@sha256:6c2e60047d0f6015418fc06e04bc6a02ada0640f27d10e09a2d3f21eba3bef6d_s390x as a component of Red Hat OpenShift GitOps 1.2",
"product_id": "Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/gitops-rhel9-operator@sha256:6c2e60047d0f6015418fc06e04bc6a02ada0640f27d10e09a2d3f21eba3bef6d_s390x"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/gitops-rhel9-operator@sha256:6c2e60047d0f6015418fc06e04bc6a02ada0640f27d10e09a2d3f21eba3bef6d_s390x",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel9-operator@sha256:aec32824bc31c868f8b40612f4e99ab9953458a4b550bb0323ff4173ebd21f53_ppc64le as a component of Red Hat OpenShift GitOps 1.2",
"product_id": "Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/gitops-rhel9-operator@sha256:aec32824bc31c868f8b40612f4e99ab9953458a4b550bb0323ff4173ebd21f53_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/gitops-rhel9-operator@sha256:aec32824bc31c868f8b40612f4e99ab9953458a4b550bb0323ff4173ebd21f53_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel9@sha256:07f30eba3f93a9e1605c27aeab76f195829443b9d454a2e8d2d5938806f165b1_amd64 as a component of Red Hat OpenShift GitOps 1.2",
"product_id": "Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/gitops-rhel9@sha256:07f30eba3f93a9e1605c27aeab76f195829443b9d454a2e8d2d5938806f165b1_amd64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/gitops-rhel9@sha256:07f30eba3f93a9e1605c27aeab76f195829443b9d454a2e8d2d5938806f165b1_amd64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel9@sha256:122e412e01acd1a6a67b07364e280545b356488de9e1874cbff0a2a72a958525_s390x as a component of Red Hat OpenShift GitOps 1.2",
"product_id": "Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/gitops-rhel9@sha256:122e412e01acd1a6a67b07364e280545b356488de9e1874cbff0a2a72a958525_s390x"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/gitops-rhel9@sha256:122e412e01acd1a6a67b07364e280545b356488de9e1874cbff0a2a72a958525_s390x",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel9@sha256:7548ae87b7645ab79259a3e6603b471432a322d2a46d233f653c25cb8755a33d_ppc64le as a component of Red Hat OpenShift GitOps 1.2",
"product_id": "Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/gitops-rhel9@sha256:7548ae87b7645ab79259a3e6603b471432a322d2a46d233f653c25cb8755a33d_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/gitops-rhel9@sha256:7548ae87b7645ab79259a3e6603b471432a322d2a46d233f653c25cb8755a33d_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel9@sha256:b406493693fdae121f128e9a18b4139a05f5e682fd8dacfa3e8fe7c6b35bcfbd_arm64 as a component of Red Hat OpenShift GitOps 1.2",
"product_id": "Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/gitops-rhel9@sha256:b406493693fdae121f128e9a18b4139a05f5e682fd8dacfa3e8fe7c6b35bcfbd_arm64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/gitops-rhel9@sha256:b406493693fdae121f128e9a18b4139a05f5e682fd8dacfa3e8fe7c6b35bcfbd_arm64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/must-gather-rhel9@sha256:81de8e9723ec5819ecf40a8abac1218d3ca23f65db824996e697c3f5eb1c88ce_ppc64le as a component of Red Hat OpenShift GitOps 1.2",
"product_id": "Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/must-gather-rhel9@sha256:81de8e9723ec5819ecf40a8abac1218d3ca23f65db824996e697c3f5eb1c88ce_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/must-gather-rhel9@sha256:81de8e9723ec5819ecf40a8abac1218d3ca23f65db824996e697c3f5eb1c88ce_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/must-gather-rhel9@sha256:9bbdc7456e80ff7adc21ee179f2ad678131b700a30f467e9cae98f52fcc1a866_arm64 as a component of Red Hat OpenShift GitOps 1.2",
"product_id": "Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/must-gather-rhel9@sha256:9bbdc7456e80ff7adc21ee179f2ad678131b700a30f467e9cae98f52fcc1a866_arm64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/must-gather-rhel9@sha256:9bbdc7456e80ff7adc21ee179f2ad678131b700a30f467e9cae98f52fcc1a866_arm64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/must-gather-rhel9@sha256:a6596a7bcceb01a55db1f2ad9894ec8550cf4a6d9fc5976d9082684863f0ff8d_amd64 as a component of Red Hat OpenShift GitOps 1.2",
"product_id": "Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/must-gather-rhel9@sha256:a6596a7bcceb01a55db1f2ad9894ec8550cf4a6d9fc5976d9082684863f0ff8d_amd64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/must-gather-rhel9@sha256:a6596a7bcceb01a55db1f2ad9894ec8550cf4a6d9fc5976d9082684863f0ff8d_amd64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/must-gather-rhel9@sha256:ae636a937c42bce533a4e12929e0fc92f175f89be10e2857e2ce1287e1930bf1_s390x as a component of Red Hat OpenShift GitOps 1.2",
"product_id": "Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/must-gather-rhel9@sha256:ae636a937c42bce533a4e12929e0fc92f175f89be10e2857e2ce1287e1930bf1_s390x"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/must-gather-rhel9@sha256:ae636a937c42bce533a4e12929e0fc92f175f89be10e2857e2ce1287e1930bf1_s390x",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-27137",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"discovery_date": "2026-03-06T22:01:38.859733+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel9@sha256:1a8c1669907826bf3f711845c6d4833b2e2c5c4807bada9797b9b0d6397955b7_arm64",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel9@sha256:1eb9a401a5e48ee2536b8d869b23ec28e10452d37160740db3a09dd7f2c9e357_ppc64le",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel9@sha256:1f376f53aa7d80bf48b61314480596b4837a9c80a0bbbefb428dc24ad74a6126_amd64",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel9@sha256:322f13074a5f64ec486e52416112a4ce63c6fce9c21443b9909343f1391613b7_s390x",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel9@sha256:09708d69743cbc7981ffa823dbdc782b0fac0b577ad6cecc4b875dd712a0c6dc_s390x",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel9@sha256:46c6c393d217df1c645c06d0da7ac1e82defc4ee1d773b6e288c976cdfaf1f89_ppc64le",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel9@sha256:b7e423bf7fde922a1d8fe4adf6f5205fc4908881f496e6ebd05db0b5f890d35c_amd64",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel9@sha256:f3b25a4b791a6d75c2bb7fa156fa5796ca0ef7e3520c432cd1e0ee094b0b44ca_arm64",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel9@sha256:4df95769cab0fd8fdc88f79857a7ace2fd0183fdc7ace73db480aa9de0d2d0af_ppc64le",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel9@sha256:96b8cc9a32104c7262aabc79dc01489640378717cd75d33c0aaca165ff193b2e_s390x",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel9@sha256:a87ae94bb4eeaf8e00e5b60639ce8a74af2fa74d5312f1586db65ac2e7e3915e_arm64",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel9@sha256:ddd9d15f0962e166d5e2ca0797137a135f34c558a5a51ac85a173f245d763625_amd64",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel9@sha256:13348eb0e7ca8a4517becd8f6feae39f26bca07e47568699c153747568f89c3e_arm64",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel9@sha256:8b19c499ebb9feeb664ff3721bdc2170fd62a21cc9f5c84d9ff10cd0a71030e7_ppc64le",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel9@sha256:9933d9dfafd4c1085a58e305b187386b3ea3f751a483c811a81b7f3ffd31c738_s390x",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel9@sha256:fde967c5f4e625ad901ff3635f7a9cd0e9db64dfff9083618e3d793e21e8488f_amd64",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:627f071531fb4da783c4f231fa3afd26d9eb9a56dc51b5d55a742f167b36d2f9_ppc64le",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:65049e2c8984f2f08c05838a407b4641285c956c440f700225bdbf67cf03c8bc_arm64",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:8596b4e5df8abf7771e6da9920d25186facd7bef39dc553c1e479b3ef1a9e8cd_s390x",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:c7fc5b1653c5d8175d480481d44e797aa843a10a4eae753a7eb70a5871540ed8_amd64",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/console-plugin-rhel9@sha256:1bbc1efa6478d85935146b7c50217204094e0c07a3d096f353567cc4aec7b7af_amd64",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/console-plugin-rhel9@sha256:26192e97d753181a1b7cb7baf0ec130c1592151c9a46c1940c42e80267df2486_s390x",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/console-plugin-rhel9@sha256:c01ac978ee2e58f675e45b39d13a643ceef4fb89cef6438a5be4a2bc3a1c6efa_ppc64le",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/console-plugin-rhel9@sha256:e0d9a33cca85c936439e04862ecec780554cf34e9c6df7f62497595d61e8c1e8_arm64",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:247a54db35e184702d9c1d6f83cd9e3669f8aae48bd0eeaecdbeeda6176c525f_amd64",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/gitops-rhel9-operator@sha256:6467e7ef9afeb8c45da2620221257751ae2c0f20019cad986e3bda5176287321_arm64",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/gitops-rhel9-operator@sha256:6aaaf3f027d5d673b70a1a5d4276416e3525e6249947b4a631df4c63856acd63_amd64",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/gitops-rhel9-operator@sha256:6c2e60047d0f6015418fc06e04bc6a02ada0640f27d10e09a2d3f21eba3bef6d_s390x",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/gitops-rhel9-operator@sha256:aec32824bc31c868f8b40612f4e99ab9953458a4b550bb0323ff4173ebd21f53_ppc64le",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/gitops-rhel9@sha256:07f30eba3f93a9e1605c27aeab76f195829443b9d454a2e8d2d5938806f165b1_amd64",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/gitops-rhel9@sha256:122e412e01acd1a6a67b07364e280545b356488de9e1874cbff0a2a72a958525_s390x",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/gitops-rhel9@sha256:7548ae87b7645ab79259a3e6603b471432a322d2a46d233f653c25cb8755a33d_ppc64le",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/gitops-rhel9@sha256:b406493693fdae121f128e9a18b4139a05f5e682fd8dacfa3e8fe7c6b35bcfbd_arm64",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/must-gather-rhel9@sha256:81de8e9723ec5819ecf40a8abac1218d3ca23f65db824996e697c3f5eb1c88ce_ppc64le",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/must-gather-rhel9@sha256:9bbdc7456e80ff7adc21ee179f2ad678131b700a30f467e9cae98f52fcc1a866_arm64",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/must-gather-rhel9@sha256:a6596a7bcceb01a55db1f2ad9894ec8550cf4a6d9fc5976d9082684863f0ff8d_amd64",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/must-gather-rhel9@sha256:ae636a937c42bce533a4e12929e0fc92f175f89be10e2857e2ce1287e1930bf1_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2445345"
}
],
"notes": [
{
"category": "description",
"text": "A certificate validation flaw has been discovered in the golang crypto/x509 module. When verifying a certificate chain which contains a certificate containing multiple email address constraints which share common local portions but different domain portions, these constraints will not be properly applied, and only the last constraint will be considered.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: Incorrect enforcement of email constraints in crypto/x509",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/dex-rhel9@sha256:0882d236e8887a0467687195620419c72c5064ca518b9f54d7a30dadbcc49726_s390x",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/dex-rhel9@sha256:a3996e99a9ebe783373b78f352e5c77970e66546e888bce3bc9a02594bd37ad3_ppc64le",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/dex-rhel9@sha256:b61518708f23cf947a447823c7747167259faddbd8032a3c8596c8fa9d5b84af_amd64",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/dex-rhel9@sha256:feaaf37afd8ccab9460c39606164fbc93cdc4d60eab68e5809465e9aa484e0bf_arm64"
],
"known_not_affected": [
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel9@sha256:1a8c1669907826bf3f711845c6d4833b2e2c5c4807bada9797b9b0d6397955b7_arm64",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel9@sha256:1eb9a401a5e48ee2536b8d869b23ec28e10452d37160740db3a09dd7f2c9e357_ppc64le",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel9@sha256:1f376f53aa7d80bf48b61314480596b4837a9c80a0bbbefb428dc24ad74a6126_amd64",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel9@sha256:322f13074a5f64ec486e52416112a4ce63c6fce9c21443b9909343f1391613b7_s390x",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel9@sha256:09708d69743cbc7981ffa823dbdc782b0fac0b577ad6cecc4b875dd712a0c6dc_s390x",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel9@sha256:46c6c393d217df1c645c06d0da7ac1e82defc4ee1d773b6e288c976cdfaf1f89_ppc64le",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel9@sha256:b7e423bf7fde922a1d8fe4adf6f5205fc4908881f496e6ebd05db0b5f890d35c_amd64",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel9@sha256:f3b25a4b791a6d75c2bb7fa156fa5796ca0ef7e3520c432cd1e0ee094b0b44ca_arm64",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel9@sha256:4df95769cab0fd8fdc88f79857a7ace2fd0183fdc7ace73db480aa9de0d2d0af_ppc64le",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel9@sha256:96b8cc9a32104c7262aabc79dc01489640378717cd75d33c0aaca165ff193b2e_s390x",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel9@sha256:a87ae94bb4eeaf8e00e5b60639ce8a74af2fa74d5312f1586db65ac2e7e3915e_arm64",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel9@sha256:ddd9d15f0962e166d5e2ca0797137a135f34c558a5a51ac85a173f245d763625_amd64",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel9@sha256:13348eb0e7ca8a4517becd8f6feae39f26bca07e47568699c153747568f89c3e_arm64",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel9@sha256:8b19c499ebb9feeb664ff3721bdc2170fd62a21cc9f5c84d9ff10cd0a71030e7_ppc64le",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel9@sha256:9933d9dfafd4c1085a58e305b187386b3ea3f751a483c811a81b7f3ffd31c738_s390x",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel9@sha256:fde967c5f4e625ad901ff3635f7a9cd0e9db64dfff9083618e3d793e21e8488f_amd64",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:627f071531fb4da783c4f231fa3afd26d9eb9a56dc51b5d55a742f167b36d2f9_ppc64le",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:65049e2c8984f2f08c05838a407b4641285c956c440f700225bdbf67cf03c8bc_arm64",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:8596b4e5df8abf7771e6da9920d25186facd7bef39dc553c1e479b3ef1a9e8cd_s390x",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:c7fc5b1653c5d8175d480481d44e797aa843a10a4eae753a7eb70a5871540ed8_amd64",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/console-plugin-rhel9@sha256:1bbc1efa6478d85935146b7c50217204094e0c07a3d096f353567cc4aec7b7af_amd64",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/console-plugin-rhel9@sha256:26192e97d753181a1b7cb7baf0ec130c1592151c9a46c1940c42e80267df2486_s390x",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/console-plugin-rhel9@sha256:c01ac978ee2e58f675e45b39d13a643ceef4fb89cef6438a5be4a2bc3a1c6efa_ppc64le",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/console-plugin-rhel9@sha256:e0d9a33cca85c936439e04862ecec780554cf34e9c6df7f62497595d61e8c1e8_arm64",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:247a54db35e184702d9c1d6f83cd9e3669f8aae48bd0eeaecdbeeda6176c525f_amd64",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/gitops-rhel9-operator@sha256:6467e7ef9afeb8c45da2620221257751ae2c0f20019cad986e3bda5176287321_arm64",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/gitops-rhel9-operator@sha256:6aaaf3f027d5d673b70a1a5d4276416e3525e6249947b4a631df4c63856acd63_amd64",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/gitops-rhel9-operator@sha256:6c2e60047d0f6015418fc06e04bc6a02ada0640f27d10e09a2d3f21eba3bef6d_s390x",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/gitops-rhel9-operator@sha256:aec32824bc31c868f8b40612f4e99ab9953458a4b550bb0323ff4173ebd21f53_ppc64le",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/gitops-rhel9@sha256:07f30eba3f93a9e1605c27aeab76f195829443b9d454a2e8d2d5938806f165b1_amd64",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/gitops-rhel9@sha256:122e412e01acd1a6a67b07364e280545b356488de9e1874cbff0a2a72a958525_s390x",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/gitops-rhel9@sha256:7548ae87b7645ab79259a3e6603b471432a322d2a46d233f653c25cb8755a33d_ppc64le",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/gitops-rhel9@sha256:b406493693fdae121f128e9a18b4139a05f5e682fd8dacfa3e8fe7c6b35bcfbd_arm64",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/must-gather-rhel9@sha256:81de8e9723ec5819ecf40a8abac1218d3ca23f65db824996e697c3f5eb1c88ce_ppc64le",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/must-gather-rhel9@sha256:9bbdc7456e80ff7adc21ee179f2ad678131b700a30f467e9cae98f52fcc1a866_arm64",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/must-gather-rhel9@sha256:a6596a7bcceb01a55db1f2ad9894ec8550cf4a6d9fc5976d9082684863f0ff8d_amd64",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/must-gather-rhel9@sha256:ae636a937c42bce533a4e12929e0fc92f175f89be10e2857e2ce1287e1930bf1_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-27137"
},
{
"category": "external",
"summary": "RHBZ#2445345",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2445345"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-27137",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27137"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-27137",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27137"
},
{
"category": "external",
"summary": "https://go.dev/cl/752182",
"url": "https://go.dev/cl/752182"
},
{
"category": "external",
"summary": "https://go.dev/issue/77952",
"url": "https://go.dev/issue/77952"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk",
"url": "https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4599",
"url": "https://pkg.go.dev/vuln/GO-2026-4599"
}
],
"release_date": "2026-03-06T21:28:13.748000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-22T12:35:53+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/dex-rhel9@sha256:0882d236e8887a0467687195620419c72c5064ca518b9f54d7a30dadbcc49726_s390x",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/dex-rhel9@sha256:a3996e99a9ebe783373b78f352e5c77970e66546e888bce3bc9a02594bd37ad3_ppc64le",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/dex-rhel9@sha256:b61518708f23cf947a447823c7747167259faddbd8032a3c8596c8fa9d5b84af_amd64",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/dex-rhel9@sha256:feaaf37afd8ccab9460c39606164fbc93cdc4d60eab68e5809465e9aa484e0bf_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:9699"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel9@sha256:1a8c1669907826bf3f711845c6d4833b2e2c5c4807bada9797b9b0d6397955b7_arm64",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel9@sha256:1eb9a401a5e48ee2536b8d869b23ec28e10452d37160740db3a09dd7f2c9e357_ppc64le",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel9@sha256:1f376f53aa7d80bf48b61314480596b4837a9c80a0bbbefb428dc24ad74a6126_amd64",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel9@sha256:322f13074a5f64ec486e52416112a4ce63c6fce9c21443b9909343f1391613b7_s390x",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel9@sha256:09708d69743cbc7981ffa823dbdc782b0fac0b577ad6cecc4b875dd712a0c6dc_s390x",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel9@sha256:46c6c393d217df1c645c06d0da7ac1e82defc4ee1d773b6e288c976cdfaf1f89_ppc64le",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel9@sha256:b7e423bf7fde922a1d8fe4adf6f5205fc4908881f496e6ebd05db0b5f890d35c_amd64",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel9@sha256:f3b25a4b791a6d75c2bb7fa156fa5796ca0ef7e3520c432cd1e0ee094b0b44ca_arm64",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel9@sha256:4df95769cab0fd8fdc88f79857a7ace2fd0183fdc7ace73db480aa9de0d2d0af_ppc64le",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel9@sha256:96b8cc9a32104c7262aabc79dc01489640378717cd75d33c0aaca165ff193b2e_s390x",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel9@sha256:a87ae94bb4eeaf8e00e5b60639ce8a74af2fa74d5312f1586db65ac2e7e3915e_arm64",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel9@sha256:ddd9d15f0962e166d5e2ca0797137a135f34c558a5a51ac85a173f245d763625_amd64",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel9@sha256:13348eb0e7ca8a4517becd8f6feae39f26bca07e47568699c153747568f89c3e_arm64",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel9@sha256:8b19c499ebb9feeb664ff3721bdc2170fd62a21cc9f5c84d9ff10cd0a71030e7_ppc64le",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel9@sha256:9933d9dfafd4c1085a58e305b187386b3ea3f751a483c811a81b7f3ffd31c738_s390x",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel9@sha256:fde967c5f4e625ad901ff3635f7a9cd0e9db64dfff9083618e3d793e21e8488f_amd64",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:627f071531fb4da783c4f231fa3afd26d9eb9a56dc51b5d55a742f167b36d2f9_ppc64le",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:65049e2c8984f2f08c05838a407b4641285c956c440f700225bdbf67cf03c8bc_arm64",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:8596b4e5df8abf7771e6da9920d25186facd7bef39dc553c1e479b3ef1a9e8cd_s390x",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:c7fc5b1653c5d8175d480481d44e797aa843a10a4eae753a7eb70a5871540ed8_amd64",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/console-plugin-rhel9@sha256:1bbc1efa6478d85935146b7c50217204094e0c07a3d096f353567cc4aec7b7af_amd64",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/console-plugin-rhel9@sha256:26192e97d753181a1b7cb7baf0ec130c1592151c9a46c1940c42e80267df2486_s390x",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/console-plugin-rhel9@sha256:c01ac978ee2e58f675e45b39d13a643ceef4fb89cef6438a5be4a2bc3a1c6efa_ppc64le",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/console-plugin-rhel9@sha256:e0d9a33cca85c936439e04862ecec780554cf34e9c6df7f62497595d61e8c1e8_arm64",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/dex-rhel9@sha256:0882d236e8887a0467687195620419c72c5064ca518b9f54d7a30dadbcc49726_s390x",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/dex-rhel9@sha256:a3996e99a9ebe783373b78f352e5c77970e66546e888bce3bc9a02594bd37ad3_ppc64le",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/dex-rhel9@sha256:b61518708f23cf947a447823c7747167259faddbd8032a3c8596c8fa9d5b84af_amd64",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/dex-rhel9@sha256:feaaf37afd8ccab9460c39606164fbc93cdc4d60eab68e5809465e9aa484e0bf_arm64",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:247a54db35e184702d9c1d6f83cd9e3669f8aae48bd0eeaecdbeeda6176c525f_amd64",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/gitops-rhel9-operator@sha256:6467e7ef9afeb8c45da2620221257751ae2c0f20019cad986e3bda5176287321_arm64",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/gitops-rhel9-operator@sha256:6aaaf3f027d5d673b70a1a5d4276416e3525e6249947b4a631df4c63856acd63_amd64",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/gitops-rhel9-operator@sha256:6c2e60047d0f6015418fc06e04bc6a02ada0640f27d10e09a2d3f21eba3bef6d_s390x",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/gitops-rhel9-operator@sha256:aec32824bc31c868f8b40612f4e99ab9953458a4b550bb0323ff4173ebd21f53_ppc64le",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/gitops-rhel9@sha256:07f30eba3f93a9e1605c27aeab76f195829443b9d454a2e8d2d5938806f165b1_amd64",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/gitops-rhel9@sha256:122e412e01acd1a6a67b07364e280545b356488de9e1874cbff0a2a72a958525_s390x",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/gitops-rhel9@sha256:7548ae87b7645ab79259a3e6603b471432a322d2a46d233f653c25cb8755a33d_ppc64le",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/gitops-rhel9@sha256:b406493693fdae121f128e9a18b4139a05f5e682fd8dacfa3e8fe7c6b35bcfbd_arm64",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/must-gather-rhel9@sha256:81de8e9723ec5819ecf40a8abac1218d3ca23f65db824996e697c3f5eb1c88ce_ppc64le",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/must-gather-rhel9@sha256:9bbdc7456e80ff7adc21ee179f2ad678131b700a30f467e9cae98f52fcc1a866_arm64",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/must-gather-rhel9@sha256:a6596a7bcceb01a55db1f2ad9894ec8550cf4a6d9fc5976d9082684863f0ff8d_amd64",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/must-gather-rhel9@sha256:ae636a937c42bce533a4e12929e0fc92f175f89be10e2857e2ce1287e1930bf1_s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel9@sha256:1a8c1669907826bf3f711845c6d4833b2e2c5c4807bada9797b9b0d6397955b7_arm64",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel9@sha256:1eb9a401a5e48ee2536b8d869b23ec28e10452d37160740db3a09dd7f2c9e357_ppc64le",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel9@sha256:1f376f53aa7d80bf48b61314480596b4837a9c80a0bbbefb428dc24ad74a6126_amd64",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel9@sha256:322f13074a5f64ec486e52416112a4ce63c6fce9c21443b9909343f1391613b7_s390x",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel9@sha256:09708d69743cbc7981ffa823dbdc782b0fac0b577ad6cecc4b875dd712a0c6dc_s390x",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel9@sha256:46c6c393d217df1c645c06d0da7ac1e82defc4ee1d773b6e288c976cdfaf1f89_ppc64le",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel9@sha256:b7e423bf7fde922a1d8fe4adf6f5205fc4908881f496e6ebd05db0b5f890d35c_amd64",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel9@sha256:f3b25a4b791a6d75c2bb7fa156fa5796ca0ef7e3520c432cd1e0ee094b0b44ca_arm64",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel9@sha256:4df95769cab0fd8fdc88f79857a7ace2fd0183fdc7ace73db480aa9de0d2d0af_ppc64le",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel9@sha256:96b8cc9a32104c7262aabc79dc01489640378717cd75d33c0aaca165ff193b2e_s390x",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel9@sha256:a87ae94bb4eeaf8e00e5b60639ce8a74af2fa74d5312f1586db65ac2e7e3915e_arm64",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel9@sha256:ddd9d15f0962e166d5e2ca0797137a135f34c558a5a51ac85a173f245d763625_amd64",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel9@sha256:13348eb0e7ca8a4517becd8f6feae39f26bca07e47568699c153747568f89c3e_arm64",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel9@sha256:8b19c499ebb9feeb664ff3721bdc2170fd62a21cc9f5c84d9ff10cd0a71030e7_ppc64le",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel9@sha256:9933d9dfafd4c1085a58e305b187386b3ea3f751a483c811a81b7f3ffd31c738_s390x",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel9@sha256:fde967c5f4e625ad901ff3635f7a9cd0e9db64dfff9083618e3d793e21e8488f_amd64",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:627f071531fb4da783c4f231fa3afd26d9eb9a56dc51b5d55a742f167b36d2f9_ppc64le",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:65049e2c8984f2f08c05838a407b4641285c956c440f700225bdbf67cf03c8bc_arm64",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:8596b4e5df8abf7771e6da9920d25186facd7bef39dc553c1e479b3ef1a9e8cd_s390x",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:c7fc5b1653c5d8175d480481d44e797aa843a10a4eae753a7eb70a5871540ed8_amd64",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/console-plugin-rhel9@sha256:1bbc1efa6478d85935146b7c50217204094e0c07a3d096f353567cc4aec7b7af_amd64",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/console-plugin-rhel9@sha256:26192e97d753181a1b7cb7baf0ec130c1592151c9a46c1940c42e80267df2486_s390x",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/console-plugin-rhel9@sha256:c01ac978ee2e58f675e45b39d13a643ceef4fb89cef6438a5be4a2bc3a1c6efa_ppc64le",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/console-plugin-rhel9@sha256:e0d9a33cca85c936439e04862ecec780554cf34e9c6df7f62497595d61e8c1e8_arm64",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/dex-rhel9@sha256:0882d236e8887a0467687195620419c72c5064ca518b9f54d7a30dadbcc49726_s390x",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/dex-rhel9@sha256:a3996e99a9ebe783373b78f352e5c77970e66546e888bce3bc9a02594bd37ad3_ppc64le",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/dex-rhel9@sha256:b61518708f23cf947a447823c7747167259faddbd8032a3c8596c8fa9d5b84af_amd64",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/dex-rhel9@sha256:feaaf37afd8ccab9460c39606164fbc93cdc4d60eab68e5809465e9aa484e0bf_arm64",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:247a54db35e184702d9c1d6f83cd9e3669f8aae48bd0eeaecdbeeda6176c525f_amd64",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/gitops-rhel9-operator@sha256:6467e7ef9afeb8c45da2620221257751ae2c0f20019cad986e3bda5176287321_arm64",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/gitops-rhel9-operator@sha256:6aaaf3f027d5d673b70a1a5d4276416e3525e6249947b4a631df4c63856acd63_amd64",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/gitops-rhel9-operator@sha256:6c2e60047d0f6015418fc06e04bc6a02ada0640f27d10e09a2d3f21eba3bef6d_s390x",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/gitops-rhel9-operator@sha256:aec32824bc31c868f8b40612f4e99ab9953458a4b550bb0323ff4173ebd21f53_ppc64le",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/gitops-rhel9@sha256:07f30eba3f93a9e1605c27aeab76f195829443b9d454a2e8d2d5938806f165b1_amd64",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/gitops-rhel9@sha256:122e412e01acd1a6a67b07364e280545b356488de9e1874cbff0a2a72a958525_s390x",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/gitops-rhel9@sha256:7548ae87b7645ab79259a3e6603b471432a322d2a46d233f653c25cb8755a33d_ppc64le",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/gitops-rhel9@sha256:b406493693fdae121f128e9a18b4139a05f5e682fd8dacfa3e8fe7c6b35bcfbd_arm64",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/must-gather-rhel9@sha256:81de8e9723ec5819ecf40a8abac1218d3ca23f65db824996e697c3f5eb1c88ce_ppc64le",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/must-gather-rhel9@sha256:9bbdc7456e80ff7adc21ee179f2ad678131b700a30f467e9cae98f52fcc1a866_arm64",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/must-gather-rhel9@sha256:a6596a7bcceb01a55db1f2ad9894ec8550cf4a6d9fc5976d9082684863f0ff8d_amd64",
"Red Hat OpenShift GitOps 1.2:registry.redhat.io/openshift-gitops-1/must-gather-rhel9@sha256:ae636a937c42bce533a4e12929e0fc92f175f89be10e2857e2ce1287e1930bf1_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: Incorrect enforcement of email constraints in crypto/x509"
}
]
}
RHSA-2026:8167
Vulnerability from csaf_redhat - Published: 2026-04-14 18:58 - Updated: 2026-04-23 06:09A flaw was found in the net/url package in the Go standard library. The package does not enforce a limit on the number of unique query parameters it parses. A Go application using the net/http.Request.ParseForm method will try to process all parameters provided in the request. A specially crafted HTTP request containing a massive number of query parameters will cause the application to consume an excessive amount of memory, eventually causing the application to crash or become unresponsive, resulting in a denial of service.
A flaw was found in golang. A remote attacker could exploit this vulnerability by providing a specially crafted certificate during the error string construction process within the `HostnameError.Error()` function. This flaw, caused by unbounded string concatenation, leads to excessive resource consumption. Successful exploitation can result in a denial of service (DoS) for the affected system.
A flaw was found in the crypto/tls component. This vulnerability occurs during Transport Layer Security (TLS) session resumption when certificate authority (CA) settings are modified between the initial and resumed handshakes. An attacker could exploit this to bypass certificate validation, allowing a client or server to establish a connection that should have been rejected. This could lead to an authentication bypass under specific conditions.
The Go standard library function net/url.Parse insufficiently validated the host/authority component and accepted some invalid URLs by effectively treating garbage before an IP-literal as ignorable. The function should have rejected this as invalid.
A certificate validation flaw has been discovered in the golang crypto/x509 module. When verifying a certificate chain which contains a certificate containing multiple email address constraints which share common local portions but different domain portions, these constraints will not be properly applied, and only the last constraint will be considered.
| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat Web Terminal Operator 1.15.0 has been released.",
"title": "Topic"
},
{
"category": "general",
"text": "The Web Terminal provides a way to access a fully in-browser terminal emulator within the OpenShift Console. Command-line tools for interacting with the OpenShift cluster are pre-installed.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:8167",
"url": "https://access.redhat.com/errata/RHSA-2026:8167"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61726",
"url": "https://access.redhat.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61729",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-68121",
"url": "https://access.redhat.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-25679",
"url": "https://access.redhat.com/security/cve/CVE-2026-25679"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-27137",
"url": "https://access.redhat.com/security/cve/CVE-2026-27137"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "external",
"summary": "https://redhat.atlassian.net/browse/WTO-368",
"url": "https://redhat.atlassian.net/browse/WTO-368"
},
{
"category": "external",
"summary": "https://redhat.atlassian.net/browse/WTO-373",
"url": "https://redhat.atlassian.net/browse/WTO-373"
},
{
"category": "external",
"summary": "https://redhat.atlassian.net/browse/WTO-377",
"url": "https://redhat.atlassian.net/browse/WTO-377"
},
{
"category": "external",
"summary": "https://redhat.atlassian.net/browse/WTO-383",
"url": "https://redhat.atlassian.net/browse/WTO-383"
},
{
"category": "external",
"summary": "https://redhat.atlassian.net/browse/WTO-390",
"url": "https://redhat.atlassian.net/browse/WTO-390"
},
{
"category": "external",
"summary": "https://redhat.atlassian.net/browse/WTO-393",
"url": "https://redhat.atlassian.net/browse/WTO-393"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_8167.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Web Terminal Operator 1.15.0 release.",
"tracking": {
"current_release_date": "2026-04-23T06:09:14+00:00",
"generator": {
"date": "2026-04-23T06:09:14+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.5"
}
},
"id": "RHSA-2026:8167",
"initial_release_date": "2026-04-14T18:58:52+00:00",
"revision_history": [
{
"date": "2026-04-14T18:58:52+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-04-14T18:58:58+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-23T06:09:14+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Web Terminal 1.15",
"product": {
"name": "Red Hat Web Terminal 1.15",
"product_id": "Red Hat Web Terminal 1.15",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:webterminal:1.15::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat Web Terminal"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:1a4e4ddfdd6f353c67172dec6b6d5e3c07d3f67410d537066e2b0321b044698a_amd64",
"product": {
"name": "registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:1a4e4ddfdd6f353c67172dec6b6d5e3c07d3f67410d537066e2b0321b044698a_amd64",
"product_id": "registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:1a4e4ddfdd6f353c67172dec6b6d5e3c07d3f67410d537066e2b0321b044698a_amd64",
"product_identification_helper": {
"purl": "pkg:oci/web-terminal-exec-rhel9@sha256%3A1a4e4ddfdd6f353c67172dec6b6d5e3c07d3f67410d537066e2b0321b044698a?arch=amd64\u0026repository_url=registry.redhat.io/web-terminal\u0026tag=1775672762"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:a531c9a89a0ddf261241c353de8866f6609b535e3dbaf05bf3ff410234398d7b_amd64",
"product": {
"name": "registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:a531c9a89a0ddf261241c353de8866f6609b535e3dbaf05bf3ff410234398d7b_amd64",
"product_id": "registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:a531c9a89a0ddf261241c353de8866f6609b535e3dbaf05bf3ff410234398d7b_amd64",
"product_identification_helper": {
"purl": "pkg:oci/web-terminal-rhel9-operator@sha256%3Aa531c9a89a0ddf261241c353de8866f6609b535e3dbaf05bf3ff410234398d7b?arch=amd64\u0026repository_url=registry.redhat.io/web-terminal\u0026tag=1775672765"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:69bbe9115e6a686bf3efba029c4d27fe87a003745536db3a80abe7466398206d_amd64",
"product": {
"name": "registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:69bbe9115e6a686bf3efba029c4d27fe87a003745536db3a80abe7466398206d_amd64",
"product_id": "registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:69bbe9115e6a686bf3efba029c4d27fe87a003745536db3a80abe7466398206d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/web-terminal-operator-bundle@sha256%3A69bbe9115e6a686bf3efba029c4d27fe87a003745536db3a80abe7466398206d?arch=amd64\u0026repository_url=registry.redhat.io/web-terminal\u0026tag=1775672724"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:4c3d303dca13ac5383927d0c428b9418a6009e2b8ee686b1f246c94b783e02b0_amd64",
"product": {
"name": "registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:4c3d303dca13ac5383927d0c428b9418a6009e2b8ee686b1f246c94b783e02b0_amd64",
"product_id": "registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:4c3d303dca13ac5383927d0c428b9418a6009e2b8ee686b1f246c94b783e02b0_amd64",
"product_identification_helper": {
"purl": "pkg:oci/web-terminal-tooling-rhel9@sha256%3A4c3d303dca13ac5383927d0c428b9418a6009e2b8ee686b1f246c94b783e02b0?arch=amd64\u0026repository_url=registry.redhat.io/web-terminal\u0026tag=1775672831"
}
}
}
],
"category": "architecture",
"name": "amd64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:1a4e4ddfdd6f353c67172dec6b6d5e3c07d3f67410d537066e2b0321b044698a_amd64 as a component of Red Hat Web Terminal 1.15",
"product_id": "Red Hat Web Terminal 1.15:registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:1a4e4ddfdd6f353c67172dec6b6d5e3c07d3f67410d537066e2b0321b044698a_amd64"
},
"product_reference": "registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:1a4e4ddfdd6f353c67172dec6b6d5e3c07d3f67410d537066e2b0321b044698a_amd64",
"relates_to_product_reference": "Red Hat Web Terminal 1.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:69bbe9115e6a686bf3efba029c4d27fe87a003745536db3a80abe7466398206d_amd64 as a component of Red Hat Web Terminal 1.15",
"product_id": "Red Hat Web Terminal 1.15:registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:69bbe9115e6a686bf3efba029c4d27fe87a003745536db3a80abe7466398206d_amd64"
},
"product_reference": "registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:69bbe9115e6a686bf3efba029c4d27fe87a003745536db3a80abe7466398206d_amd64",
"relates_to_product_reference": "Red Hat Web Terminal 1.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:a531c9a89a0ddf261241c353de8866f6609b535e3dbaf05bf3ff410234398d7b_amd64 as a component of Red Hat Web Terminal 1.15",
"product_id": "Red Hat Web Terminal 1.15:registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:a531c9a89a0ddf261241c353de8866f6609b535e3dbaf05bf3ff410234398d7b_amd64"
},
"product_reference": "registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:a531c9a89a0ddf261241c353de8866f6609b535e3dbaf05bf3ff410234398d7b_amd64",
"relates_to_product_reference": "Red Hat Web Terminal 1.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:4c3d303dca13ac5383927d0c428b9418a6009e2b8ee686b1f246c94b783e02b0_amd64 as a component of Red Hat Web Terminal 1.15",
"product_id": "Red Hat Web Terminal 1.15:registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:4c3d303dca13ac5383927d0c428b9418a6009e2b8ee686b1f246c94b783e02b0_amd64"
},
"product_reference": "registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:4c3d303dca13ac5383927d0c428b9418a6009e2b8ee686b1f246c94b783e02b0_amd64",
"relates_to_product_reference": "Red Hat Web Terminal 1.15"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61726",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:42.791305+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Web Terminal 1.15:registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:69bbe9115e6a686bf3efba029c4d27fe87a003745536db3a80abe7466398206d_amd64",
"Red Hat Web Terminal 1.15:registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:4c3d303dca13ac5383927d0c428b9418a6009e2b8ee686b1f246c94b783e02b0_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434432"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the net/url package in the Go standard library. The package does not enforce a limit on the number of unique query parameters it parses. A Go application using the net/http.Request.ParseForm method will try to process all parameters provided in the request. A specially crafted HTTP request containing a massive number of query parameters will cause the application to consume an excessive amount of memory, eventually causing the application to crash or become unresponsive, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/url: Memory exhaustion in query parameter parsing in net/url",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker must be able to send a specially crafted HTTP request to an application parsing URL-encoded forms with net/url, specifically a request containing a large number of unique query parameters. The request will cause the application to consume an excessive amount of memory and eventually result in a denial of service, with no impact to confidentiality or integrity. Due to this reason, this vulnerability has been rated with an important severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Web Terminal 1.15:registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:1a4e4ddfdd6f353c67172dec6b6d5e3c07d3f67410d537066e2b0321b044698a_amd64",
"Red Hat Web Terminal 1.15:registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:a531c9a89a0ddf261241c353de8866f6609b535e3dbaf05bf3ff410234398d7b_amd64"
],
"known_not_affected": [
"Red Hat Web Terminal 1.15:registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:69bbe9115e6a686bf3efba029c4d27fe87a003745536db3a80abe7466398206d_amd64",
"Red Hat Web Terminal 1.15:registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:4c3d303dca13ac5383927d0c428b9418a6009e2b8ee686b1f246c94b783e02b0_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "RHBZ#2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"category": "external",
"summary": "https://go.dev/cl/736712",
"url": "https://go.dev/cl/736712"
},
{
"category": "external",
"summary": "https://go.dev/issue/77101",
"url": "https://go.dev/issue/77101"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4341",
"url": "https://pkg.go.dev/vuln/GO-2026-4341"
}
],
"release_date": "2026-01-28T19:30:31.215000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-14T18:58:52+00:00",
"details": "To start using the Web Terminal Operator, install the Web Terminal Operator from OpenShift OperatorHub on OpenShift Container Platform 4.20 or higher.",
"product_ids": [
"Red Hat Web Terminal 1.15:registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:1a4e4ddfdd6f353c67172dec6b6d5e3c07d3f67410d537066e2b0321b044698a_amd64",
"Red Hat Web Terminal 1.15:registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:a531c9a89a0ddf261241c353de8866f6609b535e3dbaf05bf3ff410234398d7b_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8167"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"Red Hat Web Terminal 1.15:registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:1a4e4ddfdd6f353c67172dec6b6d5e3c07d3f67410d537066e2b0321b044698a_amd64",
"Red Hat Web Terminal 1.15:registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:69bbe9115e6a686bf3efba029c4d27fe87a003745536db3a80abe7466398206d_amd64",
"Red Hat Web Terminal 1.15:registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:a531c9a89a0ddf261241c353de8866f6609b535e3dbaf05bf3ff410234398d7b_amd64",
"Red Hat Web Terminal 1.15:registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:4c3d303dca13ac5383927d0c428b9418a6009e2b8ee686b1f246c94b783e02b0_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Web Terminal 1.15:registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:1a4e4ddfdd6f353c67172dec6b6d5e3c07d3f67410d537066e2b0321b044698a_amd64",
"Red Hat Web Terminal 1.15:registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:69bbe9115e6a686bf3efba029c4d27fe87a003745536db3a80abe7466398206d_amd64",
"Red Hat Web Terminal 1.15:registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:a531c9a89a0ddf261241c353de8866f6609b535e3dbaf05bf3ff410234398d7b_amd64",
"Red Hat Web Terminal 1.15:registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:4c3d303dca13ac5383927d0c428b9418a6009e2b8ee686b1f246c94b783e02b0_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: net/url: Memory exhaustion in query parameter parsing in net/url"
},
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Web Terminal 1.15:registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:69bbe9115e6a686bf3efba029c4d27fe87a003745536db3a80abe7466398206d_amd64",
"Red Hat Web Terminal 1.15:registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:a531c9a89a0ddf261241c353de8866f6609b535e3dbaf05bf3ff410234398d7b_amd64",
"Red Hat Web Terminal 1.15:registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:4c3d303dca13ac5383927d0c428b9418a6009e2b8ee686b1f246c94b783e02b0_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang. A remote attacker could exploit this vulnerability by providing a specially crafted certificate during the error string construction process within the `HostnameError.Error()` function. This flaw, caused by unbounded string concatenation, leads to excessive resource consumption. Successful exploitation can result in a denial of service (DoS) for the affected system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Web Terminal 1.15:registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:1a4e4ddfdd6f353c67172dec6b6d5e3c07d3f67410d537066e2b0321b044698a_amd64"
],
"known_not_affected": [
"Red Hat Web Terminal 1.15:registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:69bbe9115e6a686bf3efba029c4d27fe87a003745536db3a80abe7466398206d_amd64",
"Red Hat Web Terminal 1.15:registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:a531c9a89a0ddf261241c353de8866f6609b535e3dbaf05bf3ff410234398d7b_amd64",
"Red Hat Web Terminal 1.15:registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:4c3d303dca13ac5383927d0c428b9418a6009e2b8ee686b1f246c94b783e02b0_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-14T18:58:52+00:00",
"details": "To start using the Web Terminal Operator, install the Web Terminal Operator from OpenShift OperatorHub on OpenShift Container Platform 4.20 or higher.",
"product_ids": [
"Red Hat Web Terminal 1.15:registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:1a4e4ddfdd6f353c67172dec6b6d5e3c07d3f67410d537066e2b0321b044698a_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8167"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Web Terminal 1.15:registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:1a4e4ddfdd6f353c67172dec6b6d5e3c07d3f67410d537066e2b0321b044698a_amd64",
"Red Hat Web Terminal 1.15:registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:69bbe9115e6a686bf3efba029c4d27fe87a003745536db3a80abe7466398206d_amd64",
"Red Hat Web Terminal 1.15:registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:a531c9a89a0ddf261241c353de8866f6609b535e3dbaf05bf3ff410234398d7b_amd64",
"Red Hat Web Terminal 1.15:registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:4c3d303dca13ac5383927d0c428b9418a6009e2b8ee686b1f246c94b783e02b0_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
},
{
"cve": "CVE-2025-68121",
"discovery_date": "2026-02-05T18:01:30.086058+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Web Terminal 1.15:registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:69bbe9115e6a686bf3efba029c4d27fe87a003745536db3a80abe7466398206d_amd64",
"Red Hat Web Terminal 1.15:registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:a531c9a89a0ddf261241c353de8866f6609b535e3dbaf05bf3ff410234398d7b_amd64",
"Red Hat Web Terminal 1.15:registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:4c3d303dca13ac5383927d0c428b9418a6009e2b8ee686b1f246c94b783e02b0_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2437111"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the crypto/tls component. This vulnerability occurs during Transport Layer Security (TLS) session resumption when certificate authority (CA) settings are modified between the initial and resumed handshakes. An attacker could exploit this to bypass certificate validation, allowing a client or server to establish a connection that should have been rejected. This could lead to an authentication bypass under specific conditions.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/tls: crypto/tls: Incorrect certificate validation during TLS session resumption",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This is a moderate flaw because it only occurs under specific conditions, such as TLS session resumption with runtime changes to certificate authority settings. Exploitation is not straightforward and requires a controlled setup. The impact is limited to certificate validation within the same component and does not affect system availability.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Web Terminal 1.15:registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:1a4e4ddfdd6f353c67172dec6b6d5e3c07d3f67410d537066e2b0321b044698a_amd64"
],
"known_not_affected": [
"Red Hat Web Terminal 1.15:registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:69bbe9115e6a686bf3efba029c4d27fe87a003745536db3a80abe7466398206d_amd64",
"Red Hat Web Terminal 1.15:registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:a531c9a89a0ddf261241c353de8866f6609b535e3dbaf05bf3ff410234398d7b_amd64",
"Red Hat Web Terminal 1.15:registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:4c3d303dca13ac5383927d0c428b9418a6009e2b8ee686b1f246c94b783e02b0_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "RHBZ#2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"category": "external",
"summary": "https://go.dev/cl/737700",
"url": "https://go.dev/cl/737700"
},
{
"category": "external",
"summary": "https://go.dev/issue/77217",
"url": "https://go.dev/issue/77217"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk",
"url": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4337",
"url": "https://pkg.go.dev/vuln/GO-2026-4337"
}
],
"release_date": "2026-02-05T17:48:44.141000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-14T18:58:52+00:00",
"details": "To start using the Web Terminal Operator, install the Web Terminal Operator from OpenShift OperatorHub on OpenShift Container Platform 4.20 or higher.",
"product_ids": [
"Red Hat Web Terminal 1.15:registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:1a4e4ddfdd6f353c67172dec6b6d5e3c07d3f67410d537066e2b0321b044698a_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8167"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Web Terminal 1.15:registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:1a4e4ddfdd6f353c67172dec6b6d5e3c07d3f67410d537066e2b0321b044698a_amd64",
"Red Hat Web Terminal 1.15:registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:69bbe9115e6a686bf3efba029c4d27fe87a003745536db3a80abe7466398206d_amd64",
"Red Hat Web Terminal 1.15:registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:a531c9a89a0ddf261241c353de8866f6609b535e3dbaf05bf3ff410234398d7b_amd64",
"Red Hat Web Terminal 1.15:registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:4c3d303dca13ac5383927d0c428b9418a6009e2b8ee686b1f246c94b783e02b0_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "crypto/tls: crypto/tls: Incorrect certificate validation during TLS session resumption"
},
{
"cve": "CVE-2026-25679",
"cwe": {
"id": "CWE-1286",
"name": "Improper Validation of Syntactic Correctness of Input"
},
"discovery_date": "2026-03-06T22:02:11.567841+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Web Terminal 1.15:registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:69bbe9115e6a686bf3efba029c4d27fe87a003745536db3a80abe7466398206d_amd64",
"Red Hat Web Terminal 1.15:registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:a531c9a89a0ddf261241c353de8866f6609b535e3dbaf05bf3ff410234398d7b_amd64",
"Red Hat Web Terminal 1.15:registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:4c3d303dca13ac5383927d0c428b9418a6009e2b8ee686b1f246c94b783e02b0_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2445356"
}
],
"notes": [
{
"category": "description",
"text": "The Go standard library function net/url.Parse insufficiently validated the host/authority component and accepted some invalid URLs by effectively treating garbage before an IP-literal as ignorable. The function should have rejected this as invalid.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "net/url: Incorrect parsing of IPv6 host literals in net/url",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Web Terminal 1.15:registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:1a4e4ddfdd6f353c67172dec6b6d5e3c07d3f67410d537066e2b0321b044698a_amd64"
],
"known_not_affected": [
"Red Hat Web Terminal 1.15:registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:69bbe9115e6a686bf3efba029c4d27fe87a003745536db3a80abe7466398206d_amd64",
"Red Hat Web Terminal 1.15:registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:a531c9a89a0ddf261241c353de8866f6609b535e3dbaf05bf3ff410234398d7b_amd64",
"Red Hat Web Terminal 1.15:registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:4c3d303dca13ac5383927d0c428b9418a6009e2b8ee686b1f246c94b783e02b0_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-25679"
},
{
"category": "external",
"summary": "RHBZ#2445356",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2445356"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-25679",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25679"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-25679",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25679"
},
{
"category": "external",
"summary": "https://go.dev/cl/752180",
"url": "https://go.dev/cl/752180"
},
{
"category": "external",
"summary": "https://go.dev/issue/77578",
"url": "https://go.dev/issue/77578"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk",
"url": "https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4601",
"url": "https://pkg.go.dev/vuln/GO-2026-4601"
}
],
"release_date": "2026-03-06T21:28:14.211000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-14T18:58:52+00:00",
"details": "To start using the Web Terminal Operator, install the Web Terminal Operator from OpenShift OperatorHub on OpenShift Container Platform 4.20 or higher.",
"product_ids": [
"Red Hat Web Terminal 1.15:registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:1a4e4ddfdd6f353c67172dec6b6d5e3c07d3f67410d537066e2b0321b044698a_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8167"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Web Terminal 1.15:registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:1a4e4ddfdd6f353c67172dec6b6d5e3c07d3f67410d537066e2b0321b044698a_amd64",
"Red Hat Web Terminal 1.15:registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:69bbe9115e6a686bf3efba029c4d27fe87a003745536db3a80abe7466398206d_amd64",
"Red Hat Web Terminal 1.15:registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:a531c9a89a0ddf261241c353de8866f6609b535e3dbaf05bf3ff410234398d7b_amd64",
"Red Hat Web Terminal 1.15:registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:4c3d303dca13ac5383927d0c428b9418a6009e2b8ee686b1f246c94b783e02b0_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Web Terminal 1.15:registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:1a4e4ddfdd6f353c67172dec6b6d5e3c07d3f67410d537066e2b0321b044698a_amd64",
"Red Hat Web Terminal 1.15:registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:69bbe9115e6a686bf3efba029c4d27fe87a003745536db3a80abe7466398206d_amd64",
"Red Hat Web Terminal 1.15:registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:a531c9a89a0ddf261241c353de8866f6609b535e3dbaf05bf3ff410234398d7b_amd64",
"Red Hat Web Terminal 1.15:registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:4c3d303dca13ac5383927d0c428b9418a6009e2b8ee686b1f246c94b783e02b0_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "net/url: Incorrect parsing of IPv6 host literals in net/url"
},
{
"cve": "CVE-2026-27137",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"discovery_date": "2026-03-06T22:01:38.859733+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Web Terminal 1.15:registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:69bbe9115e6a686bf3efba029c4d27fe87a003745536db3a80abe7466398206d_amd64",
"Red Hat Web Terminal 1.15:registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:a531c9a89a0ddf261241c353de8866f6609b535e3dbaf05bf3ff410234398d7b_amd64",
"Red Hat Web Terminal 1.15:registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:4c3d303dca13ac5383927d0c428b9418a6009e2b8ee686b1f246c94b783e02b0_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2445345"
}
],
"notes": [
{
"category": "description",
"text": "A certificate validation flaw has been discovered in the golang crypto/x509 module. When verifying a certificate chain which contains a certificate containing multiple email address constraints which share common local portions but different domain portions, these constraints will not be properly applied, and only the last constraint will be considered.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: Incorrect enforcement of email constraints in crypto/x509",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Web Terminal 1.15:registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:1a4e4ddfdd6f353c67172dec6b6d5e3c07d3f67410d537066e2b0321b044698a_amd64"
],
"known_not_affected": [
"Red Hat Web Terminal 1.15:registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:69bbe9115e6a686bf3efba029c4d27fe87a003745536db3a80abe7466398206d_amd64",
"Red Hat Web Terminal 1.15:registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:a531c9a89a0ddf261241c353de8866f6609b535e3dbaf05bf3ff410234398d7b_amd64",
"Red Hat Web Terminal 1.15:registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:4c3d303dca13ac5383927d0c428b9418a6009e2b8ee686b1f246c94b783e02b0_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-27137"
},
{
"category": "external",
"summary": "RHBZ#2445345",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2445345"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-27137",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27137"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-27137",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27137"
},
{
"category": "external",
"summary": "https://go.dev/cl/752182",
"url": "https://go.dev/cl/752182"
},
{
"category": "external",
"summary": "https://go.dev/issue/77952",
"url": "https://go.dev/issue/77952"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk",
"url": "https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4599",
"url": "https://pkg.go.dev/vuln/GO-2026-4599"
}
],
"release_date": "2026-03-06T21:28:13.748000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-14T18:58:52+00:00",
"details": "To start using the Web Terminal Operator, install the Web Terminal Operator from OpenShift OperatorHub on OpenShift Container Platform 4.20 or higher.",
"product_ids": [
"Red Hat Web Terminal 1.15:registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:1a4e4ddfdd6f353c67172dec6b6d5e3c07d3f67410d537066e2b0321b044698a_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8167"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Web Terminal 1.15:registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:1a4e4ddfdd6f353c67172dec6b6d5e3c07d3f67410d537066e2b0321b044698a_amd64",
"Red Hat Web Terminal 1.15:registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:69bbe9115e6a686bf3efba029c4d27fe87a003745536db3a80abe7466398206d_amd64",
"Red Hat Web Terminal 1.15:registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:a531c9a89a0ddf261241c353de8866f6609b535e3dbaf05bf3ff410234398d7b_amd64",
"Red Hat Web Terminal 1.15:registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:4c3d303dca13ac5383927d0c428b9418a6009e2b8ee686b1f246c94b783e02b0_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Web Terminal 1.15:registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:1a4e4ddfdd6f353c67172dec6b6d5e3c07d3f67410d537066e2b0321b044698a_amd64",
"Red Hat Web Terminal 1.15:registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:69bbe9115e6a686bf3efba029c4d27fe87a003745536db3a80abe7466398206d_amd64",
"Red Hat Web Terminal 1.15:registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:a531c9a89a0ddf261241c353de8866f6609b535e3dbaf05bf3ff410234398d7b_amd64",
"Red Hat Web Terminal 1.15:registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:4c3d303dca13ac5383927d0c428b9418a6009e2b8ee686b1f246c94b783e02b0_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: Incorrect enforcement of email constraints in crypto/x509"
}
]
}
RHSA-2026:9872
Vulnerability from csaf_redhat - Published: 2026-04-22 21:03 - Updated: 2026-04-23 06:09The Go standard library function net/url.Parse insufficiently validated the host/authority component and accepted some invalid URLs by effectively treating garbage before an IP-literal as ignorable. The function should have rejected this as invalid.
A certificate validation flaw has been discovered in the golang crypto/x509 module. When verifying a certificate chain which contains a certificate containing multiple email address constraints which share common local portions but different domain portions, these constraints will not be properly applied, and only the last constraint will be considered.
A flaw was found in gRPC-Go, the Go language implementation of gRPC. This vulnerability, an authorization bypass, is caused by improper input validation of the HTTP/2 `:path` pseudo-header. A remote attacker can exploit this by sending raw HTTP/2 frames with a malformed `:path` that omits the mandatory leading slash. This allows the attacker to bypass defined security policies, potentially leading to unauthorized access to services or information disclosure.
| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "DevWorkspace Operator 0.40.1 has been released.",
"title": "Topic"
},
{
"category": "general",
"text": "The DevWorkspace Operator extends OpenShift to provide DevWorkspace support.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:9872",
"url": "https://access.redhat.com/errata/RHSA-2026:9872"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-25679",
"url": "https://access.redhat.com/security/cve/CVE-2026-25679"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-27137",
"url": "https://access.redhat.com/security/cve/CVE-2026-27137"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-33186",
"url": "https://access.redhat.com/security/cve/CVE-2026-33186"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "external",
"summary": "https://redhat.atlassian.net/browse/CRW-10592",
"url": "https://redhat.atlassian.net/browse/CRW-10592"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_9872.json"
}
],
"title": "Red Hat Security Advisory: DevWorkspace Operator 0.40.1 release.",
"tracking": {
"current_release_date": "2026-04-23T06:09:32+00:00",
"generator": {
"date": "2026-04-23T06:09:32+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.5"
}
},
"id": "RHSA-2026:9872",
"initial_release_date": "2026-04-22T21:03:38+00:00",
"revision_history": [
{
"date": "2026-04-22T21:03:38+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-04-22T21:03:45+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-23T06:09:32+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "DevWorkspace Operator 0.4",
"product": {
"name": "DevWorkspace Operator 0.4",
"product_id": "DevWorkspace Operator 0.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:devworkspace:0.40::el9"
}
}
}
],
"category": "product_family",
"name": "DevWorkspace Operator"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:9b0eea627cc3a2531a517df168818f40c92ebbf0a22ab56a22396600a2e59d04_amd64",
"product": {
"name": "registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:9b0eea627cc3a2531a517df168818f40c92ebbf0a22ab56a22396600a2e59d04_amd64",
"product_id": "registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:9b0eea627cc3a2531a517df168818f40c92ebbf0a22ab56a22396600a2e59d04_amd64",
"product_identification_helper": {
"purl": "pkg:oci/devworkspace-rhel9-operator@sha256%3A9b0eea627cc3a2531a517df168818f40c92ebbf0a22ab56a22396600a2e59d04?arch=amd64\u0026repository_url=registry.redhat.io/devworkspace\u0026tag=1776457293"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devworkspace/devworkspace-operator-bundle@sha256:991f3f31d41dc78e4aede374e9d6eaf82016da4528c3481af9936b4ab5ed30ca_amd64",
"product": {
"name": "registry.redhat.io/devworkspace/devworkspace-operator-bundle@sha256:991f3f31d41dc78e4aede374e9d6eaf82016da4528c3481af9936b4ab5ed30ca_amd64",
"product_id": "registry.redhat.io/devworkspace/devworkspace-operator-bundle@sha256:991f3f31d41dc78e4aede374e9d6eaf82016da4528c3481af9936b4ab5ed30ca_amd64",
"product_identification_helper": {
"purl": "pkg:oci/devworkspace-operator-bundle@sha256%3A991f3f31d41dc78e4aede374e9d6eaf82016da4528c3481af9936b4ab5ed30ca?arch=amd64\u0026repository_url=registry.redhat.io/devworkspace\u0026tag=1776559999"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:798b5bfebc9c5423a116c80732fa5e1dd01dc0b99795387bc81b95c98ffc42a6_amd64",
"product": {
"name": "registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:798b5bfebc9c5423a116c80732fa5e1dd01dc0b99795387bc81b95c98ffc42a6_amd64",
"product_id": "registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:798b5bfebc9c5423a116c80732fa5e1dd01dc0b99795387bc81b95c98ffc42a6_amd64",
"product_identification_helper": {
"purl": "pkg:oci/devworkspace-project-backup-rhel9@sha256%3A798b5bfebc9c5423a116c80732fa5e1dd01dc0b99795387bc81b95c98ffc42a6?arch=amd64\u0026repository_url=registry.redhat.io/devworkspace\u0026tag=1776462971"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:105988d31561736be604af59fa46b7b73003609546cf9b8bf5af97112c4dc750_amd64",
"product": {
"name": "registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:105988d31561736be604af59fa46b7b73003609546cf9b8bf5af97112c4dc750_amd64",
"product_id": "registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:105988d31561736be604af59fa46b7b73003609546cf9b8bf5af97112c4dc750_amd64",
"product_identification_helper": {
"purl": "pkg:oci/devworkspace-project-clone-rhel9@sha256%3A105988d31561736be604af59fa46b7b73003609546cf9b8bf5af97112c4dc750?arch=amd64\u0026repository_url=registry.redhat.io/devworkspace\u0026tag=1776457327"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:78b5652108b78dc1b8b3e5bd10026ec02954c41a73c59857ef8a75b2a59d3eca_s390x",
"product": {
"name": "registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:78b5652108b78dc1b8b3e5bd10026ec02954c41a73c59857ef8a75b2a59d3eca_s390x",
"product_id": "registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:78b5652108b78dc1b8b3e5bd10026ec02954c41a73c59857ef8a75b2a59d3eca_s390x",
"product_identification_helper": {
"purl": "pkg:oci/devworkspace-rhel9-operator@sha256%3A78b5652108b78dc1b8b3e5bd10026ec02954c41a73c59857ef8a75b2a59d3eca?arch=s390x\u0026repository_url=registry.redhat.io/devworkspace\u0026tag=1776457293"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:992b3afbd4630383951536fad36590328f5f4dd1ac438b24860e307bb21f6962_s390x",
"product": {
"name": "registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:992b3afbd4630383951536fad36590328f5f4dd1ac438b24860e307bb21f6962_s390x",
"product_id": "registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:992b3afbd4630383951536fad36590328f5f4dd1ac438b24860e307bb21f6962_s390x",
"product_identification_helper": {
"purl": "pkg:oci/devworkspace-project-backup-rhel9@sha256%3A992b3afbd4630383951536fad36590328f5f4dd1ac438b24860e307bb21f6962?arch=s390x\u0026repository_url=registry.redhat.io/devworkspace\u0026tag=1776462971"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:e14baa9938a2ce79f2f977e70c6a706620e7eb652191269b628f6164f4120f34_s390x",
"product": {
"name": "registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:e14baa9938a2ce79f2f977e70c6a706620e7eb652191269b628f6164f4120f34_s390x",
"product_id": "registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:e14baa9938a2ce79f2f977e70c6a706620e7eb652191269b628f6164f4120f34_s390x",
"product_identification_helper": {
"purl": "pkg:oci/devworkspace-project-clone-rhel9@sha256%3Ae14baa9938a2ce79f2f977e70c6a706620e7eb652191269b628f6164f4120f34?arch=s390x\u0026repository_url=registry.redhat.io/devworkspace\u0026tag=1776457327"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:7033e308ba08300838ce7b507434d3e2bed97e0b8919409079b5c9705cbf06e8_ppc64le",
"product": {
"name": "registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:7033e308ba08300838ce7b507434d3e2bed97e0b8919409079b5c9705cbf06e8_ppc64le",
"product_id": "registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:7033e308ba08300838ce7b507434d3e2bed97e0b8919409079b5c9705cbf06e8_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/devworkspace-rhel9-operator@sha256%3A7033e308ba08300838ce7b507434d3e2bed97e0b8919409079b5c9705cbf06e8?arch=ppc64le\u0026repository_url=registry.redhat.io/devworkspace\u0026tag=1776457293"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:0131e2bce3611a145b67ead5e4e0c0bb4206a996211510daffe7f0eeef42992b_ppc64le",
"product": {
"name": "registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:0131e2bce3611a145b67ead5e4e0c0bb4206a996211510daffe7f0eeef42992b_ppc64le",
"product_id": "registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:0131e2bce3611a145b67ead5e4e0c0bb4206a996211510daffe7f0eeef42992b_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/devworkspace-project-backup-rhel9@sha256%3A0131e2bce3611a145b67ead5e4e0c0bb4206a996211510daffe7f0eeef42992b?arch=ppc64le\u0026repository_url=registry.redhat.io/devworkspace\u0026tag=1776462971"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:03e66dbde56c09f627bc5eb60ebfd5127a43d313dff99e75e37039de8ab9430d_ppc64le",
"product": {
"name": "registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:03e66dbde56c09f627bc5eb60ebfd5127a43d313dff99e75e37039de8ab9430d_ppc64le",
"product_id": "registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:03e66dbde56c09f627bc5eb60ebfd5127a43d313dff99e75e37039de8ab9430d_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/devworkspace-project-clone-rhel9@sha256%3A03e66dbde56c09f627bc5eb60ebfd5127a43d313dff99e75e37039de8ab9430d?arch=ppc64le\u0026repository_url=registry.redhat.io/devworkspace\u0026tag=1776457327"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:a55f5c74e35c5fe7dbab7b6e1cd6ea824606ed8d198e903dad264baab40008e2_arm64",
"product": {
"name": "registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:a55f5c74e35c5fe7dbab7b6e1cd6ea824606ed8d198e903dad264baab40008e2_arm64",
"product_id": "registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:a55f5c74e35c5fe7dbab7b6e1cd6ea824606ed8d198e903dad264baab40008e2_arm64",
"product_identification_helper": {
"purl": "pkg:oci/devworkspace-rhel9-operator@sha256%3Aa55f5c74e35c5fe7dbab7b6e1cd6ea824606ed8d198e903dad264baab40008e2?arch=arm64\u0026repository_url=registry.redhat.io/devworkspace\u0026tag=1776457293"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:9fe2f1443f73cc296a9f50aba782c5b6aabae4a2adbba754f4346a395bd8bc09_arm64",
"product": {
"name": "registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:9fe2f1443f73cc296a9f50aba782c5b6aabae4a2adbba754f4346a395bd8bc09_arm64",
"product_id": "registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:9fe2f1443f73cc296a9f50aba782c5b6aabae4a2adbba754f4346a395bd8bc09_arm64",
"product_identification_helper": {
"purl": "pkg:oci/devworkspace-project-backup-rhel9@sha256%3A9fe2f1443f73cc296a9f50aba782c5b6aabae4a2adbba754f4346a395bd8bc09?arch=arm64\u0026repository_url=registry.redhat.io/devworkspace\u0026tag=1776462971"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:053d1f1ba2f47f45379e4630d3cdcb734915e538f2500477108e2fb9f28b0596_arm64",
"product": {
"name": "registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:053d1f1ba2f47f45379e4630d3cdcb734915e538f2500477108e2fb9f28b0596_arm64",
"product_id": "registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:053d1f1ba2f47f45379e4630d3cdcb734915e538f2500477108e2fb9f28b0596_arm64",
"product_identification_helper": {
"purl": "pkg:oci/devworkspace-project-clone-rhel9@sha256%3A053d1f1ba2f47f45379e4630d3cdcb734915e538f2500477108e2fb9f28b0596?arch=arm64\u0026repository_url=registry.redhat.io/devworkspace\u0026tag=1776457327"
}
}
}
],
"category": "architecture",
"name": "arm64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devworkspace/devworkspace-operator-bundle@sha256:991f3f31d41dc78e4aede374e9d6eaf82016da4528c3481af9936b4ab5ed30ca_amd64 as a component of DevWorkspace Operator 0.4",
"product_id": "DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-operator-bundle@sha256:991f3f31d41dc78e4aede374e9d6eaf82016da4528c3481af9936b4ab5ed30ca_amd64"
},
"product_reference": "registry.redhat.io/devworkspace/devworkspace-operator-bundle@sha256:991f3f31d41dc78e4aede374e9d6eaf82016da4528c3481af9936b4ab5ed30ca_amd64",
"relates_to_product_reference": "DevWorkspace Operator 0.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:0131e2bce3611a145b67ead5e4e0c0bb4206a996211510daffe7f0eeef42992b_ppc64le as a component of DevWorkspace Operator 0.4",
"product_id": "DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:0131e2bce3611a145b67ead5e4e0c0bb4206a996211510daffe7f0eeef42992b_ppc64le"
},
"product_reference": "registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:0131e2bce3611a145b67ead5e4e0c0bb4206a996211510daffe7f0eeef42992b_ppc64le",
"relates_to_product_reference": "DevWorkspace Operator 0.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:798b5bfebc9c5423a116c80732fa5e1dd01dc0b99795387bc81b95c98ffc42a6_amd64 as a component of DevWorkspace Operator 0.4",
"product_id": "DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:798b5bfebc9c5423a116c80732fa5e1dd01dc0b99795387bc81b95c98ffc42a6_amd64"
},
"product_reference": "registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:798b5bfebc9c5423a116c80732fa5e1dd01dc0b99795387bc81b95c98ffc42a6_amd64",
"relates_to_product_reference": "DevWorkspace Operator 0.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:992b3afbd4630383951536fad36590328f5f4dd1ac438b24860e307bb21f6962_s390x as a component of DevWorkspace Operator 0.4",
"product_id": "DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:992b3afbd4630383951536fad36590328f5f4dd1ac438b24860e307bb21f6962_s390x"
},
"product_reference": "registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:992b3afbd4630383951536fad36590328f5f4dd1ac438b24860e307bb21f6962_s390x",
"relates_to_product_reference": "DevWorkspace Operator 0.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:9fe2f1443f73cc296a9f50aba782c5b6aabae4a2adbba754f4346a395bd8bc09_arm64 as a component of DevWorkspace Operator 0.4",
"product_id": "DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:9fe2f1443f73cc296a9f50aba782c5b6aabae4a2adbba754f4346a395bd8bc09_arm64"
},
"product_reference": "registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:9fe2f1443f73cc296a9f50aba782c5b6aabae4a2adbba754f4346a395bd8bc09_arm64",
"relates_to_product_reference": "DevWorkspace Operator 0.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:03e66dbde56c09f627bc5eb60ebfd5127a43d313dff99e75e37039de8ab9430d_ppc64le as a component of DevWorkspace Operator 0.4",
"product_id": "DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:03e66dbde56c09f627bc5eb60ebfd5127a43d313dff99e75e37039de8ab9430d_ppc64le"
},
"product_reference": "registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:03e66dbde56c09f627bc5eb60ebfd5127a43d313dff99e75e37039de8ab9430d_ppc64le",
"relates_to_product_reference": "DevWorkspace Operator 0.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:053d1f1ba2f47f45379e4630d3cdcb734915e538f2500477108e2fb9f28b0596_arm64 as a component of DevWorkspace Operator 0.4",
"product_id": "DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:053d1f1ba2f47f45379e4630d3cdcb734915e538f2500477108e2fb9f28b0596_arm64"
},
"product_reference": "registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:053d1f1ba2f47f45379e4630d3cdcb734915e538f2500477108e2fb9f28b0596_arm64",
"relates_to_product_reference": "DevWorkspace Operator 0.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:105988d31561736be604af59fa46b7b73003609546cf9b8bf5af97112c4dc750_amd64 as a component of DevWorkspace Operator 0.4",
"product_id": "DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:105988d31561736be604af59fa46b7b73003609546cf9b8bf5af97112c4dc750_amd64"
},
"product_reference": "registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:105988d31561736be604af59fa46b7b73003609546cf9b8bf5af97112c4dc750_amd64",
"relates_to_product_reference": "DevWorkspace Operator 0.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:e14baa9938a2ce79f2f977e70c6a706620e7eb652191269b628f6164f4120f34_s390x as a component of DevWorkspace Operator 0.4",
"product_id": "DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:e14baa9938a2ce79f2f977e70c6a706620e7eb652191269b628f6164f4120f34_s390x"
},
"product_reference": "registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:e14baa9938a2ce79f2f977e70c6a706620e7eb652191269b628f6164f4120f34_s390x",
"relates_to_product_reference": "DevWorkspace Operator 0.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:7033e308ba08300838ce7b507434d3e2bed97e0b8919409079b5c9705cbf06e8_ppc64le as a component of DevWorkspace Operator 0.4",
"product_id": "DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:7033e308ba08300838ce7b507434d3e2bed97e0b8919409079b5c9705cbf06e8_ppc64le"
},
"product_reference": "registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:7033e308ba08300838ce7b507434d3e2bed97e0b8919409079b5c9705cbf06e8_ppc64le",
"relates_to_product_reference": "DevWorkspace Operator 0.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:78b5652108b78dc1b8b3e5bd10026ec02954c41a73c59857ef8a75b2a59d3eca_s390x as a component of DevWorkspace Operator 0.4",
"product_id": "DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:78b5652108b78dc1b8b3e5bd10026ec02954c41a73c59857ef8a75b2a59d3eca_s390x"
},
"product_reference": "registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:78b5652108b78dc1b8b3e5bd10026ec02954c41a73c59857ef8a75b2a59d3eca_s390x",
"relates_to_product_reference": "DevWorkspace Operator 0.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:9b0eea627cc3a2531a517df168818f40c92ebbf0a22ab56a22396600a2e59d04_amd64 as a component of DevWorkspace Operator 0.4",
"product_id": "DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:9b0eea627cc3a2531a517df168818f40c92ebbf0a22ab56a22396600a2e59d04_amd64"
},
"product_reference": "registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:9b0eea627cc3a2531a517df168818f40c92ebbf0a22ab56a22396600a2e59d04_amd64",
"relates_to_product_reference": "DevWorkspace Operator 0.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:a55f5c74e35c5fe7dbab7b6e1cd6ea824606ed8d198e903dad264baab40008e2_arm64 as a component of DevWorkspace Operator 0.4",
"product_id": "DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:a55f5c74e35c5fe7dbab7b6e1cd6ea824606ed8d198e903dad264baab40008e2_arm64"
},
"product_reference": "registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:a55f5c74e35c5fe7dbab7b6e1cd6ea824606ed8d198e903dad264baab40008e2_arm64",
"relates_to_product_reference": "DevWorkspace Operator 0.4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-25679",
"cwe": {
"id": "CWE-1286",
"name": "Improper Validation of Syntactic Correctness of Input"
},
"discovery_date": "2026-03-06T22:02:11.567841+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-operator-bundle@sha256:991f3f31d41dc78e4aede374e9d6eaf82016da4528c3481af9936b4ab5ed30ca_amd64",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:0131e2bce3611a145b67ead5e4e0c0bb4206a996211510daffe7f0eeef42992b_ppc64le",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:798b5bfebc9c5423a116c80732fa5e1dd01dc0b99795387bc81b95c98ffc42a6_amd64",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:992b3afbd4630383951536fad36590328f5f4dd1ac438b24860e307bb21f6962_s390x",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:9fe2f1443f73cc296a9f50aba782c5b6aabae4a2adbba754f4346a395bd8bc09_arm64",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:03e66dbde56c09f627bc5eb60ebfd5127a43d313dff99e75e37039de8ab9430d_ppc64le",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:053d1f1ba2f47f45379e4630d3cdcb734915e538f2500477108e2fb9f28b0596_arm64",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:105988d31561736be604af59fa46b7b73003609546cf9b8bf5af97112c4dc750_amd64",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:e14baa9938a2ce79f2f977e70c6a706620e7eb652191269b628f6164f4120f34_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2445356"
}
],
"notes": [
{
"category": "description",
"text": "The Go standard library function net/url.Parse insufficiently validated the host/authority component and accepted some invalid URLs by effectively treating garbage before an IP-literal as ignorable. The function should have rejected this as invalid.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "net/url: Incorrect parsing of IPv6 host literals in net/url",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:7033e308ba08300838ce7b507434d3e2bed97e0b8919409079b5c9705cbf06e8_ppc64le",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:78b5652108b78dc1b8b3e5bd10026ec02954c41a73c59857ef8a75b2a59d3eca_s390x",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:9b0eea627cc3a2531a517df168818f40c92ebbf0a22ab56a22396600a2e59d04_amd64",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:a55f5c74e35c5fe7dbab7b6e1cd6ea824606ed8d198e903dad264baab40008e2_arm64"
],
"known_not_affected": [
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-operator-bundle@sha256:991f3f31d41dc78e4aede374e9d6eaf82016da4528c3481af9936b4ab5ed30ca_amd64",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:0131e2bce3611a145b67ead5e4e0c0bb4206a996211510daffe7f0eeef42992b_ppc64le",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:798b5bfebc9c5423a116c80732fa5e1dd01dc0b99795387bc81b95c98ffc42a6_amd64",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:992b3afbd4630383951536fad36590328f5f4dd1ac438b24860e307bb21f6962_s390x",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:9fe2f1443f73cc296a9f50aba782c5b6aabae4a2adbba754f4346a395bd8bc09_arm64",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:03e66dbde56c09f627bc5eb60ebfd5127a43d313dff99e75e37039de8ab9430d_ppc64le",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:053d1f1ba2f47f45379e4630d3cdcb734915e538f2500477108e2fb9f28b0596_arm64",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:105988d31561736be604af59fa46b7b73003609546cf9b8bf5af97112c4dc750_amd64",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:e14baa9938a2ce79f2f977e70c6a706620e7eb652191269b628f6164f4120f34_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-25679"
},
{
"category": "external",
"summary": "RHBZ#2445356",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2445356"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-25679",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25679"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-25679",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25679"
},
{
"category": "external",
"summary": "https://go.dev/cl/752180",
"url": "https://go.dev/cl/752180"
},
{
"category": "external",
"summary": "https://go.dev/issue/77578",
"url": "https://go.dev/issue/77578"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk",
"url": "https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4601",
"url": "https://pkg.go.dev/vuln/GO-2026-4601"
}
],
"release_date": "2026-03-06T21:28:14.211000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-22T21:03:38+00:00",
"details": "To start using the DevWorkspace Operator, install the DevWorkspace Operator from OpenShift OperatorHub on OpenShift Container Platform 4.16 or higher.",
"product_ids": [
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:7033e308ba08300838ce7b507434d3e2bed97e0b8919409079b5c9705cbf06e8_ppc64le",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:78b5652108b78dc1b8b3e5bd10026ec02954c41a73c59857ef8a75b2a59d3eca_s390x",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:9b0eea627cc3a2531a517df168818f40c92ebbf0a22ab56a22396600a2e59d04_amd64",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:a55f5c74e35c5fe7dbab7b6e1cd6ea824606ed8d198e903dad264baab40008e2_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:9872"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-operator-bundle@sha256:991f3f31d41dc78e4aede374e9d6eaf82016da4528c3481af9936b4ab5ed30ca_amd64",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:0131e2bce3611a145b67ead5e4e0c0bb4206a996211510daffe7f0eeef42992b_ppc64le",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:798b5bfebc9c5423a116c80732fa5e1dd01dc0b99795387bc81b95c98ffc42a6_amd64",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:992b3afbd4630383951536fad36590328f5f4dd1ac438b24860e307bb21f6962_s390x",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:9fe2f1443f73cc296a9f50aba782c5b6aabae4a2adbba754f4346a395bd8bc09_arm64",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:03e66dbde56c09f627bc5eb60ebfd5127a43d313dff99e75e37039de8ab9430d_ppc64le",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:053d1f1ba2f47f45379e4630d3cdcb734915e538f2500477108e2fb9f28b0596_arm64",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:105988d31561736be604af59fa46b7b73003609546cf9b8bf5af97112c4dc750_amd64",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:e14baa9938a2ce79f2f977e70c6a706620e7eb652191269b628f6164f4120f34_s390x",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:7033e308ba08300838ce7b507434d3e2bed97e0b8919409079b5c9705cbf06e8_ppc64le",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:78b5652108b78dc1b8b3e5bd10026ec02954c41a73c59857ef8a75b2a59d3eca_s390x",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:9b0eea627cc3a2531a517df168818f40c92ebbf0a22ab56a22396600a2e59d04_amd64",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:a55f5c74e35c5fe7dbab7b6e1cd6ea824606ed8d198e903dad264baab40008e2_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-operator-bundle@sha256:991f3f31d41dc78e4aede374e9d6eaf82016da4528c3481af9936b4ab5ed30ca_amd64",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:0131e2bce3611a145b67ead5e4e0c0bb4206a996211510daffe7f0eeef42992b_ppc64le",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:798b5bfebc9c5423a116c80732fa5e1dd01dc0b99795387bc81b95c98ffc42a6_amd64",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:992b3afbd4630383951536fad36590328f5f4dd1ac438b24860e307bb21f6962_s390x",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:9fe2f1443f73cc296a9f50aba782c5b6aabae4a2adbba754f4346a395bd8bc09_arm64",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:03e66dbde56c09f627bc5eb60ebfd5127a43d313dff99e75e37039de8ab9430d_ppc64le",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:053d1f1ba2f47f45379e4630d3cdcb734915e538f2500477108e2fb9f28b0596_arm64",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:105988d31561736be604af59fa46b7b73003609546cf9b8bf5af97112c4dc750_amd64",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:e14baa9938a2ce79f2f977e70c6a706620e7eb652191269b628f6164f4120f34_s390x",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:7033e308ba08300838ce7b507434d3e2bed97e0b8919409079b5c9705cbf06e8_ppc64le",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:78b5652108b78dc1b8b3e5bd10026ec02954c41a73c59857ef8a75b2a59d3eca_s390x",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:9b0eea627cc3a2531a517df168818f40c92ebbf0a22ab56a22396600a2e59d04_amd64",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:a55f5c74e35c5fe7dbab7b6e1cd6ea824606ed8d198e903dad264baab40008e2_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "net/url: Incorrect parsing of IPv6 host literals in net/url"
},
{
"cve": "CVE-2026-27137",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"discovery_date": "2026-03-06T22:01:38.859733+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-operator-bundle@sha256:991f3f31d41dc78e4aede374e9d6eaf82016da4528c3481af9936b4ab5ed30ca_amd64",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:0131e2bce3611a145b67ead5e4e0c0bb4206a996211510daffe7f0eeef42992b_ppc64le",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:798b5bfebc9c5423a116c80732fa5e1dd01dc0b99795387bc81b95c98ffc42a6_amd64",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:992b3afbd4630383951536fad36590328f5f4dd1ac438b24860e307bb21f6962_s390x",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:9fe2f1443f73cc296a9f50aba782c5b6aabae4a2adbba754f4346a395bd8bc09_arm64",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:03e66dbde56c09f627bc5eb60ebfd5127a43d313dff99e75e37039de8ab9430d_ppc64le",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:053d1f1ba2f47f45379e4630d3cdcb734915e538f2500477108e2fb9f28b0596_arm64",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:105988d31561736be604af59fa46b7b73003609546cf9b8bf5af97112c4dc750_amd64",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:e14baa9938a2ce79f2f977e70c6a706620e7eb652191269b628f6164f4120f34_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2445345"
}
],
"notes": [
{
"category": "description",
"text": "A certificate validation flaw has been discovered in the golang crypto/x509 module. When verifying a certificate chain which contains a certificate containing multiple email address constraints which share common local portions but different domain portions, these constraints will not be properly applied, and only the last constraint will be considered.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: Incorrect enforcement of email constraints in crypto/x509",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:7033e308ba08300838ce7b507434d3e2bed97e0b8919409079b5c9705cbf06e8_ppc64le",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:78b5652108b78dc1b8b3e5bd10026ec02954c41a73c59857ef8a75b2a59d3eca_s390x",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:9b0eea627cc3a2531a517df168818f40c92ebbf0a22ab56a22396600a2e59d04_amd64",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:a55f5c74e35c5fe7dbab7b6e1cd6ea824606ed8d198e903dad264baab40008e2_arm64"
],
"known_not_affected": [
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-operator-bundle@sha256:991f3f31d41dc78e4aede374e9d6eaf82016da4528c3481af9936b4ab5ed30ca_amd64",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:0131e2bce3611a145b67ead5e4e0c0bb4206a996211510daffe7f0eeef42992b_ppc64le",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:798b5bfebc9c5423a116c80732fa5e1dd01dc0b99795387bc81b95c98ffc42a6_amd64",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:992b3afbd4630383951536fad36590328f5f4dd1ac438b24860e307bb21f6962_s390x",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:9fe2f1443f73cc296a9f50aba782c5b6aabae4a2adbba754f4346a395bd8bc09_arm64",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:03e66dbde56c09f627bc5eb60ebfd5127a43d313dff99e75e37039de8ab9430d_ppc64le",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:053d1f1ba2f47f45379e4630d3cdcb734915e538f2500477108e2fb9f28b0596_arm64",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:105988d31561736be604af59fa46b7b73003609546cf9b8bf5af97112c4dc750_amd64",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:e14baa9938a2ce79f2f977e70c6a706620e7eb652191269b628f6164f4120f34_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-27137"
},
{
"category": "external",
"summary": "RHBZ#2445345",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2445345"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-27137",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27137"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-27137",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27137"
},
{
"category": "external",
"summary": "https://go.dev/cl/752182",
"url": "https://go.dev/cl/752182"
},
{
"category": "external",
"summary": "https://go.dev/issue/77952",
"url": "https://go.dev/issue/77952"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk",
"url": "https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4599",
"url": "https://pkg.go.dev/vuln/GO-2026-4599"
}
],
"release_date": "2026-03-06T21:28:13.748000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-22T21:03:38+00:00",
"details": "To start using the DevWorkspace Operator, install the DevWorkspace Operator from OpenShift OperatorHub on OpenShift Container Platform 4.16 or higher.",
"product_ids": [
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:7033e308ba08300838ce7b507434d3e2bed97e0b8919409079b5c9705cbf06e8_ppc64le",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:78b5652108b78dc1b8b3e5bd10026ec02954c41a73c59857ef8a75b2a59d3eca_s390x",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:9b0eea627cc3a2531a517df168818f40c92ebbf0a22ab56a22396600a2e59d04_amd64",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:a55f5c74e35c5fe7dbab7b6e1cd6ea824606ed8d198e903dad264baab40008e2_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:9872"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-operator-bundle@sha256:991f3f31d41dc78e4aede374e9d6eaf82016da4528c3481af9936b4ab5ed30ca_amd64",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:0131e2bce3611a145b67ead5e4e0c0bb4206a996211510daffe7f0eeef42992b_ppc64le",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:798b5bfebc9c5423a116c80732fa5e1dd01dc0b99795387bc81b95c98ffc42a6_amd64",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:992b3afbd4630383951536fad36590328f5f4dd1ac438b24860e307bb21f6962_s390x",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:9fe2f1443f73cc296a9f50aba782c5b6aabae4a2adbba754f4346a395bd8bc09_arm64",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:03e66dbde56c09f627bc5eb60ebfd5127a43d313dff99e75e37039de8ab9430d_ppc64le",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:053d1f1ba2f47f45379e4630d3cdcb734915e538f2500477108e2fb9f28b0596_arm64",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:105988d31561736be604af59fa46b7b73003609546cf9b8bf5af97112c4dc750_amd64",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:e14baa9938a2ce79f2f977e70c6a706620e7eb652191269b628f6164f4120f34_s390x",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:7033e308ba08300838ce7b507434d3e2bed97e0b8919409079b5c9705cbf06e8_ppc64le",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:78b5652108b78dc1b8b3e5bd10026ec02954c41a73c59857ef8a75b2a59d3eca_s390x",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:9b0eea627cc3a2531a517df168818f40c92ebbf0a22ab56a22396600a2e59d04_amd64",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:a55f5c74e35c5fe7dbab7b6e1cd6ea824606ed8d198e903dad264baab40008e2_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-operator-bundle@sha256:991f3f31d41dc78e4aede374e9d6eaf82016da4528c3481af9936b4ab5ed30ca_amd64",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:0131e2bce3611a145b67ead5e4e0c0bb4206a996211510daffe7f0eeef42992b_ppc64le",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:798b5bfebc9c5423a116c80732fa5e1dd01dc0b99795387bc81b95c98ffc42a6_amd64",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:992b3afbd4630383951536fad36590328f5f4dd1ac438b24860e307bb21f6962_s390x",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:9fe2f1443f73cc296a9f50aba782c5b6aabae4a2adbba754f4346a395bd8bc09_arm64",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:03e66dbde56c09f627bc5eb60ebfd5127a43d313dff99e75e37039de8ab9430d_ppc64le",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:053d1f1ba2f47f45379e4630d3cdcb734915e538f2500477108e2fb9f28b0596_arm64",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:105988d31561736be604af59fa46b7b73003609546cf9b8bf5af97112c4dc750_amd64",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:e14baa9938a2ce79f2f977e70c6a706620e7eb652191269b628f6164f4120f34_s390x",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:7033e308ba08300838ce7b507434d3e2bed97e0b8919409079b5c9705cbf06e8_ppc64le",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:78b5652108b78dc1b8b3e5bd10026ec02954c41a73c59857ef8a75b2a59d3eca_s390x",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:9b0eea627cc3a2531a517df168818f40c92ebbf0a22ab56a22396600a2e59d04_amd64",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:a55f5c74e35c5fe7dbab7b6e1cd6ea824606ed8d198e903dad264baab40008e2_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: Incorrect enforcement of email constraints in crypto/x509"
},
{
"cve": "CVE-2026-33186",
"cwe": {
"id": "CWE-551",
"name": "Incorrect Behavior Order: Authorization Before Parsing and Canonicalization"
},
"discovery_date": "2026-03-20T23:02:27.802640+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-operator-bundle@sha256:991f3f31d41dc78e4aede374e9d6eaf82016da4528c3481af9936b4ab5ed30ca_amd64",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:0131e2bce3611a145b67ead5e4e0c0bb4206a996211510daffe7f0eeef42992b_ppc64le",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:798b5bfebc9c5423a116c80732fa5e1dd01dc0b99795387bc81b95c98ffc42a6_amd64",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:992b3afbd4630383951536fad36590328f5f4dd1ac438b24860e307bb21f6962_s390x",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:9fe2f1443f73cc296a9f50aba782c5b6aabae4a2adbba754f4346a395bd8bc09_arm64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2449833"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in gRPC-Go, the Go language implementation of gRPC. This vulnerability, an authorization bypass, is caused by improper input validation of the HTTP/2 `:path` pseudo-header. A remote attacker can exploit this by sending raw HTTP/2 frames with a malformed `:path` that omits the mandatory leading slash. This allows the attacker to bypass defined security policies, potentially leading to unauthorized access to services or information disclosure.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "google.golang.org/grpc/grpc-go: google.golang.org/grpc/authz: gRPC-Go: Authorization bypass due to improper HTTP/2 path validation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:03e66dbde56c09f627bc5eb60ebfd5127a43d313dff99e75e37039de8ab9430d_ppc64le",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:053d1f1ba2f47f45379e4630d3cdcb734915e538f2500477108e2fb9f28b0596_arm64",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:105988d31561736be604af59fa46b7b73003609546cf9b8bf5af97112c4dc750_amd64",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:e14baa9938a2ce79f2f977e70c6a706620e7eb652191269b628f6164f4120f34_s390x",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:7033e308ba08300838ce7b507434d3e2bed97e0b8919409079b5c9705cbf06e8_ppc64le",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:78b5652108b78dc1b8b3e5bd10026ec02954c41a73c59857ef8a75b2a59d3eca_s390x",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:9b0eea627cc3a2531a517df168818f40c92ebbf0a22ab56a22396600a2e59d04_amd64",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:a55f5c74e35c5fe7dbab7b6e1cd6ea824606ed8d198e903dad264baab40008e2_arm64"
],
"known_not_affected": [
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-operator-bundle@sha256:991f3f31d41dc78e4aede374e9d6eaf82016da4528c3481af9936b4ab5ed30ca_amd64",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:0131e2bce3611a145b67ead5e4e0c0bb4206a996211510daffe7f0eeef42992b_ppc64le",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:798b5bfebc9c5423a116c80732fa5e1dd01dc0b99795387bc81b95c98ffc42a6_amd64",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:992b3afbd4630383951536fad36590328f5f4dd1ac438b24860e307bb21f6962_s390x",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:9fe2f1443f73cc296a9f50aba782c5b6aabae4a2adbba754f4346a395bd8bc09_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-33186"
},
{
"category": "external",
"summary": "RHBZ#2449833",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2449833"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-33186",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33186"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186"
},
{
"category": "external",
"summary": "https://github.com/grpc/grpc-go/security/advisories/GHSA-p77j-4mvh-x3m3",
"url": "https://github.com/grpc/grpc-go/security/advisories/GHSA-p77j-4mvh-x3m3"
}
],
"release_date": "2026-03-20T22:23:32.147000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-22T21:03:38+00:00",
"details": "To start using the DevWorkspace Operator, install the DevWorkspace Operator from OpenShift OperatorHub on OpenShift Container Platform 4.16 or higher.",
"product_ids": [
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:03e66dbde56c09f627bc5eb60ebfd5127a43d313dff99e75e37039de8ab9430d_ppc64le",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:053d1f1ba2f47f45379e4630d3cdcb734915e538f2500477108e2fb9f28b0596_arm64",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:105988d31561736be604af59fa46b7b73003609546cf9b8bf5af97112c4dc750_amd64",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:e14baa9938a2ce79f2f977e70c6a706620e7eb652191269b628f6164f4120f34_s390x",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:7033e308ba08300838ce7b507434d3e2bed97e0b8919409079b5c9705cbf06e8_ppc64le",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:78b5652108b78dc1b8b3e5bd10026ec02954c41a73c59857ef8a75b2a59d3eca_s390x",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:9b0eea627cc3a2531a517df168818f40c92ebbf0a22ab56a22396600a2e59d04_amd64",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:a55f5c74e35c5fe7dbab7b6e1cd6ea824606ed8d198e903dad264baab40008e2_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:9872"
},
{
"category": "workaround",
"details": "To mitigate this issue, implement infrastructure-level normalization to ensure all incoming HTTP/2 `:path` headers are properly formatted with a leading slash before reaching the gRPC-Go server. This can be achieved by configuring a reverse proxy or API gateway to validate and normalize the `:path` header. Ensure that any such intermediary is properly configured and restarted to apply the changes, which may temporarily impact service availability.",
"product_ids": [
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-operator-bundle@sha256:991f3f31d41dc78e4aede374e9d6eaf82016da4528c3481af9936b4ab5ed30ca_amd64",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:0131e2bce3611a145b67ead5e4e0c0bb4206a996211510daffe7f0eeef42992b_ppc64le",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:798b5bfebc9c5423a116c80732fa5e1dd01dc0b99795387bc81b95c98ffc42a6_amd64",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:992b3afbd4630383951536fad36590328f5f4dd1ac438b24860e307bb21f6962_s390x",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:9fe2f1443f73cc296a9f50aba782c5b6aabae4a2adbba754f4346a395bd8bc09_arm64",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:03e66dbde56c09f627bc5eb60ebfd5127a43d313dff99e75e37039de8ab9430d_ppc64le",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:053d1f1ba2f47f45379e4630d3cdcb734915e538f2500477108e2fb9f28b0596_arm64",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:105988d31561736be604af59fa46b7b73003609546cf9b8bf5af97112c4dc750_amd64",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:e14baa9938a2ce79f2f977e70c6a706620e7eb652191269b628f6164f4120f34_s390x",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:7033e308ba08300838ce7b507434d3e2bed97e0b8919409079b5c9705cbf06e8_ppc64le",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:78b5652108b78dc1b8b3e5bd10026ec02954c41a73c59857ef8a75b2a59d3eca_s390x",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:9b0eea627cc3a2531a517df168818f40c92ebbf0a22ab56a22396600a2e59d04_amd64",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:a55f5c74e35c5fe7dbab7b6e1cd6ea824606ed8d198e903dad264baab40008e2_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-operator-bundle@sha256:991f3f31d41dc78e4aede374e9d6eaf82016da4528c3481af9936b4ab5ed30ca_amd64",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:0131e2bce3611a145b67ead5e4e0c0bb4206a996211510daffe7f0eeef42992b_ppc64le",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:798b5bfebc9c5423a116c80732fa5e1dd01dc0b99795387bc81b95c98ffc42a6_amd64",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:992b3afbd4630383951536fad36590328f5f4dd1ac438b24860e307bb21f6962_s390x",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-project-backup-rhel9@sha256:9fe2f1443f73cc296a9f50aba782c5b6aabae4a2adbba754f4346a395bd8bc09_arm64",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:03e66dbde56c09f627bc5eb60ebfd5127a43d313dff99e75e37039de8ab9430d_ppc64le",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:053d1f1ba2f47f45379e4630d3cdcb734915e538f2500477108e2fb9f28b0596_arm64",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:105988d31561736be604af59fa46b7b73003609546cf9b8bf5af97112c4dc750_amd64",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-project-clone-rhel9@sha256:e14baa9938a2ce79f2f977e70c6a706620e7eb652191269b628f6164f4120f34_s390x",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:7033e308ba08300838ce7b507434d3e2bed97e0b8919409079b5c9705cbf06e8_ppc64le",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:78b5652108b78dc1b8b3e5bd10026ec02954c41a73c59857ef8a75b2a59d3eca_s390x",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:9b0eea627cc3a2531a517df168818f40c92ebbf0a22ab56a22396600a2e59d04_amd64",
"DevWorkspace Operator 0.4:registry.redhat.io/devworkspace/devworkspace-rhel9-operator@sha256:a55f5c74e35c5fe7dbab7b6e1cd6ea824606ed8d198e903dad264baab40008e2_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "google.golang.org/grpc/grpc-go: google.golang.org/grpc/authz: gRPC-Go: Authorization bypass due to improper HTTP/2 path validation"
}
]
}
RHSA-2026:9698
Vulnerability from csaf_redhat - Published: 2026-04-22 12:29 - Updated: 2026-04-23 02:09A certificate validation flaw has been discovered in the golang crypto/x509 module. When verifying a certificate chain which contains a certificate containing multiple email address constraints which share common local portions but different domain portions, these constraints will not be properly applied, and only the last constraint will be considered.
| URL | Category | ||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Important: Red Hat OpenShift GitOps v1.19.3 security update",
"title": "Topic"
},
{
"category": "general",
"text": "An update is now available for Red Hat OpenShift GitOps.\nBug Fix(es) and Enhancement(s):\n* GITOPS-9158 (OpenShift Gitops Operator v1.19.2 has hardcoded pod-security labels which conflict OCP \u003c= 4.16 )\n* GITOPS-9587 (multiple CVEs in ose-kube-rbac-proxy images included in OpenShift GitOps v1.19.2 and v1.20.1)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:9698",
"url": "https://access.redhat.com/errata/RHSA-2026:9698"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-27137",
"url": "https://access.redhat.com/security/cve/CVE-2026-27137"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/red_hat_openshift_gitops/1.19/",
"url": "https://docs.redhat.com/en/documentation/red_hat_openshift_gitops/1.19/"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_9698.json"
}
],
"title": "Red Hat Security Advisory: Red Hat OpenShift GitOps v1.19.3 security update",
"tracking": {
"current_release_date": "2026-04-23T02:09:17+00:00",
"generator": {
"date": "2026-04-23T02:09:17+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.5"
}
},
"id": "RHSA-2026:9698",
"initial_release_date": "2026-04-22T12:29:18+00:00",
"revision_history": [
{
"date": "2026-04-22T12:29:18+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-04-22T12:29:27+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-23T02:09:17+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift GitOps 1.19",
"product": {
"name": "Red Hat OpenShift GitOps 1.19",
"product_id": "Red Hat OpenShift GitOps 1.19",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift_gitops:1.19::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift GitOps"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:1c5ed08bcdd5c13ba8b98054ddc1dfdc3837d24dcd3b670bdc4ff2453fc37789_amd64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:1c5ed08bcdd5c13ba8b98054ddc1dfdc3837d24dcd3b670bdc4ff2453fc37789_amd64",
"product_id": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:1c5ed08bcdd5c13ba8b98054ddc1dfdc3837d24dcd3b670bdc4ff2453fc37789_amd64",
"product_identification_helper": {
"purl": "pkg:oci/argo-rollouts-rhel8@sha256%3A1c5ed08bcdd5c13ba8b98054ddc1dfdc3837d24dcd3b670bdc4ff2453fc37789?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776767098"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:83c466b8c9310f0dc498870c25d43b96ba051de4509d6134540c561b05a12d02_amd64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:83c466b8c9310f0dc498870c25d43b96ba051de4509d6134540c561b05a12d02_amd64",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:83c466b8c9310f0dc498870c25d43b96ba051de4509d6134540c561b05a12d02_amd64",
"product_identification_helper": {
"purl": "pkg:oci/argocd-rhel8@sha256%3A83c466b8c9310f0dc498870c25d43b96ba051de4509d6134540c561b05a12d02?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776768309"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:98a3e4019e9f68050237f34cb7a89c125c317973158184fba55ace5f772cd76a_amd64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:98a3e4019e9f68050237f34cb7a89c125c317973158184fba55ace5f772cd76a_amd64",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:98a3e4019e9f68050237f34cb7a89c125c317973158184fba55ace5f772cd76a_amd64",
"product_identification_helper": {
"purl": "pkg:oci/argocd-agent-rhel8@sha256%3A98a3e4019e9f68050237f34cb7a89c125c317973158184fba55ace5f772cd76a?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776767097"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:b8d4c24efc4d1eb910009373156f8fe1ae2c599a0dff0f278382aedd4cab9a1f_amd64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:b8d4c24efc4d1eb910009373156f8fe1ae2c599a0dff0f278382aedd4cab9a1f_amd64",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:b8d4c24efc4d1eb910009373156f8fe1ae2c599a0dff0f278382aedd4cab9a1f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/argocd-extensions-rhel8@sha256%3Ab8d4c24efc4d1eb910009373156f8fe1ae2c599a0dff0f278382aedd4cab9a1f?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776767002"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:6b755ab049dfa8a5f89dbde3bed00275b9ff807b338b2a7ecdaefeaed83b0bbc_amd64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:6b755ab049dfa8a5f89dbde3bed00275b9ff807b338b2a7ecdaefeaed83b0bbc_amd64",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:6b755ab049dfa8a5f89dbde3bed00275b9ff807b338b2a7ecdaefeaed83b0bbc_amd64",
"product_identification_helper": {
"purl": "pkg:oci/argocd-image-updater-rhel8@sha256%3A6b755ab049dfa8a5f89dbde3bed00275b9ff807b338b2a7ecdaefeaed83b0bbc?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776768525"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:8f9477ae0de3e4b1d039bc6901cec348eb4d4bdde8b8b85775ddff4db2a08c1b_amd64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:8f9477ae0de3e4b1d039bc6901cec348eb4d4bdde8b8b85775ddff4db2a08c1b_amd64",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:8f9477ae0de3e4b1d039bc6901cec348eb4d4bdde8b8b85775ddff4db2a08c1b_amd64",
"product_identification_helper": {
"purl": "pkg:oci/argocd-rhel9@sha256%3A8f9477ae0de3e4b1d039bc6901cec348eb4d4bdde8b8b85775ddff4db2a08c1b?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776768092"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:19e0b44f05c4131e6ce86ebba2626aac49c7b3dbdc4f1a403c025234ad17853d_amd64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:19e0b44f05c4131e6ce86ebba2626aac49c7b3dbdc4f1a403c025234ad17853d_amd64",
"product_id": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:19e0b44f05c4131e6ce86ebba2626aac49c7b3dbdc4f1a403c025234ad17853d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/console-plugin-rhel8@sha256%3A19e0b44f05c4131e6ce86ebba2626aac49c7b3dbdc4f1a403c025234ad17853d?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776769615"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:a7940ced8ebfc480ff4e3daecd6362ec60bc94e7bcfa7d80275f2a3f97eb6f3e_amd64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:a7940ced8ebfc480ff4e3daecd6362ec60bc94e7bcfa7d80275f2a3f97eb6f3e_amd64",
"product_id": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:a7940ced8ebfc480ff4e3daecd6362ec60bc94e7bcfa7d80275f2a3f97eb6f3e_amd64",
"product_identification_helper": {
"purl": "pkg:oci/dex-rhel8@sha256%3Aa7940ced8ebfc480ff4e3daecd6362ec60bc94e7bcfa7d80275f2a3f97eb6f3e?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776767162"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:e60e4e0c97f98a424b1110f0dad7e0cc3f739c6b4076ffe0534d789eb99a35ec_amd64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:e60e4e0c97f98a424b1110f0dad7e0cc3f739c6b4076ffe0534d789eb99a35ec_amd64",
"product_id": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:e60e4e0c97f98a424b1110f0dad7e0cc3f739c6b4076ffe0534d789eb99a35ec_amd64",
"product_identification_helper": {
"purl": "pkg:oci/gitops-rhel8@sha256%3Ae60e4e0c97f98a424b1110f0dad7e0cc3f739c6b4076ffe0534d789eb99a35ec?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776769653"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:0acb623e826efb64e304c73a412605efcab0f944f93dbe87fe39c70d39403a64_amd64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:0acb623e826efb64e304c73a412605efcab0f944f93dbe87fe39c70d39403a64_amd64",
"product_id": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:0acb623e826efb64e304c73a412605efcab0f944f93dbe87fe39c70d39403a64_amd64",
"product_identification_helper": {
"purl": "pkg:oci/gitops-rhel8-operator@sha256%3A0acb623e826efb64e304c73a412605efcab0f944f93dbe87fe39c70d39403a64?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776769346"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:9d16d9f172618c8f03b2b5b930220761ed97faa90ebd38f570d60bed5216b433_amd64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:9d16d9f172618c8f03b2b5b930220761ed97faa90ebd38f570d60bed5216b433_amd64",
"product_id": "registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:9d16d9f172618c8f03b2b5b930220761ed97faa90ebd38f570d60bed5216b433_amd64",
"product_identification_helper": {
"purl": "pkg:oci/gitops-operator-bundle@sha256%3A9d16d9f172618c8f03b2b5b930220761ed97faa90ebd38f570d60bed5216b433?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776771652"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:b27b5fd2989d7575476b2fd0f973424700223aeb1810136bf67d0a8f0659eaa4_amd64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:b27b5fd2989d7575476b2fd0f973424700223aeb1810136bf67d0a8f0659eaa4_amd64",
"product_id": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:b27b5fd2989d7575476b2fd0f973424700223aeb1810136bf67d0a8f0659eaa4_amd64",
"product_identification_helper": {
"purl": "pkg:oci/must-gather-rhel8@sha256%3Ab27b5fd2989d7575476b2fd0f973424700223aeb1810136bf67d0a8f0659eaa4?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776767433"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:b3da9ddc02f2caa947f034e64ed37769efa04ff17c98c8b57f21871e058d150d_arm64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:b3da9ddc02f2caa947f034e64ed37769efa04ff17c98c8b57f21871e058d150d_arm64",
"product_id": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:b3da9ddc02f2caa947f034e64ed37769efa04ff17c98c8b57f21871e058d150d_arm64",
"product_identification_helper": {
"purl": "pkg:oci/argo-rollouts-rhel8@sha256%3Ab3da9ddc02f2caa947f034e64ed37769efa04ff17c98c8b57f21871e058d150d?arch=arm64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776767098"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:c1f0cff25f290e7e9834372bc5bb3e63aad754ae3fe13a11c502eec3f5c8a8b9_arm64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:c1f0cff25f290e7e9834372bc5bb3e63aad754ae3fe13a11c502eec3f5c8a8b9_arm64",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:c1f0cff25f290e7e9834372bc5bb3e63aad754ae3fe13a11c502eec3f5c8a8b9_arm64",
"product_identification_helper": {
"purl": "pkg:oci/argocd-rhel8@sha256%3Ac1f0cff25f290e7e9834372bc5bb3e63aad754ae3fe13a11c502eec3f5c8a8b9?arch=arm64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776768309"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:df066f65a2ebc5a6910e8ff41bfab5c310b3a5739ffdb60501f9941d9961213f_arm64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:df066f65a2ebc5a6910e8ff41bfab5c310b3a5739ffdb60501f9941d9961213f_arm64",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:df066f65a2ebc5a6910e8ff41bfab5c310b3a5739ffdb60501f9941d9961213f_arm64",
"product_identification_helper": {
"purl": "pkg:oci/argocd-agent-rhel8@sha256%3Adf066f65a2ebc5a6910e8ff41bfab5c310b3a5739ffdb60501f9941d9961213f?arch=arm64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776767097"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:38a8d2575efdebc83519349b0bba68f72abca3c4bff4731cee24b3983252ad13_arm64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:38a8d2575efdebc83519349b0bba68f72abca3c4bff4731cee24b3983252ad13_arm64",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:38a8d2575efdebc83519349b0bba68f72abca3c4bff4731cee24b3983252ad13_arm64",
"product_identification_helper": {
"purl": "pkg:oci/argocd-extensions-rhel8@sha256%3A38a8d2575efdebc83519349b0bba68f72abca3c4bff4731cee24b3983252ad13?arch=arm64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776767002"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:cc8347691a1ad2bbcffd256a632ad6ac6768b1491af96ab2df1dbc106bf8b189_arm64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:cc8347691a1ad2bbcffd256a632ad6ac6768b1491af96ab2df1dbc106bf8b189_arm64",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:cc8347691a1ad2bbcffd256a632ad6ac6768b1491af96ab2df1dbc106bf8b189_arm64",
"product_identification_helper": {
"purl": "pkg:oci/argocd-image-updater-rhel8@sha256%3Acc8347691a1ad2bbcffd256a632ad6ac6768b1491af96ab2df1dbc106bf8b189?arch=arm64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776768525"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:bb9a3e9293c5b5b131632a32a56b13c7093e2e9881e50d48940d2259facc3777_arm64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:bb9a3e9293c5b5b131632a32a56b13c7093e2e9881e50d48940d2259facc3777_arm64",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:bb9a3e9293c5b5b131632a32a56b13c7093e2e9881e50d48940d2259facc3777_arm64",
"product_identification_helper": {
"purl": "pkg:oci/argocd-rhel9@sha256%3Abb9a3e9293c5b5b131632a32a56b13c7093e2e9881e50d48940d2259facc3777?arch=arm64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776768092"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:879902f60fe7a589c6fb0fde87111cd39fc058b2958ef3b24f7a919af64eef79_arm64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:879902f60fe7a589c6fb0fde87111cd39fc058b2958ef3b24f7a919af64eef79_arm64",
"product_id": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:879902f60fe7a589c6fb0fde87111cd39fc058b2958ef3b24f7a919af64eef79_arm64",
"product_identification_helper": {
"purl": "pkg:oci/console-plugin-rhel8@sha256%3A879902f60fe7a589c6fb0fde87111cd39fc058b2958ef3b24f7a919af64eef79?arch=arm64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776769615"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:afca2f8a7181495c6612461542ec7a2a12b4d4bc5795a0fb84302ff3c9c984fd_arm64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:afca2f8a7181495c6612461542ec7a2a12b4d4bc5795a0fb84302ff3c9c984fd_arm64",
"product_id": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:afca2f8a7181495c6612461542ec7a2a12b4d4bc5795a0fb84302ff3c9c984fd_arm64",
"product_identification_helper": {
"purl": "pkg:oci/dex-rhel8@sha256%3Aafca2f8a7181495c6612461542ec7a2a12b4d4bc5795a0fb84302ff3c9c984fd?arch=arm64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776767162"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:c611a1baeca063e4cc10653601f9223f84f81cfec211a01c32b8f205b6eb3ad9_arm64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:c611a1baeca063e4cc10653601f9223f84f81cfec211a01c32b8f205b6eb3ad9_arm64",
"product_id": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:c611a1baeca063e4cc10653601f9223f84f81cfec211a01c32b8f205b6eb3ad9_arm64",
"product_identification_helper": {
"purl": "pkg:oci/gitops-rhel8@sha256%3Ac611a1baeca063e4cc10653601f9223f84f81cfec211a01c32b8f205b6eb3ad9?arch=arm64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776769653"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:d1796795ff523d6866d3ccacf5a5b9b632e878b1129d6ceeacd8169535285999_arm64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:d1796795ff523d6866d3ccacf5a5b9b632e878b1129d6ceeacd8169535285999_arm64",
"product_id": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:d1796795ff523d6866d3ccacf5a5b9b632e878b1129d6ceeacd8169535285999_arm64",
"product_identification_helper": {
"purl": "pkg:oci/gitops-rhel8-operator@sha256%3Ad1796795ff523d6866d3ccacf5a5b9b632e878b1129d6ceeacd8169535285999?arch=arm64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776769346"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:b5ac788322829cf0a9ae32fbb17c29d23722fc7b6d8df59a9e82926ceec239fa_arm64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:b5ac788322829cf0a9ae32fbb17c29d23722fc7b6d8df59a9e82926ceec239fa_arm64",
"product_id": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:b5ac788322829cf0a9ae32fbb17c29d23722fc7b6d8df59a9e82926ceec239fa_arm64",
"product_identification_helper": {
"purl": "pkg:oci/must-gather-rhel8@sha256%3Ab5ac788322829cf0a9ae32fbb17c29d23722fc7b6d8df59a9e82926ceec239fa?arch=arm64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776767433"
}
}
}
],
"category": "architecture",
"name": "arm64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:b1d6a23d9957dbe128ba317ed9a0c8028cbea913683bdd8557f6c4caba98d132_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:b1d6a23d9957dbe128ba317ed9a0c8028cbea913683bdd8557f6c4caba98d132_ppc64le",
"product_id": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:b1d6a23d9957dbe128ba317ed9a0c8028cbea913683bdd8557f6c4caba98d132_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/argo-rollouts-rhel8@sha256%3Ab1d6a23d9957dbe128ba317ed9a0c8028cbea913683bdd8557f6c4caba98d132?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776767098"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:04673bdebda425bad1c73fa2c99e89016b90adde92ab5b18854a213099e16f99_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:04673bdebda425bad1c73fa2c99e89016b90adde92ab5b18854a213099e16f99_ppc64le",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:04673bdebda425bad1c73fa2c99e89016b90adde92ab5b18854a213099e16f99_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/argocd-rhel8@sha256%3A04673bdebda425bad1c73fa2c99e89016b90adde92ab5b18854a213099e16f99?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776768309"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:411b46c6b939f0baf070a0e916df823f8dedce22163a7c5be9774724eb6949e6_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:411b46c6b939f0baf070a0e916df823f8dedce22163a7c5be9774724eb6949e6_ppc64le",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:411b46c6b939f0baf070a0e916df823f8dedce22163a7c5be9774724eb6949e6_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/argocd-agent-rhel8@sha256%3A411b46c6b939f0baf070a0e916df823f8dedce22163a7c5be9774724eb6949e6?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776767097"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:f130e22e260da1e96c10d791f126c1ffc8585ba663918557295f281c4c2a9c17_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:f130e22e260da1e96c10d791f126c1ffc8585ba663918557295f281c4c2a9c17_ppc64le",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:f130e22e260da1e96c10d791f126c1ffc8585ba663918557295f281c4c2a9c17_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/argocd-extensions-rhel8@sha256%3Af130e22e260da1e96c10d791f126c1ffc8585ba663918557295f281c4c2a9c17?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776767002"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:8d7aa2c0b97e86fb6d8ef542b5f6ab05bded9769d5beb4a3ae0e4dd4b77e6dae_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:8d7aa2c0b97e86fb6d8ef542b5f6ab05bded9769d5beb4a3ae0e4dd4b77e6dae_ppc64le",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:8d7aa2c0b97e86fb6d8ef542b5f6ab05bded9769d5beb4a3ae0e4dd4b77e6dae_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/argocd-image-updater-rhel8@sha256%3A8d7aa2c0b97e86fb6d8ef542b5f6ab05bded9769d5beb4a3ae0e4dd4b77e6dae?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776768525"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:943616dc45c24ce59a6962443814dce9f4076d5bd25c041830da5e9ada2dbf1b_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:943616dc45c24ce59a6962443814dce9f4076d5bd25c041830da5e9ada2dbf1b_ppc64le",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:943616dc45c24ce59a6962443814dce9f4076d5bd25c041830da5e9ada2dbf1b_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/argocd-rhel9@sha256%3A943616dc45c24ce59a6962443814dce9f4076d5bd25c041830da5e9ada2dbf1b?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776768092"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:23837525f1a838bb9b4b456bb0a06020406c965784f3353690b5f7738007ae75_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:23837525f1a838bb9b4b456bb0a06020406c965784f3353690b5f7738007ae75_ppc64le",
"product_id": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:23837525f1a838bb9b4b456bb0a06020406c965784f3353690b5f7738007ae75_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/console-plugin-rhel8@sha256%3A23837525f1a838bb9b4b456bb0a06020406c965784f3353690b5f7738007ae75?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776769615"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:9fce35bd136512e2b6bd09e6c82c73800c7b35e101578553ac26906c1982cbe1_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:9fce35bd136512e2b6bd09e6c82c73800c7b35e101578553ac26906c1982cbe1_ppc64le",
"product_id": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:9fce35bd136512e2b6bd09e6c82c73800c7b35e101578553ac26906c1982cbe1_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/dex-rhel8@sha256%3A9fce35bd136512e2b6bd09e6c82c73800c7b35e101578553ac26906c1982cbe1?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776767162"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:563b17fbbbd1d838869ec0d40ccd981f022d14af4d649b668e87bae9f58335e7_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:563b17fbbbd1d838869ec0d40ccd981f022d14af4d649b668e87bae9f58335e7_ppc64le",
"product_id": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:563b17fbbbd1d838869ec0d40ccd981f022d14af4d649b668e87bae9f58335e7_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/gitops-rhel8@sha256%3A563b17fbbbd1d838869ec0d40ccd981f022d14af4d649b668e87bae9f58335e7?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776769653"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:13171c90460b93c0b375b1a2d3fb82340c29cfcab7e512f2117812d453a0f235_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:13171c90460b93c0b375b1a2d3fb82340c29cfcab7e512f2117812d453a0f235_ppc64le",
"product_id": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:13171c90460b93c0b375b1a2d3fb82340c29cfcab7e512f2117812d453a0f235_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/gitops-rhel8-operator@sha256%3A13171c90460b93c0b375b1a2d3fb82340c29cfcab7e512f2117812d453a0f235?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776769346"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:c471def38bdc188df4fd701792dabc3636bb7fb0476a004c45e8ae0a5b95babc_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:c471def38bdc188df4fd701792dabc3636bb7fb0476a004c45e8ae0a5b95babc_ppc64le",
"product_id": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:c471def38bdc188df4fd701792dabc3636bb7fb0476a004c45e8ae0a5b95babc_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/must-gather-rhel8@sha256%3Ac471def38bdc188df4fd701792dabc3636bb7fb0476a004c45e8ae0a5b95babc?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776767433"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:dff08eed24153cb98b9fdf25702c6edd88467516d3a750f915c2b8972a206b72_s390x",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:dff08eed24153cb98b9fdf25702c6edd88467516d3a750f915c2b8972a206b72_s390x",
"product_id": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:dff08eed24153cb98b9fdf25702c6edd88467516d3a750f915c2b8972a206b72_s390x",
"product_identification_helper": {
"purl": "pkg:oci/argo-rollouts-rhel8@sha256%3Adff08eed24153cb98b9fdf25702c6edd88467516d3a750f915c2b8972a206b72?arch=s390x\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776767098"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:83e7e20877ca983a2f2cf64db0b9b8ac44b4979276f3d3a90cc971f04bf9affb_s390x",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:83e7e20877ca983a2f2cf64db0b9b8ac44b4979276f3d3a90cc971f04bf9affb_s390x",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:83e7e20877ca983a2f2cf64db0b9b8ac44b4979276f3d3a90cc971f04bf9affb_s390x",
"product_identification_helper": {
"purl": "pkg:oci/argocd-rhel8@sha256%3A83e7e20877ca983a2f2cf64db0b9b8ac44b4979276f3d3a90cc971f04bf9affb?arch=s390x\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776768309"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:2bb7b0c12f869e1169b7f71bca827916e1e035df0b60d956cf976df692ff5a0b_s390x",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:2bb7b0c12f869e1169b7f71bca827916e1e035df0b60d956cf976df692ff5a0b_s390x",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:2bb7b0c12f869e1169b7f71bca827916e1e035df0b60d956cf976df692ff5a0b_s390x",
"product_identification_helper": {
"purl": "pkg:oci/argocd-agent-rhel8@sha256%3A2bb7b0c12f869e1169b7f71bca827916e1e035df0b60d956cf976df692ff5a0b?arch=s390x\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776767097"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:3aca316cc39a16b92ca20177841b5d1643e26132f16b9b16dc1b8171587e21ed_s390x",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:3aca316cc39a16b92ca20177841b5d1643e26132f16b9b16dc1b8171587e21ed_s390x",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:3aca316cc39a16b92ca20177841b5d1643e26132f16b9b16dc1b8171587e21ed_s390x",
"product_identification_helper": {
"purl": "pkg:oci/argocd-extensions-rhel8@sha256%3A3aca316cc39a16b92ca20177841b5d1643e26132f16b9b16dc1b8171587e21ed?arch=s390x\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776767002"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:228a16b400172e8b31a8f727d700a50a3aa9a2347527be18495a12370e93ae2b_s390x",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:228a16b400172e8b31a8f727d700a50a3aa9a2347527be18495a12370e93ae2b_s390x",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:228a16b400172e8b31a8f727d700a50a3aa9a2347527be18495a12370e93ae2b_s390x",
"product_identification_helper": {
"purl": "pkg:oci/argocd-image-updater-rhel8@sha256%3A228a16b400172e8b31a8f727d700a50a3aa9a2347527be18495a12370e93ae2b?arch=s390x\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776768525"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:6d93cb87458ad8e74f330e50a6294fca765ff752c5d68815b2ab738d3faa7060_s390x",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:6d93cb87458ad8e74f330e50a6294fca765ff752c5d68815b2ab738d3faa7060_s390x",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:6d93cb87458ad8e74f330e50a6294fca765ff752c5d68815b2ab738d3faa7060_s390x",
"product_identification_helper": {
"purl": "pkg:oci/argocd-rhel9@sha256%3A6d93cb87458ad8e74f330e50a6294fca765ff752c5d68815b2ab738d3faa7060?arch=s390x\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776768092"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:acd235ec47951169c959d86c143e918598748f966067c6ecf339869c6d9a93c9_s390x",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:acd235ec47951169c959d86c143e918598748f966067c6ecf339869c6d9a93c9_s390x",
"product_id": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:acd235ec47951169c959d86c143e918598748f966067c6ecf339869c6d9a93c9_s390x",
"product_identification_helper": {
"purl": "pkg:oci/console-plugin-rhel8@sha256%3Aacd235ec47951169c959d86c143e918598748f966067c6ecf339869c6d9a93c9?arch=s390x\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776769615"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:818a7de4db02d01bc27802d00564e42b4ff0b47df31083450ebe3c739bdc0cbd_s390x",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:818a7de4db02d01bc27802d00564e42b4ff0b47df31083450ebe3c739bdc0cbd_s390x",
"product_id": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:818a7de4db02d01bc27802d00564e42b4ff0b47df31083450ebe3c739bdc0cbd_s390x",
"product_identification_helper": {
"purl": "pkg:oci/dex-rhel8@sha256%3A818a7de4db02d01bc27802d00564e42b4ff0b47df31083450ebe3c739bdc0cbd?arch=s390x\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776767162"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:8ee05240161a2451ccc93b2cf69bff63c4a86386d7170cdd1f13f44fb75d5a36_s390x",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:8ee05240161a2451ccc93b2cf69bff63c4a86386d7170cdd1f13f44fb75d5a36_s390x",
"product_id": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:8ee05240161a2451ccc93b2cf69bff63c4a86386d7170cdd1f13f44fb75d5a36_s390x",
"product_identification_helper": {
"purl": "pkg:oci/gitops-rhel8@sha256%3A8ee05240161a2451ccc93b2cf69bff63c4a86386d7170cdd1f13f44fb75d5a36?arch=s390x\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776769653"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:aeeca8d0d5271705434296005e02d76b1650416703c28ae07a6f74b1ea75acd0_s390x",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:aeeca8d0d5271705434296005e02d76b1650416703c28ae07a6f74b1ea75acd0_s390x",
"product_id": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:aeeca8d0d5271705434296005e02d76b1650416703c28ae07a6f74b1ea75acd0_s390x",
"product_identification_helper": {
"purl": "pkg:oci/gitops-rhel8-operator@sha256%3Aaeeca8d0d5271705434296005e02d76b1650416703c28ae07a6f74b1ea75acd0?arch=s390x\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776769346"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:873c6e93e45c92a4bbe8ffd4a5f9bf68bc840cda6caa1b5f33a2411373c09c2f_s390x",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:873c6e93e45c92a4bbe8ffd4a5f9bf68bc840cda6caa1b5f33a2411373c09c2f_s390x",
"product_id": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:873c6e93e45c92a4bbe8ffd4a5f9bf68bc840cda6caa1b5f33a2411373c09c2f_s390x",
"product_identification_helper": {
"purl": "pkg:oci/must-gather-rhel8@sha256%3A873c6e93e45c92a4bbe8ffd4a5f9bf68bc840cda6caa1b5f33a2411373c09c2f?arch=s390x\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776767433"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:1c5ed08bcdd5c13ba8b98054ddc1dfdc3837d24dcd3b670bdc4ff2453fc37789_amd64 as a component of Red Hat OpenShift GitOps 1.19",
"product_id": "Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:1c5ed08bcdd5c13ba8b98054ddc1dfdc3837d24dcd3b670bdc4ff2453fc37789_amd64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:1c5ed08bcdd5c13ba8b98054ddc1dfdc3837d24dcd3b670bdc4ff2453fc37789_amd64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.19"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:b1d6a23d9957dbe128ba317ed9a0c8028cbea913683bdd8557f6c4caba98d132_ppc64le as a component of Red Hat OpenShift GitOps 1.19",
"product_id": "Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:b1d6a23d9957dbe128ba317ed9a0c8028cbea913683bdd8557f6c4caba98d132_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:b1d6a23d9957dbe128ba317ed9a0c8028cbea913683bdd8557f6c4caba98d132_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.19"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:b3da9ddc02f2caa947f034e64ed37769efa04ff17c98c8b57f21871e058d150d_arm64 as a component of Red Hat OpenShift GitOps 1.19",
"product_id": "Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:b3da9ddc02f2caa947f034e64ed37769efa04ff17c98c8b57f21871e058d150d_arm64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:b3da9ddc02f2caa947f034e64ed37769efa04ff17c98c8b57f21871e058d150d_arm64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.19"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:dff08eed24153cb98b9fdf25702c6edd88467516d3a750f915c2b8972a206b72_s390x as a component of Red Hat OpenShift GitOps 1.19",
"product_id": "Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:dff08eed24153cb98b9fdf25702c6edd88467516d3a750f915c2b8972a206b72_s390x"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:dff08eed24153cb98b9fdf25702c6edd88467516d3a750f915c2b8972a206b72_s390x",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.19"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:2bb7b0c12f869e1169b7f71bca827916e1e035df0b60d956cf976df692ff5a0b_s390x as a component of Red Hat OpenShift GitOps 1.19",
"product_id": "Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:2bb7b0c12f869e1169b7f71bca827916e1e035df0b60d956cf976df692ff5a0b_s390x"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:2bb7b0c12f869e1169b7f71bca827916e1e035df0b60d956cf976df692ff5a0b_s390x",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.19"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:411b46c6b939f0baf070a0e916df823f8dedce22163a7c5be9774724eb6949e6_ppc64le as a component of Red Hat OpenShift GitOps 1.19",
"product_id": "Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:411b46c6b939f0baf070a0e916df823f8dedce22163a7c5be9774724eb6949e6_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:411b46c6b939f0baf070a0e916df823f8dedce22163a7c5be9774724eb6949e6_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.19"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:98a3e4019e9f68050237f34cb7a89c125c317973158184fba55ace5f772cd76a_amd64 as a component of Red Hat OpenShift GitOps 1.19",
"product_id": "Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:98a3e4019e9f68050237f34cb7a89c125c317973158184fba55ace5f772cd76a_amd64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:98a3e4019e9f68050237f34cb7a89c125c317973158184fba55ace5f772cd76a_amd64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.19"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:df066f65a2ebc5a6910e8ff41bfab5c310b3a5739ffdb60501f9941d9961213f_arm64 as a component of Red Hat OpenShift GitOps 1.19",
"product_id": "Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:df066f65a2ebc5a6910e8ff41bfab5c310b3a5739ffdb60501f9941d9961213f_arm64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:df066f65a2ebc5a6910e8ff41bfab5c310b3a5739ffdb60501f9941d9961213f_arm64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.19"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:38a8d2575efdebc83519349b0bba68f72abca3c4bff4731cee24b3983252ad13_arm64 as a component of Red Hat OpenShift GitOps 1.19",
"product_id": "Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:38a8d2575efdebc83519349b0bba68f72abca3c4bff4731cee24b3983252ad13_arm64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:38a8d2575efdebc83519349b0bba68f72abca3c4bff4731cee24b3983252ad13_arm64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.19"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:3aca316cc39a16b92ca20177841b5d1643e26132f16b9b16dc1b8171587e21ed_s390x as a component of Red Hat OpenShift GitOps 1.19",
"product_id": "Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:3aca316cc39a16b92ca20177841b5d1643e26132f16b9b16dc1b8171587e21ed_s390x"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:3aca316cc39a16b92ca20177841b5d1643e26132f16b9b16dc1b8171587e21ed_s390x",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.19"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:b8d4c24efc4d1eb910009373156f8fe1ae2c599a0dff0f278382aedd4cab9a1f_amd64 as a component of Red Hat OpenShift GitOps 1.19",
"product_id": "Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:b8d4c24efc4d1eb910009373156f8fe1ae2c599a0dff0f278382aedd4cab9a1f_amd64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:b8d4c24efc4d1eb910009373156f8fe1ae2c599a0dff0f278382aedd4cab9a1f_amd64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.19"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:f130e22e260da1e96c10d791f126c1ffc8585ba663918557295f281c4c2a9c17_ppc64le as a component of Red Hat OpenShift GitOps 1.19",
"product_id": "Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:f130e22e260da1e96c10d791f126c1ffc8585ba663918557295f281c4c2a9c17_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:f130e22e260da1e96c10d791f126c1ffc8585ba663918557295f281c4c2a9c17_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.19"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:228a16b400172e8b31a8f727d700a50a3aa9a2347527be18495a12370e93ae2b_s390x as a component of Red Hat OpenShift GitOps 1.19",
"product_id": "Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:228a16b400172e8b31a8f727d700a50a3aa9a2347527be18495a12370e93ae2b_s390x"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:228a16b400172e8b31a8f727d700a50a3aa9a2347527be18495a12370e93ae2b_s390x",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.19"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:6b755ab049dfa8a5f89dbde3bed00275b9ff807b338b2a7ecdaefeaed83b0bbc_amd64 as a component of Red Hat OpenShift GitOps 1.19",
"product_id": "Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:6b755ab049dfa8a5f89dbde3bed00275b9ff807b338b2a7ecdaefeaed83b0bbc_amd64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:6b755ab049dfa8a5f89dbde3bed00275b9ff807b338b2a7ecdaefeaed83b0bbc_amd64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.19"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:8d7aa2c0b97e86fb6d8ef542b5f6ab05bded9769d5beb4a3ae0e4dd4b77e6dae_ppc64le as a component of Red Hat OpenShift GitOps 1.19",
"product_id": "Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:8d7aa2c0b97e86fb6d8ef542b5f6ab05bded9769d5beb4a3ae0e4dd4b77e6dae_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:8d7aa2c0b97e86fb6d8ef542b5f6ab05bded9769d5beb4a3ae0e4dd4b77e6dae_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.19"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:cc8347691a1ad2bbcffd256a632ad6ac6768b1491af96ab2df1dbc106bf8b189_arm64 as a component of Red Hat OpenShift GitOps 1.19",
"product_id": "Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:cc8347691a1ad2bbcffd256a632ad6ac6768b1491af96ab2df1dbc106bf8b189_arm64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:cc8347691a1ad2bbcffd256a632ad6ac6768b1491af96ab2df1dbc106bf8b189_arm64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.19"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:04673bdebda425bad1c73fa2c99e89016b90adde92ab5b18854a213099e16f99_ppc64le as a component of Red Hat OpenShift GitOps 1.19",
"product_id": "Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:04673bdebda425bad1c73fa2c99e89016b90adde92ab5b18854a213099e16f99_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:04673bdebda425bad1c73fa2c99e89016b90adde92ab5b18854a213099e16f99_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.19"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:83c466b8c9310f0dc498870c25d43b96ba051de4509d6134540c561b05a12d02_amd64 as a component of Red Hat OpenShift GitOps 1.19",
"product_id": "Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:83c466b8c9310f0dc498870c25d43b96ba051de4509d6134540c561b05a12d02_amd64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:83c466b8c9310f0dc498870c25d43b96ba051de4509d6134540c561b05a12d02_amd64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.19"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:83e7e20877ca983a2f2cf64db0b9b8ac44b4979276f3d3a90cc971f04bf9affb_s390x as a component of Red Hat OpenShift GitOps 1.19",
"product_id": "Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:83e7e20877ca983a2f2cf64db0b9b8ac44b4979276f3d3a90cc971f04bf9affb_s390x"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:83e7e20877ca983a2f2cf64db0b9b8ac44b4979276f3d3a90cc971f04bf9affb_s390x",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.19"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:c1f0cff25f290e7e9834372bc5bb3e63aad754ae3fe13a11c502eec3f5c8a8b9_arm64 as a component of Red Hat OpenShift GitOps 1.19",
"product_id": "Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:c1f0cff25f290e7e9834372bc5bb3e63aad754ae3fe13a11c502eec3f5c8a8b9_arm64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:c1f0cff25f290e7e9834372bc5bb3e63aad754ae3fe13a11c502eec3f5c8a8b9_arm64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.19"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:6d93cb87458ad8e74f330e50a6294fca765ff752c5d68815b2ab738d3faa7060_s390x as a component of Red Hat OpenShift GitOps 1.19",
"product_id": "Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:6d93cb87458ad8e74f330e50a6294fca765ff752c5d68815b2ab738d3faa7060_s390x"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:6d93cb87458ad8e74f330e50a6294fca765ff752c5d68815b2ab738d3faa7060_s390x",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.19"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:8f9477ae0de3e4b1d039bc6901cec348eb4d4bdde8b8b85775ddff4db2a08c1b_amd64 as a component of Red Hat OpenShift GitOps 1.19",
"product_id": "Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:8f9477ae0de3e4b1d039bc6901cec348eb4d4bdde8b8b85775ddff4db2a08c1b_amd64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:8f9477ae0de3e4b1d039bc6901cec348eb4d4bdde8b8b85775ddff4db2a08c1b_amd64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.19"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:943616dc45c24ce59a6962443814dce9f4076d5bd25c041830da5e9ada2dbf1b_ppc64le as a component of Red Hat OpenShift GitOps 1.19",
"product_id": "Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:943616dc45c24ce59a6962443814dce9f4076d5bd25c041830da5e9ada2dbf1b_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:943616dc45c24ce59a6962443814dce9f4076d5bd25c041830da5e9ada2dbf1b_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.19"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:bb9a3e9293c5b5b131632a32a56b13c7093e2e9881e50d48940d2259facc3777_arm64 as a component of Red Hat OpenShift GitOps 1.19",
"product_id": "Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:bb9a3e9293c5b5b131632a32a56b13c7093e2e9881e50d48940d2259facc3777_arm64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:bb9a3e9293c5b5b131632a32a56b13c7093e2e9881e50d48940d2259facc3777_arm64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.19"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:19e0b44f05c4131e6ce86ebba2626aac49c7b3dbdc4f1a403c025234ad17853d_amd64 as a component of Red Hat OpenShift GitOps 1.19",
"product_id": "Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:19e0b44f05c4131e6ce86ebba2626aac49c7b3dbdc4f1a403c025234ad17853d_amd64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:19e0b44f05c4131e6ce86ebba2626aac49c7b3dbdc4f1a403c025234ad17853d_amd64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.19"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:23837525f1a838bb9b4b456bb0a06020406c965784f3353690b5f7738007ae75_ppc64le as a component of Red Hat OpenShift GitOps 1.19",
"product_id": "Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:23837525f1a838bb9b4b456bb0a06020406c965784f3353690b5f7738007ae75_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:23837525f1a838bb9b4b456bb0a06020406c965784f3353690b5f7738007ae75_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.19"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:879902f60fe7a589c6fb0fde87111cd39fc058b2958ef3b24f7a919af64eef79_arm64 as a component of Red Hat OpenShift GitOps 1.19",
"product_id": "Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:879902f60fe7a589c6fb0fde87111cd39fc058b2958ef3b24f7a919af64eef79_arm64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:879902f60fe7a589c6fb0fde87111cd39fc058b2958ef3b24f7a919af64eef79_arm64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.19"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:acd235ec47951169c959d86c143e918598748f966067c6ecf339869c6d9a93c9_s390x as a component of Red Hat OpenShift GitOps 1.19",
"product_id": "Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:acd235ec47951169c959d86c143e918598748f966067c6ecf339869c6d9a93c9_s390x"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:acd235ec47951169c959d86c143e918598748f966067c6ecf339869c6d9a93c9_s390x",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.19"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:818a7de4db02d01bc27802d00564e42b4ff0b47df31083450ebe3c739bdc0cbd_s390x as a component of Red Hat OpenShift GitOps 1.19",
"product_id": "Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:818a7de4db02d01bc27802d00564e42b4ff0b47df31083450ebe3c739bdc0cbd_s390x"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:818a7de4db02d01bc27802d00564e42b4ff0b47df31083450ebe3c739bdc0cbd_s390x",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.19"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:9fce35bd136512e2b6bd09e6c82c73800c7b35e101578553ac26906c1982cbe1_ppc64le as a component of Red Hat OpenShift GitOps 1.19",
"product_id": "Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:9fce35bd136512e2b6bd09e6c82c73800c7b35e101578553ac26906c1982cbe1_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:9fce35bd136512e2b6bd09e6c82c73800c7b35e101578553ac26906c1982cbe1_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.19"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:a7940ced8ebfc480ff4e3daecd6362ec60bc94e7bcfa7d80275f2a3f97eb6f3e_amd64 as a component of Red Hat OpenShift GitOps 1.19",
"product_id": "Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:a7940ced8ebfc480ff4e3daecd6362ec60bc94e7bcfa7d80275f2a3f97eb6f3e_amd64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:a7940ced8ebfc480ff4e3daecd6362ec60bc94e7bcfa7d80275f2a3f97eb6f3e_amd64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.19"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:afca2f8a7181495c6612461542ec7a2a12b4d4bc5795a0fb84302ff3c9c984fd_arm64 as a component of Red Hat OpenShift GitOps 1.19",
"product_id": "Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:afca2f8a7181495c6612461542ec7a2a12b4d4bc5795a0fb84302ff3c9c984fd_arm64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:afca2f8a7181495c6612461542ec7a2a12b4d4bc5795a0fb84302ff3c9c984fd_arm64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.19"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:9d16d9f172618c8f03b2b5b930220761ed97faa90ebd38f570d60bed5216b433_amd64 as a component of Red Hat OpenShift GitOps 1.19",
"product_id": "Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:9d16d9f172618c8f03b2b5b930220761ed97faa90ebd38f570d60bed5216b433_amd64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:9d16d9f172618c8f03b2b5b930220761ed97faa90ebd38f570d60bed5216b433_amd64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.19"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:0acb623e826efb64e304c73a412605efcab0f944f93dbe87fe39c70d39403a64_amd64 as a component of Red Hat OpenShift GitOps 1.19",
"product_id": "Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:0acb623e826efb64e304c73a412605efcab0f944f93dbe87fe39c70d39403a64_amd64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:0acb623e826efb64e304c73a412605efcab0f944f93dbe87fe39c70d39403a64_amd64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.19"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:13171c90460b93c0b375b1a2d3fb82340c29cfcab7e512f2117812d453a0f235_ppc64le as a component of Red Hat OpenShift GitOps 1.19",
"product_id": "Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:13171c90460b93c0b375b1a2d3fb82340c29cfcab7e512f2117812d453a0f235_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:13171c90460b93c0b375b1a2d3fb82340c29cfcab7e512f2117812d453a0f235_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.19"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:aeeca8d0d5271705434296005e02d76b1650416703c28ae07a6f74b1ea75acd0_s390x as a component of Red Hat OpenShift GitOps 1.19",
"product_id": "Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:aeeca8d0d5271705434296005e02d76b1650416703c28ae07a6f74b1ea75acd0_s390x"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:aeeca8d0d5271705434296005e02d76b1650416703c28ae07a6f74b1ea75acd0_s390x",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.19"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:d1796795ff523d6866d3ccacf5a5b9b632e878b1129d6ceeacd8169535285999_arm64 as a component of Red Hat OpenShift GitOps 1.19",
"product_id": "Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:d1796795ff523d6866d3ccacf5a5b9b632e878b1129d6ceeacd8169535285999_arm64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:d1796795ff523d6866d3ccacf5a5b9b632e878b1129d6ceeacd8169535285999_arm64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.19"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:563b17fbbbd1d838869ec0d40ccd981f022d14af4d649b668e87bae9f58335e7_ppc64le as a component of Red Hat OpenShift GitOps 1.19",
"product_id": "Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:563b17fbbbd1d838869ec0d40ccd981f022d14af4d649b668e87bae9f58335e7_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:563b17fbbbd1d838869ec0d40ccd981f022d14af4d649b668e87bae9f58335e7_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.19"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:8ee05240161a2451ccc93b2cf69bff63c4a86386d7170cdd1f13f44fb75d5a36_s390x as a component of Red Hat OpenShift GitOps 1.19",
"product_id": "Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:8ee05240161a2451ccc93b2cf69bff63c4a86386d7170cdd1f13f44fb75d5a36_s390x"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:8ee05240161a2451ccc93b2cf69bff63c4a86386d7170cdd1f13f44fb75d5a36_s390x",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.19"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:c611a1baeca063e4cc10653601f9223f84f81cfec211a01c32b8f205b6eb3ad9_arm64 as a component of Red Hat OpenShift GitOps 1.19",
"product_id": "Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:c611a1baeca063e4cc10653601f9223f84f81cfec211a01c32b8f205b6eb3ad9_arm64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:c611a1baeca063e4cc10653601f9223f84f81cfec211a01c32b8f205b6eb3ad9_arm64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.19"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:e60e4e0c97f98a424b1110f0dad7e0cc3f739c6b4076ffe0534d789eb99a35ec_amd64 as a component of Red Hat OpenShift GitOps 1.19",
"product_id": "Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:e60e4e0c97f98a424b1110f0dad7e0cc3f739c6b4076ffe0534d789eb99a35ec_amd64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:e60e4e0c97f98a424b1110f0dad7e0cc3f739c6b4076ffe0534d789eb99a35ec_amd64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.19"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:873c6e93e45c92a4bbe8ffd4a5f9bf68bc840cda6caa1b5f33a2411373c09c2f_s390x as a component of Red Hat OpenShift GitOps 1.19",
"product_id": "Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:873c6e93e45c92a4bbe8ffd4a5f9bf68bc840cda6caa1b5f33a2411373c09c2f_s390x"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:873c6e93e45c92a4bbe8ffd4a5f9bf68bc840cda6caa1b5f33a2411373c09c2f_s390x",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.19"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:b27b5fd2989d7575476b2fd0f973424700223aeb1810136bf67d0a8f0659eaa4_amd64 as a component of Red Hat OpenShift GitOps 1.19",
"product_id": "Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:b27b5fd2989d7575476b2fd0f973424700223aeb1810136bf67d0a8f0659eaa4_amd64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:b27b5fd2989d7575476b2fd0f973424700223aeb1810136bf67d0a8f0659eaa4_amd64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.19"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:b5ac788322829cf0a9ae32fbb17c29d23722fc7b6d8df59a9e82926ceec239fa_arm64 as a component of Red Hat OpenShift GitOps 1.19",
"product_id": "Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:b5ac788322829cf0a9ae32fbb17c29d23722fc7b6d8df59a9e82926ceec239fa_arm64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:b5ac788322829cf0a9ae32fbb17c29d23722fc7b6d8df59a9e82926ceec239fa_arm64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.19"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:c471def38bdc188df4fd701792dabc3636bb7fb0476a004c45e8ae0a5b95babc_ppc64le as a component of Red Hat OpenShift GitOps 1.19",
"product_id": "Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:c471def38bdc188df4fd701792dabc3636bb7fb0476a004c45e8ae0a5b95babc_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:c471def38bdc188df4fd701792dabc3636bb7fb0476a004c45e8ae0a5b95babc_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.19"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-27137",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"discovery_date": "2026-03-06T22:01:38.859733+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:1c5ed08bcdd5c13ba8b98054ddc1dfdc3837d24dcd3b670bdc4ff2453fc37789_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:b1d6a23d9957dbe128ba317ed9a0c8028cbea913683bdd8557f6c4caba98d132_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:b3da9ddc02f2caa947f034e64ed37769efa04ff17c98c8b57f21871e058d150d_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:dff08eed24153cb98b9fdf25702c6edd88467516d3a750f915c2b8972a206b72_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:2bb7b0c12f869e1169b7f71bca827916e1e035df0b60d956cf976df692ff5a0b_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:411b46c6b939f0baf070a0e916df823f8dedce22163a7c5be9774724eb6949e6_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:98a3e4019e9f68050237f34cb7a89c125c317973158184fba55ace5f772cd76a_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:df066f65a2ebc5a6910e8ff41bfab5c310b3a5739ffdb60501f9941d9961213f_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:38a8d2575efdebc83519349b0bba68f72abca3c4bff4731cee24b3983252ad13_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:3aca316cc39a16b92ca20177841b5d1643e26132f16b9b16dc1b8171587e21ed_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:b8d4c24efc4d1eb910009373156f8fe1ae2c599a0dff0f278382aedd4cab9a1f_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:f130e22e260da1e96c10d791f126c1ffc8585ba663918557295f281c4c2a9c17_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:228a16b400172e8b31a8f727d700a50a3aa9a2347527be18495a12370e93ae2b_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:6b755ab049dfa8a5f89dbde3bed00275b9ff807b338b2a7ecdaefeaed83b0bbc_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:8d7aa2c0b97e86fb6d8ef542b5f6ab05bded9769d5beb4a3ae0e4dd4b77e6dae_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:cc8347691a1ad2bbcffd256a632ad6ac6768b1491af96ab2df1dbc106bf8b189_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:04673bdebda425bad1c73fa2c99e89016b90adde92ab5b18854a213099e16f99_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:83c466b8c9310f0dc498870c25d43b96ba051de4509d6134540c561b05a12d02_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:83e7e20877ca983a2f2cf64db0b9b8ac44b4979276f3d3a90cc971f04bf9affb_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:c1f0cff25f290e7e9834372bc5bb3e63aad754ae3fe13a11c502eec3f5c8a8b9_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:6d93cb87458ad8e74f330e50a6294fca765ff752c5d68815b2ab738d3faa7060_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:8f9477ae0de3e4b1d039bc6901cec348eb4d4bdde8b8b85775ddff4db2a08c1b_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:943616dc45c24ce59a6962443814dce9f4076d5bd25c041830da5e9ada2dbf1b_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:bb9a3e9293c5b5b131632a32a56b13c7093e2e9881e50d48940d2259facc3777_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:19e0b44f05c4131e6ce86ebba2626aac49c7b3dbdc4f1a403c025234ad17853d_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:23837525f1a838bb9b4b456bb0a06020406c965784f3353690b5f7738007ae75_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:879902f60fe7a589c6fb0fde87111cd39fc058b2958ef3b24f7a919af64eef79_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:acd235ec47951169c959d86c143e918598748f966067c6ecf339869c6d9a93c9_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:9d16d9f172618c8f03b2b5b930220761ed97faa90ebd38f570d60bed5216b433_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:0acb623e826efb64e304c73a412605efcab0f944f93dbe87fe39c70d39403a64_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:13171c90460b93c0b375b1a2d3fb82340c29cfcab7e512f2117812d453a0f235_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:aeeca8d0d5271705434296005e02d76b1650416703c28ae07a6f74b1ea75acd0_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:d1796795ff523d6866d3ccacf5a5b9b632e878b1129d6ceeacd8169535285999_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:563b17fbbbd1d838869ec0d40ccd981f022d14af4d649b668e87bae9f58335e7_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:8ee05240161a2451ccc93b2cf69bff63c4a86386d7170cdd1f13f44fb75d5a36_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:c611a1baeca063e4cc10653601f9223f84f81cfec211a01c32b8f205b6eb3ad9_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:e60e4e0c97f98a424b1110f0dad7e0cc3f739c6b4076ffe0534d789eb99a35ec_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:873c6e93e45c92a4bbe8ffd4a5f9bf68bc840cda6caa1b5f33a2411373c09c2f_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:b27b5fd2989d7575476b2fd0f973424700223aeb1810136bf67d0a8f0659eaa4_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:b5ac788322829cf0a9ae32fbb17c29d23722fc7b6d8df59a9e82926ceec239fa_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:c471def38bdc188df4fd701792dabc3636bb7fb0476a004c45e8ae0a5b95babc_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2445345"
}
],
"notes": [
{
"category": "description",
"text": "A certificate validation flaw has been discovered in the golang crypto/x509 module. When verifying a certificate chain which contains a certificate containing multiple email address constraints which share common local portions but different domain portions, these constraints will not be properly applied, and only the last constraint will be considered.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: Incorrect enforcement of email constraints in crypto/x509",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:818a7de4db02d01bc27802d00564e42b4ff0b47df31083450ebe3c739bdc0cbd_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:9fce35bd136512e2b6bd09e6c82c73800c7b35e101578553ac26906c1982cbe1_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:a7940ced8ebfc480ff4e3daecd6362ec60bc94e7bcfa7d80275f2a3f97eb6f3e_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:afca2f8a7181495c6612461542ec7a2a12b4d4bc5795a0fb84302ff3c9c984fd_arm64"
],
"known_not_affected": [
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:1c5ed08bcdd5c13ba8b98054ddc1dfdc3837d24dcd3b670bdc4ff2453fc37789_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:b1d6a23d9957dbe128ba317ed9a0c8028cbea913683bdd8557f6c4caba98d132_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:b3da9ddc02f2caa947f034e64ed37769efa04ff17c98c8b57f21871e058d150d_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:dff08eed24153cb98b9fdf25702c6edd88467516d3a750f915c2b8972a206b72_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:2bb7b0c12f869e1169b7f71bca827916e1e035df0b60d956cf976df692ff5a0b_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:411b46c6b939f0baf070a0e916df823f8dedce22163a7c5be9774724eb6949e6_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:98a3e4019e9f68050237f34cb7a89c125c317973158184fba55ace5f772cd76a_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:df066f65a2ebc5a6910e8ff41bfab5c310b3a5739ffdb60501f9941d9961213f_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:38a8d2575efdebc83519349b0bba68f72abca3c4bff4731cee24b3983252ad13_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:3aca316cc39a16b92ca20177841b5d1643e26132f16b9b16dc1b8171587e21ed_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:b8d4c24efc4d1eb910009373156f8fe1ae2c599a0dff0f278382aedd4cab9a1f_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:f130e22e260da1e96c10d791f126c1ffc8585ba663918557295f281c4c2a9c17_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:228a16b400172e8b31a8f727d700a50a3aa9a2347527be18495a12370e93ae2b_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:6b755ab049dfa8a5f89dbde3bed00275b9ff807b338b2a7ecdaefeaed83b0bbc_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:8d7aa2c0b97e86fb6d8ef542b5f6ab05bded9769d5beb4a3ae0e4dd4b77e6dae_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:cc8347691a1ad2bbcffd256a632ad6ac6768b1491af96ab2df1dbc106bf8b189_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:04673bdebda425bad1c73fa2c99e89016b90adde92ab5b18854a213099e16f99_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:83c466b8c9310f0dc498870c25d43b96ba051de4509d6134540c561b05a12d02_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:83e7e20877ca983a2f2cf64db0b9b8ac44b4979276f3d3a90cc971f04bf9affb_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:c1f0cff25f290e7e9834372bc5bb3e63aad754ae3fe13a11c502eec3f5c8a8b9_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:6d93cb87458ad8e74f330e50a6294fca765ff752c5d68815b2ab738d3faa7060_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:8f9477ae0de3e4b1d039bc6901cec348eb4d4bdde8b8b85775ddff4db2a08c1b_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:943616dc45c24ce59a6962443814dce9f4076d5bd25c041830da5e9ada2dbf1b_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:bb9a3e9293c5b5b131632a32a56b13c7093e2e9881e50d48940d2259facc3777_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:19e0b44f05c4131e6ce86ebba2626aac49c7b3dbdc4f1a403c025234ad17853d_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:23837525f1a838bb9b4b456bb0a06020406c965784f3353690b5f7738007ae75_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:879902f60fe7a589c6fb0fde87111cd39fc058b2958ef3b24f7a919af64eef79_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:acd235ec47951169c959d86c143e918598748f966067c6ecf339869c6d9a93c9_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:9d16d9f172618c8f03b2b5b930220761ed97faa90ebd38f570d60bed5216b433_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:0acb623e826efb64e304c73a412605efcab0f944f93dbe87fe39c70d39403a64_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:13171c90460b93c0b375b1a2d3fb82340c29cfcab7e512f2117812d453a0f235_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:aeeca8d0d5271705434296005e02d76b1650416703c28ae07a6f74b1ea75acd0_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:d1796795ff523d6866d3ccacf5a5b9b632e878b1129d6ceeacd8169535285999_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:563b17fbbbd1d838869ec0d40ccd981f022d14af4d649b668e87bae9f58335e7_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:8ee05240161a2451ccc93b2cf69bff63c4a86386d7170cdd1f13f44fb75d5a36_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:c611a1baeca063e4cc10653601f9223f84f81cfec211a01c32b8f205b6eb3ad9_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:e60e4e0c97f98a424b1110f0dad7e0cc3f739c6b4076ffe0534d789eb99a35ec_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:873c6e93e45c92a4bbe8ffd4a5f9bf68bc840cda6caa1b5f33a2411373c09c2f_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:b27b5fd2989d7575476b2fd0f973424700223aeb1810136bf67d0a8f0659eaa4_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:b5ac788322829cf0a9ae32fbb17c29d23722fc7b6d8df59a9e82926ceec239fa_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:c471def38bdc188df4fd701792dabc3636bb7fb0476a004c45e8ae0a5b95babc_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-27137"
},
{
"category": "external",
"summary": "RHBZ#2445345",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2445345"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-27137",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27137"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-27137",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27137"
},
{
"category": "external",
"summary": "https://go.dev/cl/752182",
"url": "https://go.dev/cl/752182"
},
{
"category": "external",
"summary": "https://go.dev/issue/77952",
"url": "https://go.dev/issue/77952"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk",
"url": "https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4599",
"url": "https://pkg.go.dev/vuln/GO-2026-4599"
}
],
"release_date": "2026-03-06T21:28:13.748000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-22T12:29:18+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:818a7de4db02d01bc27802d00564e42b4ff0b47df31083450ebe3c739bdc0cbd_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:9fce35bd136512e2b6bd09e6c82c73800c7b35e101578553ac26906c1982cbe1_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:a7940ced8ebfc480ff4e3daecd6362ec60bc94e7bcfa7d80275f2a3f97eb6f3e_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:afca2f8a7181495c6612461542ec7a2a12b4d4bc5795a0fb84302ff3c9c984fd_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:9698"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:1c5ed08bcdd5c13ba8b98054ddc1dfdc3837d24dcd3b670bdc4ff2453fc37789_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:b1d6a23d9957dbe128ba317ed9a0c8028cbea913683bdd8557f6c4caba98d132_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:b3da9ddc02f2caa947f034e64ed37769efa04ff17c98c8b57f21871e058d150d_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:dff08eed24153cb98b9fdf25702c6edd88467516d3a750f915c2b8972a206b72_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:2bb7b0c12f869e1169b7f71bca827916e1e035df0b60d956cf976df692ff5a0b_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:411b46c6b939f0baf070a0e916df823f8dedce22163a7c5be9774724eb6949e6_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:98a3e4019e9f68050237f34cb7a89c125c317973158184fba55ace5f772cd76a_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:df066f65a2ebc5a6910e8ff41bfab5c310b3a5739ffdb60501f9941d9961213f_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:38a8d2575efdebc83519349b0bba68f72abca3c4bff4731cee24b3983252ad13_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:3aca316cc39a16b92ca20177841b5d1643e26132f16b9b16dc1b8171587e21ed_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:b8d4c24efc4d1eb910009373156f8fe1ae2c599a0dff0f278382aedd4cab9a1f_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:f130e22e260da1e96c10d791f126c1ffc8585ba663918557295f281c4c2a9c17_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:228a16b400172e8b31a8f727d700a50a3aa9a2347527be18495a12370e93ae2b_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:6b755ab049dfa8a5f89dbde3bed00275b9ff807b338b2a7ecdaefeaed83b0bbc_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:8d7aa2c0b97e86fb6d8ef542b5f6ab05bded9769d5beb4a3ae0e4dd4b77e6dae_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:cc8347691a1ad2bbcffd256a632ad6ac6768b1491af96ab2df1dbc106bf8b189_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:04673bdebda425bad1c73fa2c99e89016b90adde92ab5b18854a213099e16f99_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:83c466b8c9310f0dc498870c25d43b96ba051de4509d6134540c561b05a12d02_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:83e7e20877ca983a2f2cf64db0b9b8ac44b4979276f3d3a90cc971f04bf9affb_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:c1f0cff25f290e7e9834372bc5bb3e63aad754ae3fe13a11c502eec3f5c8a8b9_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:6d93cb87458ad8e74f330e50a6294fca765ff752c5d68815b2ab738d3faa7060_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:8f9477ae0de3e4b1d039bc6901cec348eb4d4bdde8b8b85775ddff4db2a08c1b_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:943616dc45c24ce59a6962443814dce9f4076d5bd25c041830da5e9ada2dbf1b_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:bb9a3e9293c5b5b131632a32a56b13c7093e2e9881e50d48940d2259facc3777_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:19e0b44f05c4131e6ce86ebba2626aac49c7b3dbdc4f1a403c025234ad17853d_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:23837525f1a838bb9b4b456bb0a06020406c965784f3353690b5f7738007ae75_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:879902f60fe7a589c6fb0fde87111cd39fc058b2958ef3b24f7a919af64eef79_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:acd235ec47951169c959d86c143e918598748f966067c6ecf339869c6d9a93c9_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:818a7de4db02d01bc27802d00564e42b4ff0b47df31083450ebe3c739bdc0cbd_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:9fce35bd136512e2b6bd09e6c82c73800c7b35e101578553ac26906c1982cbe1_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:a7940ced8ebfc480ff4e3daecd6362ec60bc94e7bcfa7d80275f2a3f97eb6f3e_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:afca2f8a7181495c6612461542ec7a2a12b4d4bc5795a0fb84302ff3c9c984fd_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:9d16d9f172618c8f03b2b5b930220761ed97faa90ebd38f570d60bed5216b433_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:0acb623e826efb64e304c73a412605efcab0f944f93dbe87fe39c70d39403a64_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:13171c90460b93c0b375b1a2d3fb82340c29cfcab7e512f2117812d453a0f235_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:aeeca8d0d5271705434296005e02d76b1650416703c28ae07a6f74b1ea75acd0_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:d1796795ff523d6866d3ccacf5a5b9b632e878b1129d6ceeacd8169535285999_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:563b17fbbbd1d838869ec0d40ccd981f022d14af4d649b668e87bae9f58335e7_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:8ee05240161a2451ccc93b2cf69bff63c4a86386d7170cdd1f13f44fb75d5a36_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:c611a1baeca063e4cc10653601f9223f84f81cfec211a01c32b8f205b6eb3ad9_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:e60e4e0c97f98a424b1110f0dad7e0cc3f739c6b4076ffe0534d789eb99a35ec_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:873c6e93e45c92a4bbe8ffd4a5f9bf68bc840cda6caa1b5f33a2411373c09c2f_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:b27b5fd2989d7575476b2fd0f973424700223aeb1810136bf67d0a8f0659eaa4_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:b5ac788322829cf0a9ae32fbb17c29d23722fc7b6d8df59a9e82926ceec239fa_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:c471def38bdc188df4fd701792dabc3636bb7fb0476a004c45e8ae0a5b95babc_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:1c5ed08bcdd5c13ba8b98054ddc1dfdc3837d24dcd3b670bdc4ff2453fc37789_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:b1d6a23d9957dbe128ba317ed9a0c8028cbea913683bdd8557f6c4caba98d132_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:b3da9ddc02f2caa947f034e64ed37769efa04ff17c98c8b57f21871e058d150d_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:dff08eed24153cb98b9fdf25702c6edd88467516d3a750f915c2b8972a206b72_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:2bb7b0c12f869e1169b7f71bca827916e1e035df0b60d956cf976df692ff5a0b_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:411b46c6b939f0baf070a0e916df823f8dedce22163a7c5be9774724eb6949e6_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:98a3e4019e9f68050237f34cb7a89c125c317973158184fba55ace5f772cd76a_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:df066f65a2ebc5a6910e8ff41bfab5c310b3a5739ffdb60501f9941d9961213f_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:38a8d2575efdebc83519349b0bba68f72abca3c4bff4731cee24b3983252ad13_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:3aca316cc39a16b92ca20177841b5d1643e26132f16b9b16dc1b8171587e21ed_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:b8d4c24efc4d1eb910009373156f8fe1ae2c599a0dff0f278382aedd4cab9a1f_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:f130e22e260da1e96c10d791f126c1ffc8585ba663918557295f281c4c2a9c17_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:228a16b400172e8b31a8f727d700a50a3aa9a2347527be18495a12370e93ae2b_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:6b755ab049dfa8a5f89dbde3bed00275b9ff807b338b2a7ecdaefeaed83b0bbc_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:8d7aa2c0b97e86fb6d8ef542b5f6ab05bded9769d5beb4a3ae0e4dd4b77e6dae_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:cc8347691a1ad2bbcffd256a632ad6ac6768b1491af96ab2df1dbc106bf8b189_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:04673bdebda425bad1c73fa2c99e89016b90adde92ab5b18854a213099e16f99_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:83c466b8c9310f0dc498870c25d43b96ba051de4509d6134540c561b05a12d02_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:83e7e20877ca983a2f2cf64db0b9b8ac44b4979276f3d3a90cc971f04bf9affb_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:c1f0cff25f290e7e9834372bc5bb3e63aad754ae3fe13a11c502eec3f5c8a8b9_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:6d93cb87458ad8e74f330e50a6294fca765ff752c5d68815b2ab738d3faa7060_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:8f9477ae0de3e4b1d039bc6901cec348eb4d4bdde8b8b85775ddff4db2a08c1b_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:943616dc45c24ce59a6962443814dce9f4076d5bd25c041830da5e9ada2dbf1b_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:bb9a3e9293c5b5b131632a32a56b13c7093e2e9881e50d48940d2259facc3777_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:19e0b44f05c4131e6ce86ebba2626aac49c7b3dbdc4f1a403c025234ad17853d_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:23837525f1a838bb9b4b456bb0a06020406c965784f3353690b5f7738007ae75_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:879902f60fe7a589c6fb0fde87111cd39fc058b2958ef3b24f7a919af64eef79_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:acd235ec47951169c959d86c143e918598748f966067c6ecf339869c6d9a93c9_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:818a7de4db02d01bc27802d00564e42b4ff0b47df31083450ebe3c739bdc0cbd_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:9fce35bd136512e2b6bd09e6c82c73800c7b35e101578553ac26906c1982cbe1_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:a7940ced8ebfc480ff4e3daecd6362ec60bc94e7bcfa7d80275f2a3f97eb6f3e_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:afca2f8a7181495c6612461542ec7a2a12b4d4bc5795a0fb84302ff3c9c984fd_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:9d16d9f172618c8f03b2b5b930220761ed97faa90ebd38f570d60bed5216b433_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:0acb623e826efb64e304c73a412605efcab0f944f93dbe87fe39c70d39403a64_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:13171c90460b93c0b375b1a2d3fb82340c29cfcab7e512f2117812d453a0f235_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:aeeca8d0d5271705434296005e02d76b1650416703c28ae07a6f74b1ea75acd0_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:d1796795ff523d6866d3ccacf5a5b9b632e878b1129d6ceeacd8169535285999_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:563b17fbbbd1d838869ec0d40ccd981f022d14af4d649b668e87bae9f58335e7_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:8ee05240161a2451ccc93b2cf69bff63c4a86386d7170cdd1f13f44fb75d5a36_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:c611a1baeca063e4cc10653601f9223f84f81cfec211a01c32b8f205b6eb3ad9_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:e60e4e0c97f98a424b1110f0dad7e0cc3f739c6b4076ffe0534d789eb99a35ec_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:873c6e93e45c92a4bbe8ffd4a5f9bf68bc840cda6caa1b5f33a2411373c09c2f_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:b27b5fd2989d7575476b2fd0f973424700223aeb1810136bf67d0a8f0659eaa4_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:b5ac788322829cf0a9ae32fbb17c29d23722fc7b6d8df59a9e82926ceec239fa_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:c471def38bdc188df4fd701792dabc3636bb7fb0476a004c45e8ae0a5b95babc_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: Incorrect enforcement of email constraints in crypto/x509"
}
]
}
RHSA-2026:9697
Vulnerability from csaf_redhat - Published: 2026-04-22 12:28 - Updated: 2026-04-23 02:09A certificate validation flaw has been discovered in the golang crypto/x509 module. When verifying a certificate chain which contains a certificate containing multiple email address constraints which share common local portions but different domain portions, these constraints will not be properly applied, and only the last constraint will be considered.
| URL | Category | ||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Important: Red Hat OpenShift GitOps v1.18.5 security update",
"title": "Topic"
},
{
"category": "general",
"text": "An update is now available for Red Hat OpenShift GitOps.\nBug Fix(es) and Enhancement(s):\n* GITOPS-9158 (OpenShift Gitops Operator v1.19.2 has hardcoded pod-security labels which conflict OCP \u003c= 4.16 )\n* GITOPS-9587 (multiple CVEs in ose-kube-rbac-proxy images included in OpenShift GitOps v1.19.2 and v1.20.1)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:9697",
"url": "https://access.redhat.com/errata/RHSA-2026:9697"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-27137",
"url": "https://access.redhat.com/security/cve/CVE-2026-27137"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/red_hat_openshift_gitops/1.18/",
"url": "https://docs.redhat.com/en/documentation/red_hat_openshift_gitops/1.18/"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_9697.json"
}
],
"title": "Red Hat Security Advisory: Red Hat OpenShift GitOps v1.18.5 security update",
"tracking": {
"current_release_date": "2026-04-23T02:09:17+00:00",
"generator": {
"date": "2026-04-23T02:09:17+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.5"
}
},
"id": "RHSA-2026:9697",
"initial_release_date": "2026-04-22T12:28:10+00:00",
"revision_history": [
{
"date": "2026-04-22T12:28:10+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-04-22T12:28:18+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-23T02:09:17+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift GitOps 1.18",
"product": {
"name": "Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift_gitops:1.18::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift GitOps"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:24e67d1a105be747aee40ce6c616db47f26eb9a74b0f51ddccae545337d5a367_amd64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:24e67d1a105be747aee40ce6c616db47f26eb9a74b0f51ddccae545337d5a367_amd64",
"product_id": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:24e67d1a105be747aee40ce6c616db47f26eb9a74b0f51ddccae545337d5a367_amd64",
"product_identification_helper": {
"purl": "pkg:oci/argo-rollouts-rhel8@sha256%3A24e67d1a105be747aee40ce6c616db47f26eb9a74b0f51ddccae545337d5a367?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776756981"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:4285f37ac71f1522cb28b8cea56415eebe7b05f644f83d28246c32b39eb4f98d_amd64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:4285f37ac71f1522cb28b8cea56415eebe7b05f644f83d28246c32b39eb4f98d_amd64",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:4285f37ac71f1522cb28b8cea56415eebe7b05f644f83d28246c32b39eb4f98d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/argocd-rhel8@sha256%3A4285f37ac71f1522cb28b8cea56415eebe7b05f644f83d28246c32b39eb4f98d?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776756315"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:9d656e008382d7dd47619843ed2591eb3592f51af0504ae4642f7aa4fbf89e82_amd64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:9d656e008382d7dd47619843ed2591eb3592f51af0504ae4642f7aa4fbf89e82_amd64",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:9d656e008382d7dd47619843ed2591eb3592f51af0504ae4642f7aa4fbf89e82_amd64",
"product_identification_helper": {
"purl": "pkg:oci/argocd-agent-rhel8@sha256%3A9d656e008382d7dd47619843ed2591eb3592f51af0504ae4642f7aa4fbf89e82?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776757122"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:91566f97904038fcd46b79db9b6e351c053ebbfe535a15dc0c560efccfc477af_amd64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:91566f97904038fcd46b79db9b6e351c053ebbfe535a15dc0c560efccfc477af_amd64",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:91566f97904038fcd46b79db9b6e351c053ebbfe535a15dc0c560efccfc477af_amd64",
"product_identification_helper": {
"purl": "pkg:oci/argocd-extensions-rhel8@sha256%3A91566f97904038fcd46b79db9b6e351c053ebbfe535a15dc0c560efccfc477af?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776755826"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:e0b9f3902fd2d9117d51e955e58ab46e6fca0af8033fcce4bc860b7aa432c017_amd64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:e0b9f3902fd2d9117d51e955e58ab46e6fca0af8033fcce4bc860b7aa432c017_amd64",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:e0b9f3902fd2d9117d51e955e58ab46e6fca0af8033fcce4bc860b7aa432c017_amd64",
"product_identification_helper": {
"purl": "pkg:oci/argocd-rhel9@sha256%3Ae0b9f3902fd2d9117d51e955e58ab46e6fca0af8033fcce4bc860b7aa432c017?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776756851"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:61c80fdd31e4e19ee3cc0dbeb8ce72981a6ed1f98327a405637fadd8bb7d5961_amd64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:61c80fdd31e4e19ee3cc0dbeb8ce72981a6ed1f98327a405637fadd8bb7d5961_amd64",
"product_id": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:61c80fdd31e4e19ee3cc0dbeb8ce72981a6ed1f98327a405637fadd8bb7d5961_amd64",
"product_identification_helper": {
"purl": "pkg:oci/console-plugin-rhel8@sha256%3A61c80fdd31e4e19ee3cc0dbeb8ce72981a6ed1f98327a405637fadd8bb7d5961?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776756261"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:e996549f3c4b48f14bf61be9777bd66084366c649e9cc0e330b911ffd8ca0f65_amd64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:e996549f3c4b48f14bf61be9777bd66084366c649e9cc0e330b911ffd8ca0f65_amd64",
"product_id": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:e996549f3c4b48f14bf61be9777bd66084366c649e9cc0e330b911ffd8ca0f65_amd64",
"product_identification_helper": {
"purl": "pkg:oci/dex-rhel8@sha256%3Ae996549f3c4b48f14bf61be9777bd66084366c649e9cc0e330b911ffd8ca0f65?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776755965"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:5be0254201b7d2e5a4337876923d43075ca575169a2cce7c9e3e9e1525d0773d_amd64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:5be0254201b7d2e5a4337876923d43075ca575169a2cce7c9e3e9e1525d0773d_amd64",
"product_id": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:5be0254201b7d2e5a4337876923d43075ca575169a2cce7c9e3e9e1525d0773d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/gitops-rhel8@sha256%3A5be0254201b7d2e5a4337876923d43075ca575169a2cce7c9e3e9e1525d0773d?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776757008"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:5fff30eecc058f0b35655b2287841d7465d67acaa57af6eabce816fbf32da270_amd64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:5fff30eecc058f0b35655b2287841d7465d67acaa57af6eabce816fbf32da270_amd64",
"product_id": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:5fff30eecc058f0b35655b2287841d7465d67acaa57af6eabce816fbf32da270_amd64",
"product_identification_helper": {
"purl": "pkg:oci/gitops-rhel8-operator@sha256%3A5fff30eecc058f0b35655b2287841d7465d67acaa57af6eabce816fbf32da270?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776756027"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:e8a5213454b71e952de52bd448d5f52e6de868821a23c15b71c2b46809bdd570_amd64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:e8a5213454b71e952de52bd448d5f52e6de868821a23c15b71c2b46809bdd570_amd64",
"product_id": "registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:e8a5213454b71e952de52bd448d5f52e6de868821a23c15b71c2b46809bdd570_amd64",
"product_identification_helper": {
"purl": "pkg:oci/gitops-operator-bundle@sha256%3Ae8a5213454b71e952de52bd448d5f52e6de868821a23c15b71c2b46809bdd570?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776764023"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:68dbbbf7a8123db6abbc46fb4746f7b4bcc8c079c95f28823dde6e7174e247ba_amd64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:68dbbbf7a8123db6abbc46fb4746f7b4bcc8c079c95f28823dde6e7174e247ba_amd64",
"product_id": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:68dbbbf7a8123db6abbc46fb4746f7b4bcc8c079c95f28823dde6e7174e247ba_amd64",
"product_identification_helper": {
"purl": "pkg:oci/must-gather-rhel8@sha256%3A68dbbbf7a8123db6abbc46fb4746f7b4bcc8c079c95f28823dde6e7174e247ba?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776763025"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:390b0d8b53bd91fce22617d5914f4a50fa74441c39e636123604d5f2b4ab8440_arm64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:390b0d8b53bd91fce22617d5914f4a50fa74441c39e636123604d5f2b4ab8440_arm64",
"product_id": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:390b0d8b53bd91fce22617d5914f4a50fa74441c39e636123604d5f2b4ab8440_arm64",
"product_identification_helper": {
"purl": "pkg:oci/argo-rollouts-rhel8@sha256%3A390b0d8b53bd91fce22617d5914f4a50fa74441c39e636123604d5f2b4ab8440?arch=arm64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776756981"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:c7d771a9a408e77b825e95f045a84b7334bec1dfe6d5a307fb62066091ac96d1_arm64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:c7d771a9a408e77b825e95f045a84b7334bec1dfe6d5a307fb62066091ac96d1_arm64",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:c7d771a9a408e77b825e95f045a84b7334bec1dfe6d5a307fb62066091ac96d1_arm64",
"product_identification_helper": {
"purl": "pkg:oci/argocd-rhel8@sha256%3Ac7d771a9a408e77b825e95f045a84b7334bec1dfe6d5a307fb62066091ac96d1?arch=arm64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776756315"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:f2b65612117a006a24aca63deec9a1adeff0e94b775129154a255307f4a74240_arm64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:f2b65612117a006a24aca63deec9a1adeff0e94b775129154a255307f4a74240_arm64",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:f2b65612117a006a24aca63deec9a1adeff0e94b775129154a255307f4a74240_arm64",
"product_identification_helper": {
"purl": "pkg:oci/argocd-agent-rhel8@sha256%3Af2b65612117a006a24aca63deec9a1adeff0e94b775129154a255307f4a74240?arch=arm64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776757122"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:ef97fb44e3fa878c676dc32db2b7770a67acf94f3f2b5630de3353fbd4b9de2e_arm64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:ef97fb44e3fa878c676dc32db2b7770a67acf94f3f2b5630de3353fbd4b9de2e_arm64",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:ef97fb44e3fa878c676dc32db2b7770a67acf94f3f2b5630de3353fbd4b9de2e_arm64",
"product_identification_helper": {
"purl": "pkg:oci/argocd-extensions-rhel8@sha256%3Aef97fb44e3fa878c676dc32db2b7770a67acf94f3f2b5630de3353fbd4b9de2e?arch=arm64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776755826"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:4fb65a1e2efffdedff5bb7b5c49b1c9fd7fb52e924971a46928cadd1ce3beac2_arm64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:4fb65a1e2efffdedff5bb7b5c49b1c9fd7fb52e924971a46928cadd1ce3beac2_arm64",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:4fb65a1e2efffdedff5bb7b5c49b1c9fd7fb52e924971a46928cadd1ce3beac2_arm64",
"product_identification_helper": {
"purl": "pkg:oci/argocd-rhel9@sha256%3A4fb65a1e2efffdedff5bb7b5c49b1c9fd7fb52e924971a46928cadd1ce3beac2?arch=arm64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776756851"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:9b8f15505a7ee118ea6e60870a88c9c582ba9227937113347e03e9afdbb91f16_arm64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:9b8f15505a7ee118ea6e60870a88c9c582ba9227937113347e03e9afdbb91f16_arm64",
"product_id": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:9b8f15505a7ee118ea6e60870a88c9c582ba9227937113347e03e9afdbb91f16_arm64",
"product_identification_helper": {
"purl": "pkg:oci/console-plugin-rhel8@sha256%3A9b8f15505a7ee118ea6e60870a88c9c582ba9227937113347e03e9afdbb91f16?arch=arm64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776756261"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:7892f00200cd9dd55b3b64930ec58bde53489e2bd7815ee9a6cac0f5af2923be_arm64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:7892f00200cd9dd55b3b64930ec58bde53489e2bd7815ee9a6cac0f5af2923be_arm64",
"product_id": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:7892f00200cd9dd55b3b64930ec58bde53489e2bd7815ee9a6cac0f5af2923be_arm64",
"product_identification_helper": {
"purl": "pkg:oci/dex-rhel8@sha256%3A7892f00200cd9dd55b3b64930ec58bde53489e2bd7815ee9a6cac0f5af2923be?arch=arm64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776755965"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:eab8d091d0553b201f2ea1d2d7d435891dbe830786b31ae21fe414e097660ae8_arm64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:eab8d091d0553b201f2ea1d2d7d435891dbe830786b31ae21fe414e097660ae8_arm64",
"product_id": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:eab8d091d0553b201f2ea1d2d7d435891dbe830786b31ae21fe414e097660ae8_arm64",
"product_identification_helper": {
"purl": "pkg:oci/gitops-rhel8@sha256%3Aeab8d091d0553b201f2ea1d2d7d435891dbe830786b31ae21fe414e097660ae8?arch=arm64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776757008"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:a824c01bbeca63fa0d7ab3fb5366546beefe9383f02e4546d5ee3fcfb1b791e7_arm64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:a824c01bbeca63fa0d7ab3fb5366546beefe9383f02e4546d5ee3fcfb1b791e7_arm64",
"product_id": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:a824c01bbeca63fa0d7ab3fb5366546beefe9383f02e4546d5ee3fcfb1b791e7_arm64",
"product_identification_helper": {
"purl": "pkg:oci/gitops-rhel8-operator@sha256%3Aa824c01bbeca63fa0d7ab3fb5366546beefe9383f02e4546d5ee3fcfb1b791e7?arch=arm64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776756027"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:aa1cd9a88ae51c5061b14637915f69d42cf7807f9a5d3da957e7c319198c28de_arm64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:aa1cd9a88ae51c5061b14637915f69d42cf7807f9a5d3da957e7c319198c28de_arm64",
"product_id": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:aa1cd9a88ae51c5061b14637915f69d42cf7807f9a5d3da957e7c319198c28de_arm64",
"product_identification_helper": {
"purl": "pkg:oci/must-gather-rhel8@sha256%3Aaa1cd9a88ae51c5061b14637915f69d42cf7807f9a5d3da957e7c319198c28de?arch=arm64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776763025"
}
}
}
],
"category": "architecture",
"name": "arm64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:97d073694ecf9c6b0dcc09707a983a1e1d950a9d0bc4a247b1fd464a66c876c8_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:97d073694ecf9c6b0dcc09707a983a1e1d950a9d0bc4a247b1fd464a66c876c8_ppc64le",
"product_id": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:97d073694ecf9c6b0dcc09707a983a1e1d950a9d0bc4a247b1fd464a66c876c8_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/argo-rollouts-rhel8@sha256%3A97d073694ecf9c6b0dcc09707a983a1e1d950a9d0bc4a247b1fd464a66c876c8?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776756981"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7a286bd7aac225e6ef6f5ccefb9b1839fb4cb8c6cd5f0cd1ee79ebb43813211f_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7a286bd7aac225e6ef6f5ccefb9b1839fb4cb8c6cd5f0cd1ee79ebb43813211f_ppc64le",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7a286bd7aac225e6ef6f5ccefb9b1839fb4cb8c6cd5f0cd1ee79ebb43813211f_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/argocd-rhel8@sha256%3A7a286bd7aac225e6ef6f5ccefb9b1839fb4cb8c6cd5f0cd1ee79ebb43813211f?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776756315"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:8a00814288cc821ea5c8c349895cd0b6ce5a4dbb793685a7fa144f99506052d5_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:8a00814288cc821ea5c8c349895cd0b6ce5a4dbb793685a7fa144f99506052d5_ppc64le",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:8a00814288cc821ea5c8c349895cd0b6ce5a4dbb793685a7fa144f99506052d5_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/argocd-agent-rhel8@sha256%3A8a00814288cc821ea5c8c349895cd0b6ce5a4dbb793685a7fa144f99506052d5?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776757122"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:d22d2f99b5863f27b31c69e81489cdb4002f53915a9983ede4ec822934533542_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:d22d2f99b5863f27b31c69e81489cdb4002f53915a9983ede4ec822934533542_ppc64le",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:d22d2f99b5863f27b31c69e81489cdb4002f53915a9983ede4ec822934533542_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/argocd-extensions-rhel8@sha256%3Ad22d2f99b5863f27b31c69e81489cdb4002f53915a9983ede4ec822934533542?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776755826"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:804431fea3b24f8d8d60f8f6c09d68d8dc6d9926b8c59e869fcaca8bf780d32e_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:804431fea3b24f8d8d60f8f6c09d68d8dc6d9926b8c59e869fcaca8bf780d32e_ppc64le",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:804431fea3b24f8d8d60f8f6c09d68d8dc6d9926b8c59e869fcaca8bf780d32e_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/argocd-rhel9@sha256%3A804431fea3b24f8d8d60f8f6c09d68d8dc6d9926b8c59e869fcaca8bf780d32e?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776756851"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:fc8664f60bc08619935ed5133dac7498a7e6f28bb54b5d88184cce1b547a100b_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:fc8664f60bc08619935ed5133dac7498a7e6f28bb54b5d88184cce1b547a100b_ppc64le",
"product_id": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:fc8664f60bc08619935ed5133dac7498a7e6f28bb54b5d88184cce1b547a100b_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/console-plugin-rhel8@sha256%3Afc8664f60bc08619935ed5133dac7498a7e6f28bb54b5d88184cce1b547a100b?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776756261"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:35f009047d38584dcb2216ab3a22a019a94e3f5d2d6047737dd33097dd32ab33_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:35f009047d38584dcb2216ab3a22a019a94e3f5d2d6047737dd33097dd32ab33_ppc64le",
"product_id": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:35f009047d38584dcb2216ab3a22a019a94e3f5d2d6047737dd33097dd32ab33_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/dex-rhel8@sha256%3A35f009047d38584dcb2216ab3a22a019a94e3f5d2d6047737dd33097dd32ab33?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776755965"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:5850236a1cfe24ff41496fcc68becd23efb2ce6a24f66fbca0fb46ca34e408a1_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:5850236a1cfe24ff41496fcc68becd23efb2ce6a24f66fbca0fb46ca34e408a1_ppc64le",
"product_id": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:5850236a1cfe24ff41496fcc68becd23efb2ce6a24f66fbca0fb46ca34e408a1_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/gitops-rhel8@sha256%3A5850236a1cfe24ff41496fcc68becd23efb2ce6a24f66fbca0fb46ca34e408a1?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776757008"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:b6dc4a8439708052d8e708447944da2cc160a6042b6902e0e9af0e104e823d33_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:b6dc4a8439708052d8e708447944da2cc160a6042b6902e0e9af0e104e823d33_ppc64le",
"product_id": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:b6dc4a8439708052d8e708447944da2cc160a6042b6902e0e9af0e104e823d33_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/gitops-rhel8-operator@sha256%3Ab6dc4a8439708052d8e708447944da2cc160a6042b6902e0e9af0e104e823d33?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776756027"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:d2de54cf6dd17f2b06fd172a13bac53e221807ab0e279c522b0472e56b9dd0ad_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:d2de54cf6dd17f2b06fd172a13bac53e221807ab0e279c522b0472e56b9dd0ad_ppc64le",
"product_id": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:d2de54cf6dd17f2b06fd172a13bac53e221807ab0e279c522b0472e56b9dd0ad_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/must-gather-rhel8@sha256%3Ad2de54cf6dd17f2b06fd172a13bac53e221807ab0e279c522b0472e56b9dd0ad?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776763025"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:d52b043483f248cf812d61fd253c979343881ef1aae94b0096aa9dcd1e0aafbb_s390x",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:d52b043483f248cf812d61fd253c979343881ef1aae94b0096aa9dcd1e0aafbb_s390x",
"product_id": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:d52b043483f248cf812d61fd253c979343881ef1aae94b0096aa9dcd1e0aafbb_s390x",
"product_identification_helper": {
"purl": "pkg:oci/argo-rollouts-rhel8@sha256%3Ad52b043483f248cf812d61fd253c979343881ef1aae94b0096aa9dcd1e0aafbb?arch=s390x\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776756981"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:9dd3efe9a0cc081caf3b7e7cea7e03cc13e6a290c8884a492d8ff505dfb0edcd_s390x",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:9dd3efe9a0cc081caf3b7e7cea7e03cc13e6a290c8884a492d8ff505dfb0edcd_s390x",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:9dd3efe9a0cc081caf3b7e7cea7e03cc13e6a290c8884a492d8ff505dfb0edcd_s390x",
"product_identification_helper": {
"purl": "pkg:oci/argocd-rhel8@sha256%3A9dd3efe9a0cc081caf3b7e7cea7e03cc13e6a290c8884a492d8ff505dfb0edcd?arch=s390x\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776756315"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:c9ac9cedc310e8286272b467f740b8a9f97c0c371b02e6bece42a0211d0e89a2_s390x",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:c9ac9cedc310e8286272b467f740b8a9f97c0c371b02e6bece42a0211d0e89a2_s390x",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:c9ac9cedc310e8286272b467f740b8a9f97c0c371b02e6bece42a0211d0e89a2_s390x",
"product_identification_helper": {
"purl": "pkg:oci/argocd-agent-rhel8@sha256%3Ac9ac9cedc310e8286272b467f740b8a9f97c0c371b02e6bece42a0211d0e89a2?arch=s390x\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776757122"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:76162ab820b06df90cbca62797e3f2ddca3fb1aa527ce469982ae27f01419562_s390x",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:76162ab820b06df90cbca62797e3f2ddca3fb1aa527ce469982ae27f01419562_s390x",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:76162ab820b06df90cbca62797e3f2ddca3fb1aa527ce469982ae27f01419562_s390x",
"product_identification_helper": {
"purl": "pkg:oci/argocd-extensions-rhel8@sha256%3A76162ab820b06df90cbca62797e3f2ddca3fb1aa527ce469982ae27f01419562?arch=s390x\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776755826"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:2130222eeb06890b0316489688fb01f0941b4d681e00a33b661c9d4702c4711d_s390x",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:2130222eeb06890b0316489688fb01f0941b4d681e00a33b661c9d4702c4711d_s390x",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:2130222eeb06890b0316489688fb01f0941b4d681e00a33b661c9d4702c4711d_s390x",
"product_identification_helper": {
"purl": "pkg:oci/argocd-rhel9@sha256%3A2130222eeb06890b0316489688fb01f0941b4d681e00a33b661c9d4702c4711d?arch=s390x\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776756851"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:4b5dfdb8fbd0109362d0a77fc4e2e46933dcc5c8e7f6c38341074f2160702bca_s390x",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:4b5dfdb8fbd0109362d0a77fc4e2e46933dcc5c8e7f6c38341074f2160702bca_s390x",
"product_id": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:4b5dfdb8fbd0109362d0a77fc4e2e46933dcc5c8e7f6c38341074f2160702bca_s390x",
"product_identification_helper": {
"purl": "pkg:oci/console-plugin-rhel8@sha256%3A4b5dfdb8fbd0109362d0a77fc4e2e46933dcc5c8e7f6c38341074f2160702bca?arch=s390x\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776756261"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:e848afbb6a3ce2dae976601c6982fc844cf2a8efaeae88de0c22a005e007e2d0_s390x",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:e848afbb6a3ce2dae976601c6982fc844cf2a8efaeae88de0c22a005e007e2d0_s390x",
"product_id": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:e848afbb6a3ce2dae976601c6982fc844cf2a8efaeae88de0c22a005e007e2d0_s390x",
"product_identification_helper": {
"purl": "pkg:oci/dex-rhel8@sha256%3Ae848afbb6a3ce2dae976601c6982fc844cf2a8efaeae88de0c22a005e007e2d0?arch=s390x\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776755965"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:49d2f4c671e8199c4972023b95043e989d2a270a375cbab48991af84fd198f0f_s390x",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:49d2f4c671e8199c4972023b95043e989d2a270a375cbab48991af84fd198f0f_s390x",
"product_id": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:49d2f4c671e8199c4972023b95043e989d2a270a375cbab48991af84fd198f0f_s390x",
"product_identification_helper": {
"purl": "pkg:oci/gitops-rhel8@sha256%3A49d2f4c671e8199c4972023b95043e989d2a270a375cbab48991af84fd198f0f?arch=s390x\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776757008"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:06a5d5d82c7db4c32d66438da9d68e3c98020695b719f05eccf383215869105e_s390x",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:06a5d5d82c7db4c32d66438da9d68e3c98020695b719f05eccf383215869105e_s390x",
"product_id": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:06a5d5d82c7db4c32d66438da9d68e3c98020695b719f05eccf383215869105e_s390x",
"product_identification_helper": {
"purl": "pkg:oci/gitops-rhel8-operator@sha256%3A06a5d5d82c7db4c32d66438da9d68e3c98020695b719f05eccf383215869105e?arch=s390x\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776756027"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:af7ad17fa628347bc604a1fde2a3bba05840fc428e11836c0ca2c6b7dc2f4ee6_s390x",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:af7ad17fa628347bc604a1fde2a3bba05840fc428e11836c0ca2c6b7dc2f4ee6_s390x",
"product_id": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:af7ad17fa628347bc604a1fde2a3bba05840fc428e11836c0ca2c6b7dc2f4ee6_s390x",
"product_identification_helper": {
"purl": "pkg:oci/must-gather-rhel8@sha256%3Aaf7ad17fa628347bc604a1fde2a3bba05840fc428e11836c0ca2c6b7dc2f4ee6?arch=s390x\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1776763025"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:24e67d1a105be747aee40ce6c616db47f26eb9a74b0f51ddccae545337d5a367_amd64 as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:24e67d1a105be747aee40ce6c616db47f26eb9a74b0f51ddccae545337d5a367_amd64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:24e67d1a105be747aee40ce6c616db47f26eb9a74b0f51ddccae545337d5a367_amd64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:390b0d8b53bd91fce22617d5914f4a50fa74441c39e636123604d5f2b4ab8440_arm64 as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:390b0d8b53bd91fce22617d5914f4a50fa74441c39e636123604d5f2b4ab8440_arm64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:390b0d8b53bd91fce22617d5914f4a50fa74441c39e636123604d5f2b4ab8440_arm64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:97d073694ecf9c6b0dcc09707a983a1e1d950a9d0bc4a247b1fd464a66c876c8_ppc64le as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:97d073694ecf9c6b0dcc09707a983a1e1d950a9d0bc4a247b1fd464a66c876c8_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:97d073694ecf9c6b0dcc09707a983a1e1d950a9d0bc4a247b1fd464a66c876c8_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:d52b043483f248cf812d61fd253c979343881ef1aae94b0096aa9dcd1e0aafbb_s390x as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:d52b043483f248cf812d61fd253c979343881ef1aae94b0096aa9dcd1e0aafbb_s390x"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:d52b043483f248cf812d61fd253c979343881ef1aae94b0096aa9dcd1e0aafbb_s390x",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:8a00814288cc821ea5c8c349895cd0b6ce5a4dbb793685a7fa144f99506052d5_ppc64le as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:8a00814288cc821ea5c8c349895cd0b6ce5a4dbb793685a7fa144f99506052d5_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:8a00814288cc821ea5c8c349895cd0b6ce5a4dbb793685a7fa144f99506052d5_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:9d656e008382d7dd47619843ed2591eb3592f51af0504ae4642f7aa4fbf89e82_amd64 as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:9d656e008382d7dd47619843ed2591eb3592f51af0504ae4642f7aa4fbf89e82_amd64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:9d656e008382d7dd47619843ed2591eb3592f51af0504ae4642f7aa4fbf89e82_amd64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:c9ac9cedc310e8286272b467f740b8a9f97c0c371b02e6bece42a0211d0e89a2_s390x as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:c9ac9cedc310e8286272b467f740b8a9f97c0c371b02e6bece42a0211d0e89a2_s390x"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:c9ac9cedc310e8286272b467f740b8a9f97c0c371b02e6bece42a0211d0e89a2_s390x",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:f2b65612117a006a24aca63deec9a1adeff0e94b775129154a255307f4a74240_arm64 as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:f2b65612117a006a24aca63deec9a1adeff0e94b775129154a255307f4a74240_arm64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:f2b65612117a006a24aca63deec9a1adeff0e94b775129154a255307f4a74240_arm64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:76162ab820b06df90cbca62797e3f2ddca3fb1aa527ce469982ae27f01419562_s390x as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:76162ab820b06df90cbca62797e3f2ddca3fb1aa527ce469982ae27f01419562_s390x"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:76162ab820b06df90cbca62797e3f2ddca3fb1aa527ce469982ae27f01419562_s390x",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:91566f97904038fcd46b79db9b6e351c053ebbfe535a15dc0c560efccfc477af_amd64 as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:91566f97904038fcd46b79db9b6e351c053ebbfe535a15dc0c560efccfc477af_amd64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:91566f97904038fcd46b79db9b6e351c053ebbfe535a15dc0c560efccfc477af_amd64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:d22d2f99b5863f27b31c69e81489cdb4002f53915a9983ede4ec822934533542_ppc64le as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:d22d2f99b5863f27b31c69e81489cdb4002f53915a9983ede4ec822934533542_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:d22d2f99b5863f27b31c69e81489cdb4002f53915a9983ede4ec822934533542_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:ef97fb44e3fa878c676dc32db2b7770a67acf94f3f2b5630de3353fbd4b9de2e_arm64 as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:ef97fb44e3fa878c676dc32db2b7770a67acf94f3f2b5630de3353fbd4b9de2e_arm64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:ef97fb44e3fa878c676dc32db2b7770a67acf94f3f2b5630de3353fbd4b9de2e_arm64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:4285f37ac71f1522cb28b8cea56415eebe7b05f644f83d28246c32b39eb4f98d_amd64 as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:4285f37ac71f1522cb28b8cea56415eebe7b05f644f83d28246c32b39eb4f98d_amd64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:4285f37ac71f1522cb28b8cea56415eebe7b05f644f83d28246c32b39eb4f98d_amd64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7a286bd7aac225e6ef6f5ccefb9b1839fb4cb8c6cd5f0cd1ee79ebb43813211f_ppc64le as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7a286bd7aac225e6ef6f5ccefb9b1839fb4cb8c6cd5f0cd1ee79ebb43813211f_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7a286bd7aac225e6ef6f5ccefb9b1839fb4cb8c6cd5f0cd1ee79ebb43813211f_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:9dd3efe9a0cc081caf3b7e7cea7e03cc13e6a290c8884a492d8ff505dfb0edcd_s390x as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:9dd3efe9a0cc081caf3b7e7cea7e03cc13e6a290c8884a492d8ff505dfb0edcd_s390x"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:9dd3efe9a0cc081caf3b7e7cea7e03cc13e6a290c8884a492d8ff505dfb0edcd_s390x",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:c7d771a9a408e77b825e95f045a84b7334bec1dfe6d5a307fb62066091ac96d1_arm64 as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:c7d771a9a408e77b825e95f045a84b7334bec1dfe6d5a307fb62066091ac96d1_arm64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:c7d771a9a408e77b825e95f045a84b7334bec1dfe6d5a307fb62066091ac96d1_arm64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:2130222eeb06890b0316489688fb01f0941b4d681e00a33b661c9d4702c4711d_s390x as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:2130222eeb06890b0316489688fb01f0941b4d681e00a33b661c9d4702c4711d_s390x"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:2130222eeb06890b0316489688fb01f0941b4d681e00a33b661c9d4702c4711d_s390x",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:4fb65a1e2efffdedff5bb7b5c49b1c9fd7fb52e924971a46928cadd1ce3beac2_arm64 as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:4fb65a1e2efffdedff5bb7b5c49b1c9fd7fb52e924971a46928cadd1ce3beac2_arm64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:4fb65a1e2efffdedff5bb7b5c49b1c9fd7fb52e924971a46928cadd1ce3beac2_arm64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:804431fea3b24f8d8d60f8f6c09d68d8dc6d9926b8c59e869fcaca8bf780d32e_ppc64le as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:804431fea3b24f8d8d60f8f6c09d68d8dc6d9926b8c59e869fcaca8bf780d32e_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:804431fea3b24f8d8d60f8f6c09d68d8dc6d9926b8c59e869fcaca8bf780d32e_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:e0b9f3902fd2d9117d51e955e58ab46e6fca0af8033fcce4bc860b7aa432c017_amd64 as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:e0b9f3902fd2d9117d51e955e58ab46e6fca0af8033fcce4bc860b7aa432c017_amd64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:e0b9f3902fd2d9117d51e955e58ab46e6fca0af8033fcce4bc860b7aa432c017_amd64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:4b5dfdb8fbd0109362d0a77fc4e2e46933dcc5c8e7f6c38341074f2160702bca_s390x as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:4b5dfdb8fbd0109362d0a77fc4e2e46933dcc5c8e7f6c38341074f2160702bca_s390x"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:4b5dfdb8fbd0109362d0a77fc4e2e46933dcc5c8e7f6c38341074f2160702bca_s390x",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:61c80fdd31e4e19ee3cc0dbeb8ce72981a6ed1f98327a405637fadd8bb7d5961_amd64 as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:61c80fdd31e4e19ee3cc0dbeb8ce72981a6ed1f98327a405637fadd8bb7d5961_amd64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:61c80fdd31e4e19ee3cc0dbeb8ce72981a6ed1f98327a405637fadd8bb7d5961_amd64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:9b8f15505a7ee118ea6e60870a88c9c582ba9227937113347e03e9afdbb91f16_arm64 as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:9b8f15505a7ee118ea6e60870a88c9c582ba9227937113347e03e9afdbb91f16_arm64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:9b8f15505a7ee118ea6e60870a88c9c582ba9227937113347e03e9afdbb91f16_arm64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:fc8664f60bc08619935ed5133dac7498a7e6f28bb54b5d88184cce1b547a100b_ppc64le as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:fc8664f60bc08619935ed5133dac7498a7e6f28bb54b5d88184cce1b547a100b_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:fc8664f60bc08619935ed5133dac7498a7e6f28bb54b5d88184cce1b547a100b_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:35f009047d38584dcb2216ab3a22a019a94e3f5d2d6047737dd33097dd32ab33_ppc64le as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:35f009047d38584dcb2216ab3a22a019a94e3f5d2d6047737dd33097dd32ab33_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:35f009047d38584dcb2216ab3a22a019a94e3f5d2d6047737dd33097dd32ab33_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:7892f00200cd9dd55b3b64930ec58bde53489e2bd7815ee9a6cac0f5af2923be_arm64 as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:7892f00200cd9dd55b3b64930ec58bde53489e2bd7815ee9a6cac0f5af2923be_arm64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:7892f00200cd9dd55b3b64930ec58bde53489e2bd7815ee9a6cac0f5af2923be_arm64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:e848afbb6a3ce2dae976601c6982fc844cf2a8efaeae88de0c22a005e007e2d0_s390x as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:e848afbb6a3ce2dae976601c6982fc844cf2a8efaeae88de0c22a005e007e2d0_s390x"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:e848afbb6a3ce2dae976601c6982fc844cf2a8efaeae88de0c22a005e007e2d0_s390x",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:e996549f3c4b48f14bf61be9777bd66084366c649e9cc0e330b911ffd8ca0f65_amd64 as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:e996549f3c4b48f14bf61be9777bd66084366c649e9cc0e330b911ffd8ca0f65_amd64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:e996549f3c4b48f14bf61be9777bd66084366c649e9cc0e330b911ffd8ca0f65_amd64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:e8a5213454b71e952de52bd448d5f52e6de868821a23c15b71c2b46809bdd570_amd64 as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:e8a5213454b71e952de52bd448d5f52e6de868821a23c15b71c2b46809bdd570_amd64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:e8a5213454b71e952de52bd448d5f52e6de868821a23c15b71c2b46809bdd570_amd64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:06a5d5d82c7db4c32d66438da9d68e3c98020695b719f05eccf383215869105e_s390x as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:06a5d5d82c7db4c32d66438da9d68e3c98020695b719f05eccf383215869105e_s390x"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:06a5d5d82c7db4c32d66438da9d68e3c98020695b719f05eccf383215869105e_s390x",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:5fff30eecc058f0b35655b2287841d7465d67acaa57af6eabce816fbf32da270_amd64 as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:5fff30eecc058f0b35655b2287841d7465d67acaa57af6eabce816fbf32da270_amd64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:5fff30eecc058f0b35655b2287841d7465d67acaa57af6eabce816fbf32da270_amd64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:a824c01bbeca63fa0d7ab3fb5366546beefe9383f02e4546d5ee3fcfb1b791e7_arm64 as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:a824c01bbeca63fa0d7ab3fb5366546beefe9383f02e4546d5ee3fcfb1b791e7_arm64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:a824c01bbeca63fa0d7ab3fb5366546beefe9383f02e4546d5ee3fcfb1b791e7_arm64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:b6dc4a8439708052d8e708447944da2cc160a6042b6902e0e9af0e104e823d33_ppc64le as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:b6dc4a8439708052d8e708447944da2cc160a6042b6902e0e9af0e104e823d33_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:b6dc4a8439708052d8e708447944da2cc160a6042b6902e0e9af0e104e823d33_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:49d2f4c671e8199c4972023b95043e989d2a270a375cbab48991af84fd198f0f_s390x as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:49d2f4c671e8199c4972023b95043e989d2a270a375cbab48991af84fd198f0f_s390x"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:49d2f4c671e8199c4972023b95043e989d2a270a375cbab48991af84fd198f0f_s390x",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:5850236a1cfe24ff41496fcc68becd23efb2ce6a24f66fbca0fb46ca34e408a1_ppc64le as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:5850236a1cfe24ff41496fcc68becd23efb2ce6a24f66fbca0fb46ca34e408a1_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:5850236a1cfe24ff41496fcc68becd23efb2ce6a24f66fbca0fb46ca34e408a1_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:5be0254201b7d2e5a4337876923d43075ca575169a2cce7c9e3e9e1525d0773d_amd64 as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:5be0254201b7d2e5a4337876923d43075ca575169a2cce7c9e3e9e1525d0773d_amd64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:5be0254201b7d2e5a4337876923d43075ca575169a2cce7c9e3e9e1525d0773d_amd64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:eab8d091d0553b201f2ea1d2d7d435891dbe830786b31ae21fe414e097660ae8_arm64 as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:eab8d091d0553b201f2ea1d2d7d435891dbe830786b31ae21fe414e097660ae8_arm64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:eab8d091d0553b201f2ea1d2d7d435891dbe830786b31ae21fe414e097660ae8_arm64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:68dbbbf7a8123db6abbc46fb4746f7b4bcc8c079c95f28823dde6e7174e247ba_amd64 as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:68dbbbf7a8123db6abbc46fb4746f7b4bcc8c079c95f28823dde6e7174e247ba_amd64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:68dbbbf7a8123db6abbc46fb4746f7b4bcc8c079c95f28823dde6e7174e247ba_amd64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:aa1cd9a88ae51c5061b14637915f69d42cf7807f9a5d3da957e7c319198c28de_arm64 as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:aa1cd9a88ae51c5061b14637915f69d42cf7807f9a5d3da957e7c319198c28de_arm64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:aa1cd9a88ae51c5061b14637915f69d42cf7807f9a5d3da957e7c319198c28de_arm64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:af7ad17fa628347bc604a1fde2a3bba05840fc428e11836c0ca2c6b7dc2f4ee6_s390x as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:af7ad17fa628347bc604a1fde2a3bba05840fc428e11836c0ca2c6b7dc2f4ee6_s390x"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:af7ad17fa628347bc604a1fde2a3bba05840fc428e11836c0ca2c6b7dc2f4ee6_s390x",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:d2de54cf6dd17f2b06fd172a13bac53e221807ab0e279c522b0472e56b9dd0ad_ppc64le as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:d2de54cf6dd17f2b06fd172a13bac53e221807ab0e279c522b0472e56b9dd0ad_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:d2de54cf6dd17f2b06fd172a13bac53e221807ab0e279c522b0472e56b9dd0ad_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-27137",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"discovery_date": "2026-03-06T22:01:38.859733+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:24e67d1a105be747aee40ce6c616db47f26eb9a74b0f51ddccae545337d5a367_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:390b0d8b53bd91fce22617d5914f4a50fa74441c39e636123604d5f2b4ab8440_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:97d073694ecf9c6b0dcc09707a983a1e1d950a9d0bc4a247b1fd464a66c876c8_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:d52b043483f248cf812d61fd253c979343881ef1aae94b0096aa9dcd1e0aafbb_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:8a00814288cc821ea5c8c349895cd0b6ce5a4dbb793685a7fa144f99506052d5_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:9d656e008382d7dd47619843ed2591eb3592f51af0504ae4642f7aa4fbf89e82_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:c9ac9cedc310e8286272b467f740b8a9f97c0c371b02e6bece42a0211d0e89a2_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:f2b65612117a006a24aca63deec9a1adeff0e94b775129154a255307f4a74240_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:76162ab820b06df90cbca62797e3f2ddca3fb1aa527ce469982ae27f01419562_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:91566f97904038fcd46b79db9b6e351c053ebbfe535a15dc0c560efccfc477af_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:d22d2f99b5863f27b31c69e81489cdb4002f53915a9983ede4ec822934533542_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:ef97fb44e3fa878c676dc32db2b7770a67acf94f3f2b5630de3353fbd4b9de2e_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:4285f37ac71f1522cb28b8cea56415eebe7b05f644f83d28246c32b39eb4f98d_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7a286bd7aac225e6ef6f5ccefb9b1839fb4cb8c6cd5f0cd1ee79ebb43813211f_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:9dd3efe9a0cc081caf3b7e7cea7e03cc13e6a290c8884a492d8ff505dfb0edcd_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:c7d771a9a408e77b825e95f045a84b7334bec1dfe6d5a307fb62066091ac96d1_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:2130222eeb06890b0316489688fb01f0941b4d681e00a33b661c9d4702c4711d_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:4fb65a1e2efffdedff5bb7b5c49b1c9fd7fb52e924971a46928cadd1ce3beac2_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:804431fea3b24f8d8d60f8f6c09d68d8dc6d9926b8c59e869fcaca8bf780d32e_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:e0b9f3902fd2d9117d51e955e58ab46e6fca0af8033fcce4bc860b7aa432c017_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:4b5dfdb8fbd0109362d0a77fc4e2e46933dcc5c8e7f6c38341074f2160702bca_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:61c80fdd31e4e19ee3cc0dbeb8ce72981a6ed1f98327a405637fadd8bb7d5961_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:9b8f15505a7ee118ea6e60870a88c9c582ba9227937113347e03e9afdbb91f16_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:fc8664f60bc08619935ed5133dac7498a7e6f28bb54b5d88184cce1b547a100b_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:e8a5213454b71e952de52bd448d5f52e6de868821a23c15b71c2b46809bdd570_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:06a5d5d82c7db4c32d66438da9d68e3c98020695b719f05eccf383215869105e_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:5fff30eecc058f0b35655b2287841d7465d67acaa57af6eabce816fbf32da270_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:a824c01bbeca63fa0d7ab3fb5366546beefe9383f02e4546d5ee3fcfb1b791e7_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:b6dc4a8439708052d8e708447944da2cc160a6042b6902e0e9af0e104e823d33_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:49d2f4c671e8199c4972023b95043e989d2a270a375cbab48991af84fd198f0f_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:5850236a1cfe24ff41496fcc68becd23efb2ce6a24f66fbca0fb46ca34e408a1_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:5be0254201b7d2e5a4337876923d43075ca575169a2cce7c9e3e9e1525d0773d_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:eab8d091d0553b201f2ea1d2d7d435891dbe830786b31ae21fe414e097660ae8_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:68dbbbf7a8123db6abbc46fb4746f7b4bcc8c079c95f28823dde6e7174e247ba_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:aa1cd9a88ae51c5061b14637915f69d42cf7807f9a5d3da957e7c319198c28de_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:af7ad17fa628347bc604a1fde2a3bba05840fc428e11836c0ca2c6b7dc2f4ee6_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:d2de54cf6dd17f2b06fd172a13bac53e221807ab0e279c522b0472e56b9dd0ad_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2445345"
}
],
"notes": [
{
"category": "description",
"text": "A certificate validation flaw has been discovered in the golang crypto/x509 module. When verifying a certificate chain which contains a certificate containing multiple email address constraints which share common local portions but different domain portions, these constraints will not be properly applied, and only the last constraint will be considered.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: Incorrect enforcement of email constraints in crypto/x509",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:35f009047d38584dcb2216ab3a22a019a94e3f5d2d6047737dd33097dd32ab33_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:7892f00200cd9dd55b3b64930ec58bde53489e2bd7815ee9a6cac0f5af2923be_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:e848afbb6a3ce2dae976601c6982fc844cf2a8efaeae88de0c22a005e007e2d0_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:e996549f3c4b48f14bf61be9777bd66084366c649e9cc0e330b911ffd8ca0f65_amd64"
],
"known_not_affected": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:24e67d1a105be747aee40ce6c616db47f26eb9a74b0f51ddccae545337d5a367_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:390b0d8b53bd91fce22617d5914f4a50fa74441c39e636123604d5f2b4ab8440_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:97d073694ecf9c6b0dcc09707a983a1e1d950a9d0bc4a247b1fd464a66c876c8_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:d52b043483f248cf812d61fd253c979343881ef1aae94b0096aa9dcd1e0aafbb_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:8a00814288cc821ea5c8c349895cd0b6ce5a4dbb793685a7fa144f99506052d5_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:9d656e008382d7dd47619843ed2591eb3592f51af0504ae4642f7aa4fbf89e82_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:c9ac9cedc310e8286272b467f740b8a9f97c0c371b02e6bece42a0211d0e89a2_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:f2b65612117a006a24aca63deec9a1adeff0e94b775129154a255307f4a74240_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:76162ab820b06df90cbca62797e3f2ddca3fb1aa527ce469982ae27f01419562_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:91566f97904038fcd46b79db9b6e351c053ebbfe535a15dc0c560efccfc477af_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:d22d2f99b5863f27b31c69e81489cdb4002f53915a9983ede4ec822934533542_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:ef97fb44e3fa878c676dc32db2b7770a67acf94f3f2b5630de3353fbd4b9de2e_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:4285f37ac71f1522cb28b8cea56415eebe7b05f644f83d28246c32b39eb4f98d_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7a286bd7aac225e6ef6f5ccefb9b1839fb4cb8c6cd5f0cd1ee79ebb43813211f_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:9dd3efe9a0cc081caf3b7e7cea7e03cc13e6a290c8884a492d8ff505dfb0edcd_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:c7d771a9a408e77b825e95f045a84b7334bec1dfe6d5a307fb62066091ac96d1_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:2130222eeb06890b0316489688fb01f0941b4d681e00a33b661c9d4702c4711d_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:4fb65a1e2efffdedff5bb7b5c49b1c9fd7fb52e924971a46928cadd1ce3beac2_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:804431fea3b24f8d8d60f8f6c09d68d8dc6d9926b8c59e869fcaca8bf780d32e_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:e0b9f3902fd2d9117d51e955e58ab46e6fca0af8033fcce4bc860b7aa432c017_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:4b5dfdb8fbd0109362d0a77fc4e2e46933dcc5c8e7f6c38341074f2160702bca_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:61c80fdd31e4e19ee3cc0dbeb8ce72981a6ed1f98327a405637fadd8bb7d5961_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:9b8f15505a7ee118ea6e60870a88c9c582ba9227937113347e03e9afdbb91f16_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:fc8664f60bc08619935ed5133dac7498a7e6f28bb54b5d88184cce1b547a100b_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:e8a5213454b71e952de52bd448d5f52e6de868821a23c15b71c2b46809bdd570_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:06a5d5d82c7db4c32d66438da9d68e3c98020695b719f05eccf383215869105e_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:5fff30eecc058f0b35655b2287841d7465d67acaa57af6eabce816fbf32da270_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:a824c01bbeca63fa0d7ab3fb5366546beefe9383f02e4546d5ee3fcfb1b791e7_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:b6dc4a8439708052d8e708447944da2cc160a6042b6902e0e9af0e104e823d33_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:49d2f4c671e8199c4972023b95043e989d2a270a375cbab48991af84fd198f0f_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:5850236a1cfe24ff41496fcc68becd23efb2ce6a24f66fbca0fb46ca34e408a1_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:5be0254201b7d2e5a4337876923d43075ca575169a2cce7c9e3e9e1525d0773d_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:eab8d091d0553b201f2ea1d2d7d435891dbe830786b31ae21fe414e097660ae8_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:68dbbbf7a8123db6abbc46fb4746f7b4bcc8c079c95f28823dde6e7174e247ba_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:aa1cd9a88ae51c5061b14637915f69d42cf7807f9a5d3da957e7c319198c28de_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:af7ad17fa628347bc604a1fde2a3bba05840fc428e11836c0ca2c6b7dc2f4ee6_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:d2de54cf6dd17f2b06fd172a13bac53e221807ab0e279c522b0472e56b9dd0ad_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-27137"
},
{
"category": "external",
"summary": "RHBZ#2445345",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2445345"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-27137",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27137"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-27137",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27137"
},
{
"category": "external",
"summary": "https://go.dev/cl/752182",
"url": "https://go.dev/cl/752182"
},
{
"category": "external",
"summary": "https://go.dev/issue/77952",
"url": "https://go.dev/issue/77952"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk",
"url": "https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4599",
"url": "https://pkg.go.dev/vuln/GO-2026-4599"
}
],
"release_date": "2026-03-06T21:28:13.748000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-22T12:28:10+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:35f009047d38584dcb2216ab3a22a019a94e3f5d2d6047737dd33097dd32ab33_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:7892f00200cd9dd55b3b64930ec58bde53489e2bd7815ee9a6cac0f5af2923be_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:e848afbb6a3ce2dae976601c6982fc844cf2a8efaeae88de0c22a005e007e2d0_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:e996549f3c4b48f14bf61be9777bd66084366c649e9cc0e330b911ffd8ca0f65_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:9697"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:24e67d1a105be747aee40ce6c616db47f26eb9a74b0f51ddccae545337d5a367_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:390b0d8b53bd91fce22617d5914f4a50fa74441c39e636123604d5f2b4ab8440_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:97d073694ecf9c6b0dcc09707a983a1e1d950a9d0bc4a247b1fd464a66c876c8_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:d52b043483f248cf812d61fd253c979343881ef1aae94b0096aa9dcd1e0aafbb_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:8a00814288cc821ea5c8c349895cd0b6ce5a4dbb793685a7fa144f99506052d5_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:9d656e008382d7dd47619843ed2591eb3592f51af0504ae4642f7aa4fbf89e82_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:c9ac9cedc310e8286272b467f740b8a9f97c0c371b02e6bece42a0211d0e89a2_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:f2b65612117a006a24aca63deec9a1adeff0e94b775129154a255307f4a74240_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:76162ab820b06df90cbca62797e3f2ddca3fb1aa527ce469982ae27f01419562_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:91566f97904038fcd46b79db9b6e351c053ebbfe535a15dc0c560efccfc477af_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:d22d2f99b5863f27b31c69e81489cdb4002f53915a9983ede4ec822934533542_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:ef97fb44e3fa878c676dc32db2b7770a67acf94f3f2b5630de3353fbd4b9de2e_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:4285f37ac71f1522cb28b8cea56415eebe7b05f644f83d28246c32b39eb4f98d_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7a286bd7aac225e6ef6f5ccefb9b1839fb4cb8c6cd5f0cd1ee79ebb43813211f_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:9dd3efe9a0cc081caf3b7e7cea7e03cc13e6a290c8884a492d8ff505dfb0edcd_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:c7d771a9a408e77b825e95f045a84b7334bec1dfe6d5a307fb62066091ac96d1_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:2130222eeb06890b0316489688fb01f0941b4d681e00a33b661c9d4702c4711d_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:4fb65a1e2efffdedff5bb7b5c49b1c9fd7fb52e924971a46928cadd1ce3beac2_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:804431fea3b24f8d8d60f8f6c09d68d8dc6d9926b8c59e869fcaca8bf780d32e_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:e0b9f3902fd2d9117d51e955e58ab46e6fca0af8033fcce4bc860b7aa432c017_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:4b5dfdb8fbd0109362d0a77fc4e2e46933dcc5c8e7f6c38341074f2160702bca_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:61c80fdd31e4e19ee3cc0dbeb8ce72981a6ed1f98327a405637fadd8bb7d5961_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:9b8f15505a7ee118ea6e60870a88c9c582ba9227937113347e03e9afdbb91f16_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:fc8664f60bc08619935ed5133dac7498a7e6f28bb54b5d88184cce1b547a100b_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:35f009047d38584dcb2216ab3a22a019a94e3f5d2d6047737dd33097dd32ab33_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:7892f00200cd9dd55b3b64930ec58bde53489e2bd7815ee9a6cac0f5af2923be_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:e848afbb6a3ce2dae976601c6982fc844cf2a8efaeae88de0c22a005e007e2d0_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:e996549f3c4b48f14bf61be9777bd66084366c649e9cc0e330b911ffd8ca0f65_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:e8a5213454b71e952de52bd448d5f52e6de868821a23c15b71c2b46809bdd570_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:06a5d5d82c7db4c32d66438da9d68e3c98020695b719f05eccf383215869105e_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:5fff30eecc058f0b35655b2287841d7465d67acaa57af6eabce816fbf32da270_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:a824c01bbeca63fa0d7ab3fb5366546beefe9383f02e4546d5ee3fcfb1b791e7_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:b6dc4a8439708052d8e708447944da2cc160a6042b6902e0e9af0e104e823d33_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:49d2f4c671e8199c4972023b95043e989d2a270a375cbab48991af84fd198f0f_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:5850236a1cfe24ff41496fcc68becd23efb2ce6a24f66fbca0fb46ca34e408a1_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:5be0254201b7d2e5a4337876923d43075ca575169a2cce7c9e3e9e1525d0773d_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:eab8d091d0553b201f2ea1d2d7d435891dbe830786b31ae21fe414e097660ae8_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:68dbbbf7a8123db6abbc46fb4746f7b4bcc8c079c95f28823dde6e7174e247ba_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:aa1cd9a88ae51c5061b14637915f69d42cf7807f9a5d3da957e7c319198c28de_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:af7ad17fa628347bc604a1fde2a3bba05840fc428e11836c0ca2c6b7dc2f4ee6_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:d2de54cf6dd17f2b06fd172a13bac53e221807ab0e279c522b0472e56b9dd0ad_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:24e67d1a105be747aee40ce6c616db47f26eb9a74b0f51ddccae545337d5a367_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:390b0d8b53bd91fce22617d5914f4a50fa74441c39e636123604d5f2b4ab8440_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:97d073694ecf9c6b0dcc09707a983a1e1d950a9d0bc4a247b1fd464a66c876c8_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:d52b043483f248cf812d61fd253c979343881ef1aae94b0096aa9dcd1e0aafbb_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:8a00814288cc821ea5c8c349895cd0b6ce5a4dbb793685a7fa144f99506052d5_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:9d656e008382d7dd47619843ed2591eb3592f51af0504ae4642f7aa4fbf89e82_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:c9ac9cedc310e8286272b467f740b8a9f97c0c371b02e6bece42a0211d0e89a2_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:f2b65612117a006a24aca63deec9a1adeff0e94b775129154a255307f4a74240_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:76162ab820b06df90cbca62797e3f2ddca3fb1aa527ce469982ae27f01419562_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:91566f97904038fcd46b79db9b6e351c053ebbfe535a15dc0c560efccfc477af_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:d22d2f99b5863f27b31c69e81489cdb4002f53915a9983ede4ec822934533542_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:ef97fb44e3fa878c676dc32db2b7770a67acf94f3f2b5630de3353fbd4b9de2e_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:4285f37ac71f1522cb28b8cea56415eebe7b05f644f83d28246c32b39eb4f98d_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7a286bd7aac225e6ef6f5ccefb9b1839fb4cb8c6cd5f0cd1ee79ebb43813211f_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:9dd3efe9a0cc081caf3b7e7cea7e03cc13e6a290c8884a492d8ff505dfb0edcd_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:c7d771a9a408e77b825e95f045a84b7334bec1dfe6d5a307fb62066091ac96d1_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:2130222eeb06890b0316489688fb01f0941b4d681e00a33b661c9d4702c4711d_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:4fb65a1e2efffdedff5bb7b5c49b1c9fd7fb52e924971a46928cadd1ce3beac2_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:804431fea3b24f8d8d60f8f6c09d68d8dc6d9926b8c59e869fcaca8bf780d32e_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:e0b9f3902fd2d9117d51e955e58ab46e6fca0af8033fcce4bc860b7aa432c017_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:4b5dfdb8fbd0109362d0a77fc4e2e46933dcc5c8e7f6c38341074f2160702bca_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:61c80fdd31e4e19ee3cc0dbeb8ce72981a6ed1f98327a405637fadd8bb7d5961_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:9b8f15505a7ee118ea6e60870a88c9c582ba9227937113347e03e9afdbb91f16_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:fc8664f60bc08619935ed5133dac7498a7e6f28bb54b5d88184cce1b547a100b_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:35f009047d38584dcb2216ab3a22a019a94e3f5d2d6047737dd33097dd32ab33_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:7892f00200cd9dd55b3b64930ec58bde53489e2bd7815ee9a6cac0f5af2923be_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:e848afbb6a3ce2dae976601c6982fc844cf2a8efaeae88de0c22a005e007e2d0_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:e996549f3c4b48f14bf61be9777bd66084366c649e9cc0e330b911ffd8ca0f65_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:e8a5213454b71e952de52bd448d5f52e6de868821a23c15b71c2b46809bdd570_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:06a5d5d82c7db4c32d66438da9d68e3c98020695b719f05eccf383215869105e_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:5fff30eecc058f0b35655b2287841d7465d67acaa57af6eabce816fbf32da270_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:a824c01bbeca63fa0d7ab3fb5366546beefe9383f02e4546d5ee3fcfb1b791e7_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:b6dc4a8439708052d8e708447944da2cc160a6042b6902e0e9af0e104e823d33_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:49d2f4c671e8199c4972023b95043e989d2a270a375cbab48991af84fd198f0f_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:5850236a1cfe24ff41496fcc68becd23efb2ce6a24f66fbca0fb46ca34e408a1_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:5be0254201b7d2e5a4337876923d43075ca575169a2cce7c9e3e9e1525d0773d_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:eab8d091d0553b201f2ea1d2d7d435891dbe830786b31ae21fe414e097660ae8_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:68dbbbf7a8123db6abbc46fb4746f7b4bcc8c079c95f28823dde6e7174e247ba_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:aa1cd9a88ae51c5061b14637915f69d42cf7807f9a5d3da957e7c319198c28de_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:af7ad17fa628347bc604a1fde2a3bba05840fc428e11836c0ca2c6b7dc2f4ee6_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:d2de54cf6dd17f2b06fd172a13bac53e221807ab0e279c522b0472e56b9dd0ad_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: Incorrect enforcement of email constraints in crypto/x509"
}
]
}
RHSA-2026:5549
Vulnerability from csaf_redhat - Published: 2026-03-24 07:31 - Updated: 2026-04-23 06:08A flaw was found in the net/url package in the Go standard library. The package does not enforce a limit on the number of unique query parameters it parses. A Go application using the net/http.Request.ParseForm method will try to process all parameters provided in the request. A specially crafted HTTP request containing a massive number of query parameters will cause the application to consume an excessive amount of memory, eventually causing the application to crash or become unresponsive, resulting in a denial of service.
A flaw was found in the archive/zip package in the Go standard library. A super-linear file name indexing algorithm is used in the first time a file in an archive is opened. A crafted zip archive containing a specific arrangement of file names can cause an excessive CPU and memory consumption. A Go application processing a malicious archive can become unresponsive or crash, resulting in a denial of service.
A decompression handling flaw has been discovered in urllib3. When streaming a compressed response, urllib3 can perform decoding or decompression based on the HTTP Content-Encoding header (e.g., gzip, deflate, br, or zstd). The library must read compressed data from the network and decompress it until the requested chunk size is met. Any resulting decompressed data that exceeds the requested amount is held in an internal buffer for the next read operation. The decompression logic could cause urllib3 to fully decode a small amount of highly compressed data in a single operation. This can result in excessive resource consumption (high CPU usage and massive memory allocation for the decompressed data; CWE-409) on the client side, even if the application only requested a small chunk of data.
A flaw was found in the crypto/tls component. This vulnerability occurs during Transport Layer Security (TLS) session resumption when certificate authority (CA) settings are modified between the initial and resumed handshakes. An attacker could exploit this to bypass certificate validation, allowing a client or server to establish a connection that should have been rejected. This could lead to an authentication bypass under specific conditions.
The Go standard library function net/url.Parse insufficiently validated the host/authority component and accepted some invalid URLs by effectively treating garbage before an IP-literal as ignorable. The function should have rejected this as invalid.
A certificate validation flaw has been discovered in the golang crypto/x509 module. When verifying a certificate chain which contains a certificate containing multiple email address constraints which share common local portions but different domain portions, these constraints will not be properly applied, and only the last constraint will be considered.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Builds 1.6.4",
"title": "Topic"
},
{
"category": "general",
"text": "Releases of Red Hat OpenShift Builds 1.6.4",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:5549",
"url": "https://access.redhat.com/errata/RHSA-2026:5549"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61726",
"url": "https://access.redhat.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61728",
"url": "https://access.redhat.com/security/cve/CVE-2025-61728"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-66471",
"url": "https://access.redhat.com/security/cve/CVE-2025-66471"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-68121",
"url": "https://access.redhat.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-25679",
"url": "https://access.redhat.com/security/cve/CVE-2026-25679"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-27137",
"url": "https://access.redhat.com/security/cve/CVE-2026-27137"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/builds_for_red_hat_openshift/1.6",
"url": "https://docs.redhat.com/en/documentation/builds_for_red_hat_openshift/1.6"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_5549.json"
}
],
"title": "Red Hat Security Advisory: Red Hat OpenShift Builds 1.6.4",
"tracking": {
"current_release_date": "2026-04-23T06:08:40+00:00",
"generator": {
"date": "2026-04-23T06:08:40+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.5"
}
},
"id": "RHSA-2026:5549",
"initial_release_date": "2026-03-24T07:31:25+00:00",
"revision_history": [
{
"date": "2026-03-24T07:31:25+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-03-24T07:31:29+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-23T06:08:40+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Builds 1.6.4",
"product": {
"name": "Red Hat OpenShift Builds 1.6.4",
"product_id": "Red Hat OpenShift Builds 1.6.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift_builds:1.6::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Builds"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:3e7802fd4777d02152c225bd23d99d3a67301ef7dcc4d86624dc0852905b89c0_amd64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:3e7802fd4777d02152c225bd23d99d3a67301ef7dcc4d86624dc0852905b89c0_amd64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:3e7802fd4777d02152c225bd23d99d3a67301ef7dcc4d86624dc0852905b89c0_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-controller-rhel9@sha256%3A3e7802fd4777d02152c225bd23d99d3a67301ef7dcc4d86624dc0852905b89c0?arch=amd64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1773920797"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:86dc4e5cb44e3e7519fa3fb4c994b2cc9204117a728c458b3994c8c6dfba372d_amd64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:86dc4e5cb44e3e7519fa3fb4c994b2cc9204117a728c458b3994c8c6dfba372d_amd64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:86dc4e5cb44e3e7519fa3fb4c994b2cc9204117a728c458b3994c8c6dfba372d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-git-cloner-rhel9@sha256%3A86dc4e5cb44e3e7519fa3fb4c994b2cc9204117a728c458b3994c8c6dfba372d?arch=amd64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1773920861"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:e7607a6ca262ba1f9403d8a89e8f9771b84cac45e43eaee739789cf0cb8ebd29_amd64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:e7607a6ca262ba1f9403d8a89e8f9771b84cac45e43eaee739789cf0cb8ebd29_amd64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:e7607a6ca262ba1f9403d8a89e8f9771b84cac45e43eaee739789cf0cb8ebd29_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-image-bundler-rhel9@sha256%3Ae7607a6ca262ba1f9403d8a89e8f9771b84cac45e43eaee739789cf0cb8ebd29?arch=amd64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1773921337"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:d3092e5ad323b1454a7ee54d54ff0aae0f5cb44603a93a80087768e984c917fc_amd64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:d3092e5ad323b1454a7ee54d54ff0aae0f5cb44603a93a80087768e984c917fc_amd64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:d3092e5ad323b1454a7ee54d54ff0aae0f5cb44603a93a80087768e984c917fc_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-image-processing-rhel9@sha256%3Ad3092e5ad323b1454a7ee54d54ff0aae0f5cb44603a93a80087768e984c917fc?arch=amd64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1773921036"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:abc4ca39454ce581794f6e80b272878b1aa81636d84933de5de0035888d9e231_amd64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:abc4ca39454ce581794f6e80b272878b1aa81636d84933de5de0035888d9e231_amd64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:abc4ca39454ce581794f6e80b272878b1aa81636d84933de5de0035888d9e231_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-rhel9-operator@sha256%3Aabc4ca39454ce581794f6e80b272878b1aa81636d84933de5de0035888d9e231?arch=amd64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1774304869"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:b5a49391fd646c612bff8ee78e55f193f17141a3ef567eefdbaa21e9edaf4ed1_amd64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:b5a49391fd646c612bff8ee78e55f193f17141a3ef567eefdbaa21e9edaf4ed1_amd64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:b5a49391fd646c612bff8ee78e55f193f17141a3ef567eefdbaa21e9edaf4ed1_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-operator-bundle@sha256%3Ab5a49391fd646c612bff8ee78e55f193f17141a3ef567eefdbaa21e9edaf4ed1?arch=amd64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1774334986"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:0a3b22036310909533456be9c03ae6b7b3c5d91b89b245533925cfe81e523d9e_amd64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:0a3b22036310909533456be9c03ae6b7b3c5d91b89b245533925cfe81e523d9e_amd64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:0a3b22036310909533456be9c03ae6b7b3c5d91b89b245533925cfe81e523d9e_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-shared-resource-rhel9@sha256%3A0a3b22036310909533456be9c03ae6b7b3c5d91b89b245533925cfe81e523d9e?arch=amd64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1773931994"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:391eda856869508163773cf3d8f457bc27bae4619009abab4e1bc95c34013a80_amd64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:391eda856869508163773cf3d8f457bc27bae4619009abab4e1bc95c34013a80_amd64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:391eda856869508163773cf3d8f457bc27bae4619009abab4e1bc95c34013a80_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-shared-resource-webhook-rhel9@sha256%3A391eda856869508163773cf3d8f457bc27bae4619009abab4e1bc95c34013a80?arch=amd64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1773931788"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:a716d3e3cc713c7494d0c051d23a872f4d8404f5f2c5226b13c715c901122872_amd64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:a716d3e3cc713c7494d0c051d23a872f4d8404f5f2c5226b13c715c901122872_amd64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:a716d3e3cc713c7494d0c051d23a872f4d8404f5f2c5226b13c715c901122872_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-waiters-rhel9@sha256%3Aa716d3e3cc713c7494d0c051d23a872f4d8404f5f2c5226b13c715c901122872?arch=amd64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1774334066"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1dad4897c8b22566fd61a83af3ae9f235001d5b8e5cdd40ed6d76bf7f58b508a_amd64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1dad4897c8b22566fd61a83af3ae9f235001d5b8e5cdd40ed6d76bf7f58b508a_amd64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1dad4897c8b22566fd61a83af3ae9f235001d5b8e5cdd40ed6d76bf7f58b508a_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-webhook-rhel9@sha256%3A1dad4897c8b22566fd61a83af3ae9f235001d5b8e5cdd40ed6d76bf7f58b508a?arch=amd64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1773921206"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:6ebecac905954551ee9e1d8ace2282305823528e5d81f430020390e6f0146733_arm64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:6ebecac905954551ee9e1d8ace2282305823528e5d81f430020390e6f0146733_arm64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:6ebecac905954551ee9e1d8ace2282305823528e5d81f430020390e6f0146733_arm64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-controller-rhel9@sha256%3A6ebecac905954551ee9e1d8ace2282305823528e5d81f430020390e6f0146733?arch=arm64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1773920797"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:84a60e844b90441a353b605ec9d893426a2cba422c45306090273a738b029242_arm64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:84a60e844b90441a353b605ec9d893426a2cba422c45306090273a738b029242_arm64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:84a60e844b90441a353b605ec9d893426a2cba422c45306090273a738b029242_arm64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-git-cloner-rhel9@sha256%3A84a60e844b90441a353b605ec9d893426a2cba422c45306090273a738b029242?arch=arm64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1773920861"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:942b6a4d4299e09ba619144ee216cb5eea73dd8aea6117ae4cb92a82c026c76b_arm64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:942b6a4d4299e09ba619144ee216cb5eea73dd8aea6117ae4cb92a82c026c76b_arm64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:942b6a4d4299e09ba619144ee216cb5eea73dd8aea6117ae4cb92a82c026c76b_arm64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-image-bundler-rhel9@sha256%3A942b6a4d4299e09ba619144ee216cb5eea73dd8aea6117ae4cb92a82c026c76b?arch=arm64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1773921337"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:7aaa6d41e175e70f6a96ee44ba47805987a818858a19517698ec564d2d4c6c61_arm64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:7aaa6d41e175e70f6a96ee44ba47805987a818858a19517698ec564d2d4c6c61_arm64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:7aaa6d41e175e70f6a96ee44ba47805987a818858a19517698ec564d2d4c6c61_arm64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-image-processing-rhel9@sha256%3A7aaa6d41e175e70f6a96ee44ba47805987a818858a19517698ec564d2d4c6c61?arch=arm64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1773921036"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:ace068e3a65adc34ebba6a38242d4bb65e8cdd05c846daadfaa9e687e666b0bb_arm64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:ace068e3a65adc34ebba6a38242d4bb65e8cdd05c846daadfaa9e687e666b0bb_arm64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:ace068e3a65adc34ebba6a38242d4bb65e8cdd05c846daadfaa9e687e666b0bb_arm64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-rhel9-operator@sha256%3Aace068e3a65adc34ebba6a38242d4bb65e8cdd05c846daadfaa9e687e666b0bb?arch=arm64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1774304869"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:ea105c68e91862c8d0279240d9d92d1d27b816b49bbf528fb2d30a11343a24d8_arm64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:ea105c68e91862c8d0279240d9d92d1d27b816b49bbf528fb2d30a11343a24d8_arm64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:ea105c68e91862c8d0279240d9d92d1d27b816b49bbf528fb2d30a11343a24d8_arm64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-shared-resource-rhel9@sha256%3Aea105c68e91862c8d0279240d9d92d1d27b816b49bbf528fb2d30a11343a24d8?arch=arm64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1773931994"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:1cc18f61f97007488f929514f0d96e7ee799cbeb57c8040393510fb5df1308ea_arm64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:1cc18f61f97007488f929514f0d96e7ee799cbeb57c8040393510fb5df1308ea_arm64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:1cc18f61f97007488f929514f0d96e7ee799cbeb57c8040393510fb5df1308ea_arm64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-shared-resource-webhook-rhel9@sha256%3A1cc18f61f97007488f929514f0d96e7ee799cbeb57c8040393510fb5df1308ea?arch=arm64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1773931788"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:10cc203162a18a29b59faedf70efbdce132e92f64f915d3265c4fcb44711df9c_arm64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:10cc203162a18a29b59faedf70efbdce132e92f64f915d3265c4fcb44711df9c_arm64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:10cc203162a18a29b59faedf70efbdce132e92f64f915d3265c4fcb44711df9c_arm64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-waiters-rhel9@sha256%3A10cc203162a18a29b59faedf70efbdce132e92f64f915d3265c4fcb44711df9c?arch=arm64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1774334066"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:19356ed9f617a6fccc1b299c05c07a54d078d1cde15ebe6663e2e11da3b7ac61_arm64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:19356ed9f617a6fccc1b299c05c07a54d078d1cde15ebe6663e2e11da3b7ac61_arm64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:19356ed9f617a6fccc1b299c05c07a54d078d1cde15ebe6663e2e11da3b7ac61_arm64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-webhook-rhel9@sha256%3A19356ed9f617a6fccc1b299c05c07a54d078d1cde15ebe6663e2e11da3b7ac61?arch=arm64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1773921206"
}
}
}
],
"category": "architecture",
"name": "arm64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:658118be2dd7dde63668822f2b10bf2155d1a7264435c31e9da01c4eed429a31_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:658118be2dd7dde63668822f2b10bf2155d1a7264435c31e9da01c4eed429a31_ppc64le",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:658118be2dd7dde63668822f2b10bf2155d1a7264435c31e9da01c4eed429a31_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-controller-rhel9@sha256%3A658118be2dd7dde63668822f2b10bf2155d1a7264435c31e9da01c4eed429a31?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1773920797"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:0c292a7860239fcaf9dc3b99ded7fb3bf35bb04e36419731012a407a055ce93a_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:0c292a7860239fcaf9dc3b99ded7fb3bf35bb04e36419731012a407a055ce93a_ppc64le",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:0c292a7860239fcaf9dc3b99ded7fb3bf35bb04e36419731012a407a055ce93a_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-git-cloner-rhel9@sha256%3A0c292a7860239fcaf9dc3b99ded7fb3bf35bb04e36419731012a407a055ce93a?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1773920861"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:6cad955d303121f214c9200fdded75a18c0ebca4d6676fc49fb82c06fc4790fc_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:6cad955d303121f214c9200fdded75a18c0ebca4d6676fc49fb82c06fc4790fc_ppc64le",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:6cad955d303121f214c9200fdded75a18c0ebca4d6676fc49fb82c06fc4790fc_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-image-bundler-rhel9@sha256%3A6cad955d303121f214c9200fdded75a18c0ebca4d6676fc49fb82c06fc4790fc?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1773921337"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:21230f1cee5974dc459f4b31f829f942cf27d2b7adf081ade185f78b8554822f_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:21230f1cee5974dc459f4b31f829f942cf27d2b7adf081ade185f78b8554822f_ppc64le",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:21230f1cee5974dc459f4b31f829f942cf27d2b7adf081ade185f78b8554822f_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-image-processing-rhel9@sha256%3A21230f1cee5974dc459f4b31f829f942cf27d2b7adf081ade185f78b8554822f?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1773921036"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:a753821c3238712b53436e7689ed0bf6dde224aa9bbcca70c4018709e7391ff5_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:a753821c3238712b53436e7689ed0bf6dde224aa9bbcca70c4018709e7391ff5_ppc64le",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:a753821c3238712b53436e7689ed0bf6dde224aa9bbcca70c4018709e7391ff5_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-rhel9-operator@sha256%3Aa753821c3238712b53436e7689ed0bf6dde224aa9bbcca70c4018709e7391ff5?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1774304869"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:e1489201089cda6b2b6dfe8b3b74bb4565030586de1ba18888727a5ddba4dea1_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:e1489201089cda6b2b6dfe8b3b74bb4565030586de1ba18888727a5ddba4dea1_ppc64le",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:e1489201089cda6b2b6dfe8b3b74bb4565030586de1ba18888727a5ddba4dea1_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-shared-resource-rhel9@sha256%3Ae1489201089cda6b2b6dfe8b3b74bb4565030586de1ba18888727a5ddba4dea1?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1773931994"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:d6d1b43384c9532b4d5c0af85df5a6086b986494825216103c02bfe67ddb1f33_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:d6d1b43384c9532b4d5c0af85df5a6086b986494825216103c02bfe67ddb1f33_ppc64le",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:d6d1b43384c9532b4d5c0af85df5a6086b986494825216103c02bfe67ddb1f33_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-shared-resource-webhook-rhel9@sha256%3Ad6d1b43384c9532b4d5c0af85df5a6086b986494825216103c02bfe67ddb1f33?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1773931788"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:1beb2ef462b304a691c1bfd855bc6f70d26895a290de7524e0806ea023f92a30_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:1beb2ef462b304a691c1bfd855bc6f70d26895a290de7524e0806ea023f92a30_ppc64le",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:1beb2ef462b304a691c1bfd855bc6f70d26895a290de7524e0806ea023f92a30_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-waiters-rhel9@sha256%3A1beb2ef462b304a691c1bfd855bc6f70d26895a290de7524e0806ea023f92a30?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1774334066"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:8fa9769e07dd82241952df0f4dd80e3d9671a9df66f0a4390d009123c6f09179_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:8fa9769e07dd82241952df0f4dd80e3d9671a9df66f0a4390d009123c6f09179_ppc64le",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:8fa9769e07dd82241952df0f4dd80e3d9671a9df66f0a4390d009123c6f09179_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-webhook-rhel9@sha256%3A8fa9769e07dd82241952df0f4dd80e3d9671a9df66f0a4390d009123c6f09179?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1773921206"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:9f138971e0419cf08273b296c86770a6a8146e96b19f354df51141794cb2dc50_s390x",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:9f138971e0419cf08273b296c86770a6a8146e96b19f354df51141794cb2dc50_s390x",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:9f138971e0419cf08273b296c86770a6a8146e96b19f354df51141794cb2dc50_s390x",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-controller-rhel9@sha256%3A9f138971e0419cf08273b296c86770a6a8146e96b19f354df51141794cb2dc50?arch=s390x\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1773920797"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:9a0705a74dbf6f6dc4f202696462940aa8c21358c60678d8c06f39e438ee410d_s390x",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:9a0705a74dbf6f6dc4f202696462940aa8c21358c60678d8c06f39e438ee410d_s390x",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:9a0705a74dbf6f6dc4f202696462940aa8c21358c60678d8c06f39e438ee410d_s390x",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-git-cloner-rhel9@sha256%3A9a0705a74dbf6f6dc4f202696462940aa8c21358c60678d8c06f39e438ee410d?arch=s390x\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1773920861"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:933f790fe6a2652dde798dcb39e4daeb6ad2a3b371d3b4930ef4f016a70769ed_s390x",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:933f790fe6a2652dde798dcb39e4daeb6ad2a3b371d3b4930ef4f016a70769ed_s390x",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:933f790fe6a2652dde798dcb39e4daeb6ad2a3b371d3b4930ef4f016a70769ed_s390x",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-image-bundler-rhel9@sha256%3A933f790fe6a2652dde798dcb39e4daeb6ad2a3b371d3b4930ef4f016a70769ed?arch=s390x\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1773921337"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:0a49e3ed4090ee01e433871ef2765d8c74813333f6a641f2edff6fd56ede8d76_s390x",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:0a49e3ed4090ee01e433871ef2765d8c74813333f6a641f2edff6fd56ede8d76_s390x",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:0a49e3ed4090ee01e433871ef2765d8c74813333f6a641f2edff6fd56ede8d76_s390x",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-image-processing-rhel9@sha256%3A0a49e3ed4090ee01e433871ef2765d8c74813333f6a641f2edff6fd56ede8d76?arch=s390x\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1773921036"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:846cfa73983011c3f351e0584ace035ad06713f78e625e351922c33c31fc35f6_s390x",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:846cfa73983011c3f351e0584ace035ad06713f78e625e351922c33c31fc35f6_s390x",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:846cfa73983011c3f351e0584ace035ad06713f78e625e351922c33c31fc35f6_s390x",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-rhel9-operator@sha256%3A846cfa73983011c3f351e0584ace035ad06713f78e625e351922c33c31fc35f6?arch=s390x\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1774304869"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:d9a636edf9d0ea72339a6cf4af5d343f8ff0723cd466581a80968820405f9a15_s390x",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:d9a636edf9d0ea72339a6cf4af5d343f8ff0723cd466581a80968820405f9a15_s390x",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:d9a636edf9d0ea72339a6cf4af5d343f8ff0723cd466581a80968820405f9a15_s390x",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-shared-resource-rhel9@sha256%3Ad9a636edf9d0ea72339a6cf4af5d343f8ff0723cd466581a80968820405f9a15?arch=s390x\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1773931994"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:b623dd3f2f055038655d3ec62983d6bf7f519d4b2d010c89f2809870ab75c3ff_s390x",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:b623dd3f2f055038655d3ec62983d6bf7f519d4b2d010c89f2809870ab75c3ff_s390x",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:b623dd3f2f055038655d3ec62983d6bf7f519d4b2d010c89f2809870ab75c3ff_s390x",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-shared-resource-webhook-rhel9@sha256%3Ab623dd3f2f055038655d3ec62983d6bf7f519d4b2d010c89f2809870ab75c3ff?arch=s390x\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1773931788"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:8006f2dbeae12667c5a31827ef0f022733a950234cd55a0239334f3003b6e438_s390x",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:8006f2dbeae12667c5a31827ef0f022733a950234cd55a0239334f3003b6e438_s390x",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:8006f2dbeae12667c5a31827ef0f022733a950234cd55a0239334f3003b6e438_s390x",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-waiters-rhel9@sha256%3A8006f2dbeae12667c5a31827ef0f022733a950234cd55a0239334f3003b6e438?arch=s390x\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1774334066"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1e20f4f7824339c4685afa6e309f8c143c245d824ae7d781488816fa1d62d17c_s390x",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1e20f4f7824339c4685afa6e309f8c143c245d824ae7d781488816fa1d62d17c_s390x",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1e20f4f7824339c4685afa6e309f8c143c245d824ae7d781488816fa1d62d17c_s390x",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-webhook-rhel9@sha256%3A1e20f4f7824339c4685afa6e309f8c143c245d824ae7d781488816fa1d62d17c?arch=s390x\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1773921206"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:3e7802fd4777d02152c225bd23d99d3a67301ef7dcc4d86624dc0852905b89c0_amd64 as a component of Red Hat OpenShift Builds 1.6.4",
"product_id": "Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:3e7802fd4777d02152c225bd23d99d3a67301ef7dcc4d86624dc0852905b89c0_amd64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:3e7802fd4777d02152c225bd23d99d3a67301ef7dcc4d86624dc0852905b89c0_amd64",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.6.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:658118be2dd7dde63668822f2b10bf2155d1a7264435c31e9da01c4eed429a31_ppc64le as a component of Red Hat OpenShift Builds 1.6.4",
"product_id": "Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:658118be2dd7dde63668822f2b10bf2155d1a7264435c31e9da01c4eed429a31_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:658118be2dd7dde63668822f2b10bf2155d1a7264435c31e9da01c4eed429a31_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.6.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:6ebecac905954551ee9e1d8ace2282305823528e5d81f430020390e6f0146733_arm64 as a component of Red Hat OpenShift Builds 1.6.4",
"product_id": "Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:6ebecac905954551ee9e1d8ace2282305823528e5d81f430020390e6f0146733_arm64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:6ebecac905954551ee9e1d8ace2282305823528e5d81f430020390e6f0146733_arm64",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.6.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:9f138971e0419cf08273b296c86770a6a8146e96b19f354df51141794cb2dc50_s390x as a component of Red Hat OpenShift Builds 1.6.4",
"product_id": "Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:9f138971e0419cf08273b296c86770a6a8146e96b19f354df51141794cb2dc50_s390x"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:9f138971e0419cf08273b296c86770a6a8146e96b19f354df51141794cb2dc50_s390x",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.6.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:0c292a7860239fcaf9dc3b99ded7fb3bf35bb04e36419731012a407a055ce93a_ppc64le as a component of Red Hat OpenShift Builds 1.6.4",
"product_id": "Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:0c292a7860239fcaf9dc3b99ded7fb3bf35bb04e36419731012a407a055ce93a_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:0c292a7860239fcaf9dc3b99ded7fb3bf35bb04e36419731012a407a055ce93a_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.6.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:84a60e844b90441a353b605ec9d893426a2cba422c45306090273a738b029242_arm64 as a component of Red Hat OpenShift Builds 1.6.4",
"product_id": "Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:84a60e844b90441a353b605ec9d893426a2cba422c45306090273a738b029242_arm64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:84a60e844b90441a353b605ec9d893426a2cba422c45306090273a738b029242_arm64",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.6.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:86dc4e5cb44e3e7519fa3fb4c994b2cc9204117a728c458b3994c8c6dfba372d_amd64 as a component of Red Hat OpenShift Builds 1.6.4",
"product_id": "Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:86dc4e5cb44e3e7519fa3fb4c994b2cc9204117a728c458b3994c8c6dfba372d_amd64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:86dc4e5cb44e3e7519fa3fb4c994b2cc9204117a728c458b3994c8c6dfba372d_amd64",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.6.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:9a0705a74dbf6f6dc4f202696462940aa8c21358c60678d8c06f39e438ee410d_s390x as a component of Red Hat OpenShift Builds 1.6.4",
"product_id": "Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:9a0705a74dbf6f6dc4f202696462940aa8c21358c60678d8c06f39e438ee410d_s390x"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:9a0705a74dbf6f6dc4f202696462940aa8c21358c60678d8c06f39e438ee410d_s390x",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.6.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:6cad955d303121f214c9200fdded75a18c0ebca4d6676fc49fb82c06fc4790fc_ppc64le as a component of Red Hat OpenShift Builds 1.6.4",
"product_id": "Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:6cad955d303121f214c9200fdded75a18c0ebca4d6676fc49fb82c06fc4790fc_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:6cad955d303121f214c9200fdded75a18c0ebca4d6676fc49fb82c06fc4790fc_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.6.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:933f790fe6a2652dde798dcb39e4daeb6ad2a3b371d3b4930ef4f016a70769ed_s390x as a component of Red Hat OpenShift Builds 1.6.4",
"product_id": "Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:933f790fe6a2652dde798dcb39e4daeb6ad2a3b371d3b4930ef4f016a70769ed_s390x"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:933f790fe6a2652dde798dcb39e4daeb6ad2a3b371d3b4930ef4f016a70769ed_s390x",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.6.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:942b6a4d4299e09ba619144ee216cb5eea73dd8aea6117ae4cb92a82c026c76b_arm64 as a component of Red Hat OpenShift Builds 1.6.4",
"product_id": "Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:942b6a4d4299e09ba619144ee216cb5eea73dd8aea6117ae4cb92a82c026c76b_arm64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:942b6a4d4299e09ba619144ee216cb5eea73dd8aea6117ae4cb92a82c026c76b_arm64",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.6.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:e7607a6ca262ba1f9403d8a89e8f9771b84cac45e43eaee739789cf0cb8ebd29_amd64 as a component of Red Hat OpenShift Builds 1.6.4",
"product_id": "Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:e7607a6ca262ba1f9403d8a89e8f9771b84cac45e43eaee739789cf0cb8ebd29_amd64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:e7607a6ca262ba1f9403d8a89e8f9771b84cac45e43eaee739789cf0cb8ebd29_amd64",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.6.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:0a49e3ed4090ee01e433871ef2765d8c74813333f6a641f2edff6fd56ede8d76_s390x as a component of Red Hat OpenShift Builds 1.6.4",
"product_id": "Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:0a49e3ed4090ee01e433871ef2765d8c74813333f6a641f2edff6fd56ede8d76_s390x"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:0a49e3ed4090ee01e433871ef2765d8c74813333f6a641f2edff6fd56ede8d76_s390x",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.6.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:21230f1cee5974dc459f4b31f829f942cf27d2b7adf081ade185f78b8554822f_ppc64le as a component of Red Hat OpenShift Builds 1.6.4",
"product_id": "Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:21230f1cee5974dc459f4b31f829f942cf27d2b7adf081ade185f78b8554822f_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:21230f1cee5974dc459f4b31f829f942cf27d2b7adf081ade185f78b8554822f_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.6.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:7aaa6d41e175e70f6a96ee44ba47805987a818858a19517698ec564d2d4c6c61_arm64 as a component of Red Hat OpenShift Builds 1.6.4",
"product_id": "Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:7aaa6d41e175e70f6a96ee44ba47805987a818858a19517698ec564d2d4c6c61_arm64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:7aaa6d41e175e70f6a96ee44ba47805987a818858a19517698ec564d2d4c6c61_arm64",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.6.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:d3092e5ad323b1454a7ee54d54ff0aae0f5cb44603a93a80087768e984c917fc_amd64 as a component of Red Hat OpenShift Builds 1.6.4",
"product_id": "Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:d3092e5ad323b1454a7ee54d54ff0aae0f5cb44603a93a80087768e984c917fc_amd64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:d3092e5ad323b1454a7ee54d54ff0aae0f5cb44603a93a80087768e984c917fc_amd64",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.6.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:b5a49391fd646c612bff8ee78e55f193f17141a3ef567eefdbaa21e9edaf4ed1_amd64 as a component of Red Hat OpenShift Builds 1.6.4",
"product_id": "Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:b5a49391fd646c612bff8ee78e55f193f17141a3ef567eefdbaa21e9edaf4ed1_amd64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:b5a49391fd646c612bff8ee78e55f193f17141a3ef567eefdbaa21e9edaf4ed1_amd64",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.6.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:846cfa73983011c3f351e0584ace035ad06713f78e625e351922c33c31fc35f6_s390x as a component of Red Hat OpenShift Builds 1.6.4",
"product_id": "Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:846cfa73983011c3f351e0584ace035ad06713f78e625e351922c33c31fc35f6_s390x"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:846cfa73983011c3f351e0584ace035ad06713f78e625e351922c33c31fc35f6_s390x",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.6.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:a753821c3238712b53436e7689ed0bf6dde224aa9bbcca70c4018709e7391ff5_ppc64le as a component of Red Hat OpenShift Builds 1.6.4",
"product_id": "Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:a753821c3238712b53436e7689ed0bf6dde224aa9bbcca70c4018709e7391ff5_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:a753821c3238712b53436e7689ed0bf6dde224aa9bbcca70c4018709e7391ff5_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.6.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:abc4ca39454ce581794f6e80b272878b1aa81636d84933de5de0035888d9e231_amd64 as a component of Red Hat OpenShift Builds 1.6.4",
"product_id": "Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:abc4ca39454ce581794f6e80b272878b1aa81636d84933de5de0035888d9e231_amd64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:abc4ca39454ce581794f6e80b272878b1aa81636d84933de5de0035888d9e231_amd64",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.6.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:ace068e3a65adc34ebba6a38242d4bb65e8cdd05c846daadfaa9e687e666b0bb_arm64 as a component of Red Hat OpenShift Builds 1.6.4",
"product_id": "Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:ace068e3a65adc34ebba6a38242d4bb65e8cdd05c846daadfaa9e687e666b0bb_arm64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:ace068e3a65adc34ebba6a38242d4bb65e8cdd05c846daadfaa9e687e666b0bb_arm64",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.6.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:0a3b22036310909533456be9c03ae6b7b3c5d91b89b245533925cfe81e523d9e_amd64 as a component of Red Hat OpenShift Builds 1.6.4",
"product_id": "Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:0a3b22036310909533456be9c03ae6b7b3c5d91b89b245533925cfe81e523d9e_amd64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:0a3b22036310909533456be9c03ae6b7b3c5d91b89b245533925cfe81e523d9e_amd64",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.6.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:d9a636edf9d0ea72339a6cf4af5d343f8ff0723cd466581a80968820405f9a15_s390x as a component of Red Hat OpenShift Builds 1.6.4",
"product_id": "Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:d9a636edf9d0ea72339a6cf4af5d343f8ff0723cd466581a80968820405f9a15_s390x"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:d9a636edf9d0ea72339a6cf4af5d343f8ff0723cd466581a80968820405f9a15_s390x",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.6.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:e1489201089cda6b2b6dfe8b3b74bb4565030586de1ba18888727a5ddba4dea1_ppc64le as a component of Red Hat OpenShift Builds 1.6.4",
"product_id": "Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:e1489201089cda6b2b6dfe8b3b74bb4565030586de1ba18888727a5ddba4dea1_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:e1489201089cda6b2b6dfe8b3b74bb4565030586de1ba18888727a5ddba4dea1_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.6.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:ea105c68e91862c8d0279240d9d92d1d27b816b49bbf528fb2d30a11343a24d8_arm64 as a component of Red Hat OpenShift Builds 1.6.4",
"product_id": "Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:ea105c68e91862c8d0279240d9d92d1d27b816b49bbf528fb2d30a11343a24d8_arm64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:ea105c68e91862c8d0279240d9d92d1d27b816b49bbf528fb2d30a11343a24d8_arm64",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.6.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:1cc18f61f97007488f929514f0d96e7ee799cbeb57c8040393510fb5df1308ea_arm64 as a component of Red Hat OpenShift Builds 1.6.4",
"product_id": "Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:1cc18f61f97007488f929514f0d96e7ee799cbeb57c8040393510fb5df1308ea_arm64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:1cc18f61f97007488f929514f0d96e7ee799cbeb57c8040393510fb5df1308ea_arm64",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.6.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:391eda856869508163773cf3d8f457bc27bae4619009abab4e1bc95c34013a80_amd64 as a component of Red Hat OpenShift Builds 1.6.4",
"product_id": "Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:391eda856869508163773cf3d8f457bc27bae4619009abab4e1bc95c34013a80_amd64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:391eda856869508163773cf3d8f457bc27bae4619009abab4e1bc95c34013a80_amd64",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.6.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:b623dd3f2f055038655d3ec62983d6bf7f519d4b2d010c89f2809870ab75c3ff_s390x as a component of Red Hat OpenShift Builds 1.6.4",
"product_id": "Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:b623dd3f2f055038655d3ec62983d6bf7f519d4b2d010c89f2809870ab75c3ff_s390x"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:b623dd3f2f055038655d3ec62983d6bf7f519d4b2d010c89f2809870ab75c3ff_s390x",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.6.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:d6d1b43384c9532b4d5c0af85df5a6086b986494825216103c02bfe67ddb1f33_ppc64le as a component of Red Hat OpenShift Builds 1.6.4",
"product_id": "Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:d6d1b43384c9532b4d5c0af85df5a6086b986494825216103c02bfe67ddb1f33_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:d6d1b43384c9532b4d5c0af85df5a6086b986494825216103c02bfe67ddb1f33_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.6.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:10cc203162a18a29b59faedf70efbdce132e92f64f915d3265c4fcb44711df9c_arm64 as a component of Red Hat OpenShift Builds 1.6.4",
"product_id": "Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:10cc203162a18a29b59faedf70efbdce132e92f64f915d3265c4fcb44711df9c_arm64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:10cc203162a18a29b59faedf70efbdce132e92f64f915d3265c4fcb44711df9c_arm64",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.6.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:1beb2ef462b304a691c1bfd855bc6f70d26895a290de7524e0806ea023f92a30_ppc64le as a component of Red Hat OpenShift Builds 1.6.4",
"product_id": "Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:1beb2ef462b304a691c1bfd855bc6f70d26895a290de7524e0806ea023f92a30_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:1beb2ef462b304a691c1bfd855bc6f70d26895a290de7524e0806ea023f92a30_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.6.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:8006f2dbeae12667c5a31827ef0f022733a950234cd55a0239334f3003b6e438_s390x as a component of Red Hat OpenShift Builds 1.6.4",
"product_id": "Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:8006f2dbeae12667c5a31827ef0f022733a950234cd55a0239334f3003b6e438_s390x"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:8006f2dbeae12667c5a31827ef0f022733a950234cd55a0239334f3003b6e438_s390x",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.6.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:a716d3e3cc713c7494d0c051d23a872f4d8404f5f2c5226b13c715c901122872_amd64 as a component of Red Hat OpenShift Builds 1.6.4",
"product_id": "Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:a716d3e3cc713c7494d0c051d23a872f4d8404f5f2c5226b13c715c901122872_amd64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:a716d3e3cc713c7494d0c051d23a872f4d8404f5f2c5226b13c715c901122872_amd64",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.6.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:19356ed9f617a6fccc1b299c05c07a54d078d1cde15ebe6663e2e11da3b7ac61_arm64 as a component of Red Hat OpenShift Builds 1.6.4",
"product_id": "Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:19356ed9f617a6fccc1b299c05c07a54d078d1cde15ebe6663e2e11da3b7ac61_arm64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:19356ed9f617a6fccc1b299c05c07a54d078d1cde15ebe6663e2e11da3b7ac61_arm64",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.6.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1dad4897c8b22566fd61a83af3ae9f235001d5b8e5cdd40ed6d76bf7f58b508a_amd64 as a component of Red Hat OpenShift Builds 1.6.4",
"product_id": "Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1dad4897c8b22566fd61a83af3ae9f235001d5b8e5cdd40ed6d76bf7f58b508a_amd64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1dad4897c8b22566fd61a83af3ae9f235001d5b8e5cdd40ed6d76bf7f58b508a_amd64",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.6.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1e20f4f7824339c4685afa6e309f8c143c245d824ae7d781488816fa1d62d17c_s390x as a component of Red Hat OpenShift Builds 1.6.4",
"product_id": "Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1e20f4f7824339c4685afa6e309f8c143c245d824ae7d781488816fa1d62d17c_s390x"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1e20f4f7824339c4685afa6e309f8c143c245d824ae7d781488816fa1d62d17c_s390x",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.6.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:8fa9769e07dd82241952df0f4dd80e3d9671a9df66f0a4390d009123c6f09179_ppc64le as a component of Red Hat OpenShift Builds 1.6.4",
"product_id": "Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:8fa9769e07dd82241952df0f4dd80e3d9671a9df66f0a4390d009123c6f09179_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:8fa9769e07dd82241952df0f4dd80e3d9671a9df66f0a4390d009123c6f09179_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.6.4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61726",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:42.791305+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:b5a49391fd646c612bff8ee78e55f193f17141a3ef567eefdbaa21e9edaf4ed1_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434432"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the net/url package in the Go standard library. The package does not enforce a limit on the number of unique query parameters it parses. A Go application using the net/http.Request.ParseForm method will try to process all parameters provided in the request. A specially crafted HTTP request containing a massive number of query parameters will cause the application to consume an excessive amount of memory, eventually causing the application to crash or become unresponsive, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/url: Memory exhaustion in query parameter parsing in net/url",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker must be able to send a specially crafted HTTP request to an application parsing URL-encoded forms with net/url, specifically a request containing a large number of unique query parameters. The request will cause the application to consume an excessive amount of memory and eventually result in a denial of service, with no impact to confidentiality or integrity. Due to this reason, this vulnerability has been rated with an important severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:3e7802fd4777d02152c225bd23d99d3a67301ef7dcc4d86624dc0852905b89c0_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:658118be2dd7dde63668822f2b10bf2155d1a7264435c31e9da01c4eed429a31_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:6ebecac905954551ee9e1d8ace2282305823528e5d81f430020390e6f0146733_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:9f138971e0419cf08273b296c86770a6a8146e96b19f354df51141794cb2dc50_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:0c292a7860239fcaf9dc3b99ded7fb3bf35bb04e36419731012a407a055ce93a_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:84a60e844b90441a353b605ec9d893426a2cba422c45306090273a738b029242_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:86dc4e5cb44e3e7519fa3fb4c994b2cc9204117a728c458b3994c8c6dfba372d_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:9a0705a74dbf6f6dc4f202696462940aa8c21358c60678d8c06f39e438ee410d_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:6cad955d303121f214c9200fdded75a18c0ebca4d6676fc49fb82c06fc4790fc_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:933f790fe6a2652dde798dcb39e4daeb6ad2a3b371d3b4930ef4f016a70769ed_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:942b6a4d4299e09ba619144ee216cb5eea73dd8aea6117ae4cb92a82c026c76b_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:e7607a6ca262ba1f9403d8a89e8f9771b84cac45e43eaee739789cf0cb8ebd29_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:0a49e3ed4090ee01e433871ef2765d8c74813333f6a641f2edff6fd56ede8d76_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:21230f1cee5974dc459f4b31f829f942cf27d2b7adf081ade185f78b8554822f_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:7aaa6d41e175e70f6a96ee44ba47805987a818858a19517698ec564d2d4c6c61_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:d3092e5ad323b1454a7ee54d54ff0aae0f5cb44603a93a80087768e984c917fc_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:846cfa73983011c3f351e0584ace035ad06713f78e625e351922c33c31fc35f6_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:a753821c3238712b53436e7689ed0bf6dde224aa9bbcca70c4018709e7391ff5_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:abc4ca39454ce581794f6e80b272878b1aa81636d84933de5de0035888d9e231_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:ace068e3a65adc34ebba6a38242d4bb65e8cdd05c846daadfaa9e687e666b0bb_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:0a3b22036310909533456be9c03ae6b7b3c5d91b89b245533925cfe81e523d9e_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:d9a636edf9d0ea72339a6cf4af5d343f8ff0723cd466581a80968820405f9a15_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:e1489201089cda6b2b6dfe8b3b74bb4565030586de1ba18888727a5ddba4dea1_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:ea105c68e91862c8d0279240d9d92d1d27b816b49bbf528fb2d30a11343a24d8_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:1cc18f61f97007488f929514f0d96e7ee799cbeb57c8040393510fb5df1308ea_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:391eda856869508163773cf3d8f457bc27bae4619009abab4e1bc95c34013a80_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:b623dd3f2f055038655d3ec62983d6bf7f519d4b2d010c89f2809870ab75c3ff_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:d6d1b43384c9532b4d5c0af85df5a6086b986494825216103c02bfe67ddb1f33_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:10cc203162a18a29b59faedf70efbdce132e92f64f915d3265c4fcb44711df9c_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:1beb2ef462b304a691c1bfd855bc6f70d26895a290de7524e0806ea023f92a30_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:8006f2dbeae12667c5a31827ef0f022733a950234cd55a0239334f3003b6e438_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:a716d3e3cc713c7494d0c051d23a872f4d8404f5f2c5226b13c715c901122872_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:19356ed9f617a6fccc1b299c05c07a54d078d1cde15ebe6663e2e11da3b7ac61_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1dad4897c8b22566fd61a83af3ae9f235001d5b8e5cdd40ed6d76bf7f58b508a_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1e20f4f7824339c4685afa6e309f8c143c245d824ae7d781488816fa1d62d17c_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:8fa9769e07dd82241952df0f4dd80e3d9671a9df66f0a4390d009123c6f09179_ppc64le"
],
"known_not_affected": [
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:b5a49391fd646c612bff8ee78e55f193f17141a3ef567eefdbaa21e9edaf4ed1_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "RHBZ#2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"category": "external",
"summary": "https://go.dev/cl/736712",
"url": "https://go.dev/cl/736712"
},
{
"category": "external",
"summary": "https://go.dev/issue/77101",
"url": "https://go.dev/issue/77101"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4341",
"url": "https://pkg.go.dev/vuln/GO-2026-4341"
}
],
"release_date": "2026-01-28T19:30:31.215000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-24T07:31:25+00:00",
"details": "It is recommended that existing users of Red Hat OpenShift Builds 1.6.3 upgrades to to 1.6.4",
"product_ids": [
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:3e7802fd4777d02152c225bd23d99d3a67301ef7dcc4d86624dc0852905b89c0_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:658118be2dd7dde63668822f2b10bf2155d1a7264435c31e9da01c4eed429a31_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:6ebecac905954551ee9e1d8ace2282305823528e5d81f430020390e6f0146733_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:9f138971e0419cf08273b296c86770a6a8146e96b19f354df51141794cb2dc50_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:0c292a7860239fcaf9dc3b99ded7fb3bf35bb04e36419731012a407a055ce93a_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:84a60e844b90441a353b605ec9d893426a2cba422c45306090273a738b029242_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:86dc4e5cb44e3e7519fa3fb4c994b2cc9204117a728c458b3994c8c6dfba372d_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:9a0705a74dbf6f6dc4f202696462940aa8c21358c60678d8c06f39e438ee410d_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:6cad955d303121f214c9200fdded75a18c0ebca4d6676fc49fb82c06fc4790fc_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:933f790fe6a2652dde798dcb39e4daeb6ad2a3b371d3b4930ef4f016a70769ed_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:942b6a4d4299e09ba619144ee216cb5eea73dd8aea6117ae4cb92a82c026c76b_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:e7607a6ca262ba1f9403d8a89e8f9771b84cac45e43eaee739789cf0cb8ebd29_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:0a49e3ed4090ee01e433871ef2765d8c74813333f6a641f2edff6fd56ede8d76_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:21230f1cee5974dc459f4b31f829f942cf27d2b7adf081ade185f78b8554822f_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:7aaa6d41e175e70f6a96ee44ba47805987a818858a19517698ec564d2d4c6c61_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:d3092e5ad323b1454a7ee54d54ff0aae0f5cb44603a93a80087768e984c917fc_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:846cfa73983011c3f351e0584ace035ad06713f78e625e351922c33c31fc35f6_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:a753821c3238712b53436e7689ed0bf6dde224aa9bbcca70c4018709e7391ff5_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:abc4ca39454ce581794f6e80b272878b1aa81636d84933de5de0035888d9e231_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:ace068e3a65adc34ebba6a38242d4bb65e8cdd05c846daadfaa9e687e666b0bb_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:0a3b22036310909533456be9c03ae6b7b3c5d91b89b245533925cfe81e523d9e_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:d9a636edf9d0ea72339a6cf4af5d343f8ff0723cd466581a80968820405f9a15_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:e1489201089cda6b2b6dfe8b3b74bb4565030586de1ba18888727a5ddba4dea1_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:ea105c68e91862c8d0279240d9d92d1d27b816b49bbf528fb2d30a11343a24d8_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:1cc18f61f97007488f929514f0d96e7ee799cbeb57c8040393510fb5df1308ea_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:391eda856869508163773cf3d8f457bc27bae4619009abab4e1bc95c34013a80_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:b623dd3f2f055038655d3ec62983d6bf7f519d4b2d010c89f2809870ab75c3ff_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:d6d1b43384c9532b4d5c0af85df5a6086b986494825216103c02bfe67ddb1f33_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:10cc203162a18a29b59faedf70efbdce132e92f64f915d3265c4fcb44711df9c_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:1beb2ef462b304a691c1bfd855bc6f70d26895a290de7524e0806ea023f92a30_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:8006f2dbeae12667c5a31827ef0f022733a950234cd55a0239334f3003b6e438_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:a716d3e3cc713c7494d0c051d23a872f4d8404f5f2c5226b13c715c901122872_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:19356ed9f617a6fccc1b299c05c07a54d078d1cde15ebe6663e2e11da3b7ac61_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1dad4897c8b22566fd61a83af3ae9f235001d5b8e5cdd40ed6d76bf7f58b508a_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1e20f4f7824339c4685afa6e309f8c143c245d824ae7d781488816fa1d62d17c_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:8fa9769e07dd82241952df0f4dd80e3d9671a9df66f0a4390d009123c6f09179_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:5549"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:3e7802fd4777d02152c225bd23d99d3a67301ef7dcc4d86624dc0852905b89c0_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:658118be2dd7dde63668822f2b10bf2155d1a7264435c31e9da01c4eed429a31_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:6ebecac905954551ee9e1d8ace2282305823528e5d81f430020390e6f0146733_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:9f138971e0419cf08273b296c86770a6a8146e96b19f354df51141794cb2dc50_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:0c292a7860239fcaf9dc3b99ded7fb3bf35bb04e36419731012a407a055ce93a_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:84a60e844b90441a353b605ec9d893426a2cba422c45306090273a738b029242_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:86dc4e5cb44e3e7519fa3fb4c994b2cc9204117a728c458b3994c8c6dfba372d_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:9a0705a74dbf6f6dc4f202696462940aa8c21358c60678d8c06f39e438ee410d_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:6cad955d303121f214c9200fdded75a18c0ebca4d6676fc49fb82c06fc4790fc_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:933f790fe6a2652dde798dcb39e4daeb6ad2a3b371d3b4930ef4f016a70769ed_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:942b6a4d4299e09ba619144ee216cb5eea73dd8aea6117ae4cb92a82c026c76b_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:e7607a6ca262ba1f9403d8a89e8f9771b84cac45e43eaee739789cf0cb8ebd29_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:0a49e3ed4090ee01e433871ef2765d8c74813333f6a641f2edff6fd56ede8d76_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:21230f1cee5974dc459f4b31f829f942cf27d2b7adf081ade185f78b8554822f_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:7aaa6d41e175e70f6a96ee44ba47805987a818858a19517698ec564d2d4c6c61_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:d3092e5ad323b1454a7ee54d54ff0aae0f5cb44603a93a80087768e984c917fc_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:b5a49391fd646c612bff8ee78e55f193f17141a3ef567eefdbaa21e9edaf4ed1_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:846cfa73983011c3f351e0584ace035ad06713f78e625e351922c33c31fc35f6_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:a753821c3238712b53436e7689ed0bf6dde224aa9bbcca70c4018709e7391ff5_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:abc4ca39454ce581794f6e80b272878b1aa81636d84933de5de0035888d9e231_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:ace068e3a65adc34ebba6a38242d4bb65e8cdd05c846daadfaa9e687e666b0bb_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:0a3b22036310909533456be9c03ae6b7b3c5d91b89b245533925cfe81e523d9e_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:d9a636edf9d0ea72339a6cf4af5d343f8ff0723cd466581a80968820405f9a15_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:e1489201089cda6b2b6dfe8b3b74bb4565030586de1ba18888727a5ddba4dea1_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:ea105c68e91862c8d0279240d9d92d1d27b816b49bbf528fb2d30a11343a24d8_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:1cc18f61f97007488f929514f0d96e7ee799cbeb57c8040393510fb5df1308ea_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:391eda856869508163773cf3d8f457bc27bae4619009abab4e1bc95c34013a80_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:b623dd3f2f055038655d3ec62983d6bf7f519d4b2d010c89f2809870ab75c3ff_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:d6d1b43384c9532b4d5c0af85df5a6086b986494825216103c02bfe67ddb1f33_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:10cc203162a18a29b59faedf70efbdce132e92f64f915d3265c4fcb44711df9c_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:1beb2ef462b304a691c1bfd855bc6f70d26895a290de7524e0806ea023f92a30_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:8006f2dbeae12667c5a31827ef0f022733a950234cd55a0239334f3003b6e438_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:a716d3e3cc713c7494d0c051d23a872f4d8404f5f2c5226b13c715c901122872_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:19356ed9f617a6fccc1b299c05c07a54d078d1cde15ebe6663e2e11da3b7ac61_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1dad4897c8b22566fd61a83af3ae9f235001d5b8e5cdd40ed6d76bf7f58b508a_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1e20f4f7824339c4685afa6e309f8c143c245d824ae7d781488816fa1d62d17c_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:8fa9769e07dd82241952df0f4dd80e3d9671a9df66f0a4390d009123c6f09179_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:3e7802fd4777d02152c225bd23d99d3a67301ef7dcc4d86624dc0852905b89c0_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:658118be2dd7dde63668822f2b10bf2155d1a7264435c31e9da01c4eed429a31_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:6ebecac905954551ee9e1d8ace2282305823528e5d81f430020390e6f0146733_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:9f138971e0419cf08273b296c86770a6a8146e96b19f354df51141794cb2dc50_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:0c292a7860239fcaf9dc3b99ded7fb3bf35bb04e36419731012a407a055ce93a_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:84a60e844b90441a353b605ec9d893426a2cba422c45306090273a738b029242_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:86dc4e5cb44e3e7519fa3fb4c994b2cc9204117a728c458b3994c8c6dfba372d_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:9a0705a74dbf6f6dc4f202696462940aa8c21358c60678d8c06f39e438ee410d_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:6cad955d303121f214c9200fdded75a18c0ebca4d6676fc49fb82c06fc4790fc_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:933f790fe6a2652dde798dcb39e4daeb6ad2a3b371d3b4930ef4f016a70769ed_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:942b6a4d4299e09ba619144ee216cb5eea73dd8aea6117ae4cb92a82c026c76b_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:e7607a6ca262ba1f9403d8a89e8f9771b84cac45e43eaee739789cf0cb8ebd29_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:0a49e3ed4090ee01e433871ef2765d8c74813333f6a641f2edff6fd56ede8d76_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:21230f1cee5974dc459f4b31f829f942cf27d2b7adf081ade185f78b8554822f_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:7aaa6d41e175e70f6a96ee44ba47805987a818858a19517698ec564d2d4c6c61_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:d3092e5ad323b1454a7ee54d54ff0aae0f5cb44603a93a80087768e984c917fc_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:b5a49391fd646c612bff8ee78e55f193f17141a3ef567eefdbaa21e9edaf4ed1_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:846cfa73983011c3f351e0584ace035ad06713f78e625e351922c33c31fc35f6_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:a753821c3238712b53436e7689ed0bf6dde224aa9bbcca70c4018709e7391ff5_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:abc4ca39454ce581794f6e80b272878b1aa81636d84933de5de0035888d9e231_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:ace068e3a65adc34ebba6a38242d4bb65e8cdd05c846daadfaa9e687e666b0bb_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:0a3b22036310909533456be9c03ae6b7b3c5d91b89b245533925cfe81e523d9e_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:d9a636edf9d0ea72339a6cf4af5d343f8ff0723cd466581a80968820405f9a15_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:e1489201089cda6b2b6dfe8b3b74bb4565030586de1ba18888727a5ddba4dea1_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:ea105c68e91862c8d0279240d9d92d1d27b816b49bbf528fb2d30a11343a24d8_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:1cc18f61f97007488f929514f0d96e7ee799cbeb57c8040393510fb5df1308ea_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:391eda856869508163773cf3d8f457bc27bae4619009abab4e1bc95c34013a80_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:b623dd3f2f055038655d3ec62983d6bf7f519d4b2d010c89f2809870ab75c3ff_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:d6d1b43384c9532b4d5c0af85df5a6086b986494825216103c02bfe67ddb1f33_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:10cc203162a18a29b59faedf70efbdce132e92f64f915d3265c4fcb44711df9c_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:1beb2ef462b304a691c1bfd855bc6f70d26895a290de7524e0806ea023f92a30_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:8006f2dbeae12667c5a31827ef0f022733a950234cd55a0239334f3003b6e438_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:a716d3e3cc713c7494d0c051d23a872f4d8404f5f2c5226b13c715c901122872_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:19356ed9f617a6fccc1b299c05c07a54d078d1cde15ebe6663e2e11da3b7ac61_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1dad4897c8b22566fd61a83af3ae9f235001d5b8e5cdd40ed6d76bf7f58b508a_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1e20f4f7824339c4685afa6e309f8c143c245d824ae7d781488816fa1d62d17c_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:8fa9769e07dd82241952df0f4dd80e3d9671a9df66f0a4390d009123c6f09179_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: net/url: Memory exhaustion in query parameter parsing in net/url"
},
{
"cve": "CVE-2025-61728",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:39.965024+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:3e7802fd4777d02152c225bd23d99d3a67301ef7dcc4d86624dc0852905b89c0_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:658118be2dd7dde63668822f2b10bf2155d1a7264435c31e9da01c4eed429a31_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:6ebecac905954551ee9e1d8ace2282305823528e5d81f430020390e6f0146733_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:9f138971e0419cf08273b296c86770a6a8146e96b19f354df51141794cb2dc50_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:0c292a7860239fcaf9dc3b99ded7fb3bf35bb04e36419731012a407a055ce93a_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:84a60e844b90441a353b605ec9d893426a2cba422c45306090273a738b029242_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:86dc4e5cb44e3e7519fa3fb4c994b2cc9204117a728c458b3994c8c6dfba372d_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:9a0705a74dbf6f6dc4f202696462940aa8c21358c60678d8c06f39e438ee410d_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:6cad955d303121f214c9200fdded75a18c0ebca4d6676fc49fb82c06fc4790fc_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:933f790fe6a2652dde798dcb39e4daeb6ad2a3b371d3b4930ef4f016a70769ed_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:942b6a4d4299e09ba619144ee216cb5eea73dd8aea6117ae4cb92a82c026c76b_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:e7607a6ca262ba1f9403d8a89e8f9771b84cac45e43eaee739789cf0cb8ebd29_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:0a49e3ed4090ee01e433871ef2765d8c74813333f6a641f2edff6fd56ede8d76_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:21230f1cee5974dc459f4b31f829f942cf27d2b7adf081ade185f78b8554822f_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:7aaa6d41e175e70f6a96ee44ba47805987a818858a19517698ec564d2d4c6c61_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:d3092e5ad323b1454a7ee54d54ff0aae0f5cb44603a93a80087768e984c917fc_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:b5a49391fd646c612bff8ee78e55f193f17141a3ef567eefdbaa21e9edaf4ed1_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:846cfa73983011c3f351e0584ace035ad06713f78e625e351922c33c31fc35f6_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:a753821c3238712b53436e7689ed0bf6dde224aa9bbcca70c4018709e7391ff5_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:abc4ca39454ce581794f6e80b272878b1aa81636d84933de5de0035888d9e231_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:ace068e3a65adc34ebba6a38242d4bb65e8cdd05c846daadfaa9e687e666b0bb_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:10cc203162a18a29b59faedf70efbdce132e92f64f915d3265c4fcb44711df9c_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:1beb2ef462b304a691c1bfd855bc6f70d26895a290de7524e0806ea023f92a30_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:8006f2dbeae12667c5a31827ef0f022733a950234cd55a0239334f3003b6e438_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:a716d3e3cc713c7494d0c051d23a872f4d8404f5f2c5226b13c715c901122872_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:19356ed9f617a6fccc1b299c05c07a54d078d1cde15ebe6663e2e11da3b7ac61_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1dad4897c8b22566fd61a83af3ae9f235001d5b8e5cdd40ed6d76bf7f58b508a_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1e20f4f7824339c4685afa6e309f8c143c245d824ae7d781488816fa1d62d17c_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:8fa9769e07dd82241952df0f4dd80e3d9671a9df66f0a4390d009123c6f09179_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434431"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the archive/zip package in the Go standard library. A super-linear file name indexing algorithm is used in the first time a file in an archive is opened. A crafted zip archive containing a specific arrangement of file names can cause an excessive CPU and memory consumption. A Go application processing a malicious archive can become unresponsive or crash, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to be able to process a malicious zip archive with an application using the archive/zip package. Additionally, this vulnerability can cause a Go application to consume an excessive amount of CPU and memory, eventually resulting in a denial of service with no other security impact. Due to these reasons, this flaw has been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:0a3b22036310909533456be9c03ae6b7b3c5d91b89b245533925cfe81e523d9e_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:d9a636edf9d0ea72339a6cf4af5d343f8ff0723cd466581a80968820405f9a15_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:e1489201089cda6b2b6dfe8b3b74bb4565030586de1ba18888727a5ddba4dea1_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:ea105c68e91862c8d0279240d9d92d1d27b816b49bbf528fb2d30a11343a24d8_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:1cc18f61f97007488f929514f0d96e7ee799cbeb57c8040393510fb5df1308ea_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:391eda856869508163773cf3d8f457bc27bae4619009abab4e1bc95c34013a80_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:b623dd3f2f055038655d3ec62983d6bf7f519d4b2d010c89f2809870ab75c3ff_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:d6d1b43384c9532b4d5c0af85df5a6086b986494825216103c02bfe67ddb1f33_ppc64le"
],
"known_not_affected": [
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:3e7802fd4777d02152c225bd23d99d3a67301ef7dcc4d86624dc0852905b89c0_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:658118be2dd7dde63668822f2b10bf2155d1a7264435c31e9da01c4eed429a31_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:6ebecac905954551ee9e1d8ace2282305823528e5d81f430020390e6f0146733_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:9f138971e0419cf08273b296c86770a6a8146e96b19f354df51141794cb2dc50_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:0c292a7860239fcaf9dc3b99ded7fb3bf35bb04e36419731012a407a055ce93a_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:84a60e844b90441a353b605ec9d893426a2cba422c45306090273a738b029242_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:86dc4e5cb44e3e7519fa3fb4c994b2cc9204117a728c458b3994c8c6dfba372d_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:9a0705a74dbf6f6dc4f202696462940aa8c21358c60678d8c06f39e438ee410d_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:6cad955d303121f214c9200fdded75a18c0ebca4d6676fc49fb82c06fc4790fc_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:933f790fe6a2652dde798dcb39e4daeb6ad2a3b371d3b4930ef4f016a70769ed_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:942b6a4d4299e09ba619144ee216cb5eea73dd8aea6117ae4cb92a82c026c76b_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:e7607a6ca262ba1f9403d8a89e8f9771b84cac45e43eaee739789cf0cb8ebd29_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:0a49e3ed4090ee01e433871ef2765d8c74813333f6a641f2edff6fd56ede8d76_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:21230f1cee5974dc459f4b31f829f942cf27d2b7adf081ade185f78b8554822f_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:7aaa6d41e175e70f6a96ee44ba47805987a818858a19517698ec564d2d4c6c61_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:d3092e5ad323b1454a7ee54d54ff0aae0f5cb44603a93a80087768e984c917fc_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:b5a49391fd646c612bff8ee78e55f193f17141a3ef567eefdbaa21e9edaf4ed1_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:846cfa73983011c3f351e0584ace035ad06713f78e625e351922c33c31fc35f6_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:a753821c3238712b53436e7689ed0bf6dde224aa9bbcca70c4018709e7391ff5_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:abc4ca39454ce581794f6e80b272878b1aa81636d84933de5de0035888d9e231_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:ace068e3a65adc34ebba6a38242d4bb65e8cdd05c846daadfaa9e687e666b0bb_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:10cc203162a18a29b59faedf70efbdce132e92f64f915d3265c4fcb44711df9c_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:1beb2ef462b304a691c1bfd855bc6f70d26895a290de7524e0806ea023f92a30_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:8006f2dbeae12667c5a31827ef0f022733a950234cd55a0239334f3003b6e438_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:a716d3e3cc713c7494d0c051d23a872f4d8404f5f2c5226b13c715c901122872_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:19356ed9f617a6fccc1b299c05c07a54d078d1cde15ebe6663e2e11da3b7ac61_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1dad4897c8b22566fd61a83af3ae9f235001d5b8e5cdd40ed6d76bf7f58b508a_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1e20f4f7824339c4685afa6e309f8c143c245d824ae7d781488816fa1d62d17c_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:8fa9769e07dd82241952df0f4dd80e3d9671a9df66f0a4390d009123c6f09179_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61728"
},
{
"category": "external",
"summary": "RHBZ#2434431",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434431"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61728"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728"
},
{
"category": "external",
"summary": "https://go.dev/cl/736713",
"url": "https://go.dev/cl/736713"
},
{
"category": "external",
"summary": "https://go.dev/issue/77102",
"url": "https://go.dev/issue/77102"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4342",
"url": "https://pkg.go.dev/vuln/GO-2026-4342"
}
],
"release_date": "2026-01-28T19:30:31.354000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-24T07:31:25+00:00",
"details": "It is recommended that existing users of Red Hat OpenShift Builds 1.6.3 upgrades to to 1.6.4",
"product_ids": [
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:0a3b22036310909533456be9c03ae6b7b3c5d91b89b245533925cfe81e523d9e_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:d9a636edf9d0ea72339a6cf4af5d343f8ff0723cd466581a80968820405f9a15_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:e1489201089cda6b2b6dfe8b3b74bb4565030586de1ba18888727a5ddba4dea1_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:ea105c68e91862c8d0279240d9d92d1d27b816b49bbf528fb2d30a11343a24d8_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:1cc18f61f97007488f929514f0d96e7ee799cbeb57c8040393510fb5df1308ea_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:391eda856869508163773cf3d8f457bc27bae4619009abab4e1bc95c34013a80_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:b623dd3f2f055038655d3ec62983d6bf7f519d4b2d010c89f2809870ab75c3ff_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:d6d1b43384c9532b4d5c0af85df5a6086b986494825216103c02bfe67ddb1f33_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:5549"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, implement a timeout in your archive/zip processing logic to abort the operation if it exceeds a few seconds, preventing the application from consuming an excessive amount of resources.",
"product_ids": [
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:3e7802fd4777d02152c225bd23d99d3a67301ef7dcc4d86624dc0852905b89c0_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:658118be2dd7dde63668822f2b10bf2155d1a7264435c31e9da01c4eed429a31_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:6ebecac905954551ee9e1d8ace2282305823528e5d81f430020390e6f0146733_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:9f138971e0419cf08273b296c86770a6a8146e96b19f354df51141794cb2dc50_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:0c292a7860239fcaf9dc3b99ded7fb3bf35bb04e36419731012a407a055ce93a_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:84a60e844b90441a353b605ec9d893426a2cba422c45306090273a738b029242_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:86dc4e5cb44e3e7519fa3fb4c994b2cc9204117a728c458b3994c8c6dfba372d_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:9a0705a74dbf6f6dc4f202696462940aa8c21358c60678d8c06f39e438ee410d_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:6cad955d303121f214c9200fdded75a18c0ebca4d6676fc49fb82c06fc4790fc_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:933f790fe6a2652dde798dcb39e4daeb6ad2a3b371d3b4930ef4f016a70769ed_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:942b6a4d4299e09ba619144ee216cb5eea73dd8aea6117ae4cb92a82c026c76b_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:e7607a6ca262ba1f9403d8a89e8f9771b84cac45e43eaee739789cf0cb8ebd29_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:0a49e3ed4090ee01e433871ef2765d8c74813333f6a641f2edff6fd56ede8d76_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:21230f1cee5974dc459f4b31f829f942cf27d2b7adf081ade185f78b8554822f_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:7aaa6d41e175e70f6a96ee44ba47805987a818858a19517698ec564d2d4c6c61_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:d3092e5ad323b1454a7ee54d54ff0aae0f5cb44603a93a80087768e984c917fc_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:b5a49391fd646c612bff8ee78e55f193f17141a3ef567eefdbaa21e9edaf4ed1_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:846cfa73983011c3f351e0584ace035ad06713f78e625e351922c33c31fc35f6_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:a753821c3238712b53436e7689ed0bf6dde224aa9bbcca70c4018709e7391ff5_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:abc4ca39454ce581794f6e80b272878b1aa81636d84933de5de0035888d9e231_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:ace068e3a65adc34ebba6a38242d4bb65e8cdd05c846daadfaa9e687e666b0bb_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:0a3b22036310909533456be9c03ae6b7b3c5d91b89b245533925cfe81e523d9e_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:d9a636edf9d0ea72339a6cf4af5d343f8ff0723cd466581a80968820405f9a15_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:e1489201089cda6b2b6dfe8b3b74bb4565030586de1ba18888727a5ddba4dea1_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:ea105c68e91862c8d0279240d9d92d1d27b816b49bbf528fb2d30a11343a24d8_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:1cc18f61f97007488f929514f0d96e7ee799cbeb57c8040393510fb5df1308ea_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:391eda856869508163773cf3d8f457bc27bae4619009abab4e1bc95c34013a80_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:b623dd3f2f055038655d3ec62983d6bf7f519d4b2d010c89f2809870ab75c3ff_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:d6d1b43384c9532b4d5c0af85df5a6086b986494825216103c02bfe67ddb1f33_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:10cc203162a18a29b59faedf70efbdce132e92f64f915d3265c4fcb44711df9c_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:1beb2ef462b304a691c1bfd855bc6f70d26895a290de7524e0806ea023f92a30_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:8006f2dbeae12667c5a31827ef0f022733a950234cd55a0239334f3003b6e438_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:a716d3e3cc713c7494d0c051d23a872f4d8404f5f2c5226b13c715c901122872_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:19356ed9f617a6fccc1b299c05c07a54d078d1cde15ebe6663e2e11da3b7ac61_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1dad4897c8b22566fd61a83af3ae9f235001d5b8e5cdd40ed6d76bf7f58b508a_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1e20f4f7824339c4685afa6e309f8c143c245d824ae7d781488816fa1d62d17c_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:8fa9769e07dd82241952df0f4dd80e3d9671a9df66f0a4390d009123c6f09179_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:3e7802fd4777d02152c225bd23d99d3a67301ef7dcc4d86624dc0852905b89c0_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:658118be2dd7dde63668822f2b10bf2155d1a7264435c31e9da01c4eed429a31_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:6ebecac905954551ee9e1d8ace2282305823528e5d81f430020390e6f0146733_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:9f138971e0419cf08273b296c86770a6a8146e96b19f354df51141794cb2dc50_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:0c292a7860239fcaf9dc3b99ded7fb3bf35bb04e36419731012a407a055ce93a_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:84a60e844b90441a353b605ec9d893426a2cba422c45306090273a738b029242_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:86dc4e5cb44e3e7519fa3fb4c994b2cc9204117a728c458b3994c8c6dfba372d_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:9a0705a74dbf6f6dc4f202696462940aa8c21358c60678d8c06f39e438ee410d_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:6cad955d303121f214c9200fdded75a18c0ebca4d6676fc49fb82c06fc4790fc_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:933f790fe6a2652dde798dcb39e4daeb6ad2a3b371d3b4930ef4f016a70769ed_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:942b6a4d4299e09ba619144ee216cb5eea73dd8aea6117ae4cb92a82c026c76b_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:e7607a6ca262ba1f9403d8a89e8f9771b84cac45e43eaee739789cf0cb8ebd29_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:0a49e3ed4090ee01e433871ef2765d8c74813333f6a641f2edff6fd56ede8d76_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:21230f1cee5974dc459f4b31f829f942cf27d2b7adf081ade185f78b8554822f_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:7aaa6d41e175e70f6a96ee44ba47805987a818858a19517698ec564d2d4c6c61_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:d3092e5ad323b1454a7ee54d54ff0aae0f5cb44603a93a80087768e984c917fc_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:b5a49391fd646c612bff8ee78e55f193f17141a3ef567eefdbaa21e9edaf4ed1_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:846cfa73983011c3f351e0584ace035ad06713f78e625e351922c33c31fc35f6_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:a753821c3238712b53436e7689ed0bf6dde224aa9bbcca70c4018709e7391ff5_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:abc4ca39454ce581794f6e80b272878b1aa81636d84933de5de0035888d9e231_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:ace068e3a65adc34ebba6a38242d4bb65e8cdd05c846daadfaa9e687e666b0bb_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:0a3b22036310909533456be9c03ae6b7b3c5d91b89b245533925cfe81e523d9e_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:d9a636edf9d0ea72339a6cf4af5d343f8ff0723cd466581a80968820405f9a15_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:e1489201089cda6b2b6dfe8b3b74bb4565030586de1ba18888727a5ddba4dea1_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:ea105c68e91862c8d0279240d9d92d1d27b816b49bbf528fb2d30a11343a24d8_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:1cc18f61f97007488f929514f0d96e7ee799cbeb57c8040393510fb5df1308ea_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:391eda856869508163773cf3d8f457bc27bae4619009abab4e1bc95c34013a80_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:b623dd3f2f055038655d3ec62983d6bf7f519d4b2d010c89f2809870ab75c3ff_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:d6d1b43384c9532b4d5c0af85df5a6086b986494825216103c02bfe67ddb1f33_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:10cc203162a18a29b59faedf70efbdce132e92f64f915d3265c4fcb44711df9c_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:1beb2ef462b304a691c1bfd855bc6f70d26895a290de7524e0806ea023f92a30_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:8006f2dbeae12667c5a31827ef0f022733a950234cd55a0239334f3003b6e438_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:a716d3e3cc713c7494d0c051d23a872f4d8404f5f2c5226b13c715c901122872_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:19356ed9f617a6fccc1b299c05c07a54d078d1cde15ebe6663e2e11da3b7ac61_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1dad4897c8b22566fd61a83af3ae9f235001d5b8e5cdd40ed6d76bf7f58b508a_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1e20f4f7824339c4685afa6e309f8c143c245d824ae7d781488816fa1d62d17c_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:8fa9769e07dd82241952df0f4dd80e3d9671a9df66f0a4390d009123c6f09179_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip"
},
{
"cve": "CVE-2025-66471",
"cwe": {
"id": "CWE-409",
"name": "Improper Handling of Highly Compressed Data (Data Amplification)"
},
"discovery_date": "2025-12-05T17:02:21.597728+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:3e7802fd4777d02152c225bd23d99d3a67301ef7dcc4d86624dc0852905b89c0_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:658118be2dd7dde63668822f2b10bf2155d1a7264435c31e9da01c4eed429a31_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:6ebecac905954551ee9e1d8ace2282305823528e5d81f430020390e6f0146733_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:9f138971e0419cf08273b296c86770a6a8146e96b19f354df51141794cb2dc50_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:0c292a7860239fcaf9dc3b99ded7fb3bf35bb04e36419731012a407a055ce93a_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:84a60e844b90441a353b605ec9d893426a2cba422c45306090273a738b029242_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:86dc4e5cb44e3e7519fa3fb4c994b2cc9204117a728c458b3994c8c6dfba372d_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:9a0705a74dbf6f6dc4f202696462940aa8c21358c60678d8c06f39e438ee410d_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:6cad955d303121f214c9200fdded75a18c0ebca4d6676fc49fb82c06fc4790fc_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:933f790fe6a2652dde798dcb39e4daeb6ad2a3b371d3b4930ef4f016a70769ed_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:942b6a4d4299e09ba619144ee216cb5eea73dd8aea6117ae4cb92a82c026c76b_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:e7607a6ca262ba1f9403d8a89e8f9771b84cac45e43eaee739789cf0cb8ebd29_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:0a49e3ed4090ee01e433871ef2765d8c74813333f6a641f2edff6fd56ede8d76_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:21230f1cee5974dc459f4b31f829f942cf27d2b7adf081ade185f78b8554822f_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:7aaa6d41e175e70f6a96ee44ba47805987a818858a19517698ec564d2d4c6c61_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:d3092e5ad323b1454a7ee54d54ff0aae0f5cb44603a93a80087768e984c917fc_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:b5a49391fd646c612bff8ee78e55f193f17141a3ef567eefdbaa21e9edaf4ed1_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:846cfa73983011c3f351e0584ace035ad06713f78e625e351922c33c31fc35f6_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:a753821c3238712b53436e7689ed0bf6dde224aa9bbcca70c4018709e7391ff5_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:abc4ca39454ce581794f6e80b272878b1aa81636d84933de5de0035888d9e231_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:ace068e3a65adc34ebba6a38242d4bb65e8cdd05c846daadfaa9e687e666b0bb_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:1cc18f61f97007488f929514f0d96e7ee799cbeb57c8040393510fb5df1308ea_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:391eda856869508163773cf3d8f457bc27bae4619009abab4e1bc95c34013a80_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:b623dd3f2f055038655d3ec62983d6bf7f519d4b2d010c89f2809870ab75c3ff_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:d6d1b43384c9532b4d5c0af85df5a6086b986494825216103c02bfe67ddb1f33_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:10cc203162a18a29b59faedf70efbdce132e92f64f915d3265c4fcb44711df9c_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:1beb2ef462b304a691c1bfd855bc6f70d26895a290de7524e0806ea023f92a30_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:8006f2dbeae12667c5a31827ef0f022733a950234cd55a0239334f3003b6e438_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:a716d3e3cc713c7494d0c051d23a872f4d8404f5f2c5226b13c715c901122872_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:19356ed9f617a6fccc1b299c05c07a54d078d1cde15ebe6663e2e11da3b7ac61_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1dad4897c8b22566fd61a83af3ae9f235001d5b8e5cdd40ed6d76bf7f58b508a_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1e20f4f7824339c4685afa6e309f8c143c245d824ae7d781488816fa1d62d17c_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:8fa9769e07dd82241952df0f4dd80e3d9671a9df66f0a4390d009123c6f09179_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2419467"
}
],
"notes": [
{
"category": "description",
"text": "A decompression handling flaw has been discovered in urllib3. When streaming a compressed response, urllib3 can perform decoding or decompression based on the HTTP Content-Encoding header (e.g., gzip, deflate, br, or zstd). The library must read compressed data from the network and decompress it until the requested chunk size is met. Any resulting decompressed data that exceeds the requested amount is held in an internal buffer for the next read operation. The decompression logic could cause urllib3 to fully decode a small amount of highly compressed data in a single operation. This can result in excessive resource consumption (high CPU usage and massive memory allocation for the decompressed data; CWE-409) on the client side, even if the application only requested a small chunk of data.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "urllib3: urllib3 Streaming API improperly handles highly compressed data",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:0a3b22036310909533456be9c03ae6b7b3c5d91b89b245533925cfe81e523d9e_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:d9a636edf9d0ea72339a6cf4af5d343f8ff0723cd466581a80968820405f9a15_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:e1489201089cda6b2b6dfe8b3b74bb4565030586de1ba18888727a5ddba4dea1_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:ea105c68e91862c8d0279240d9d92d1d27b816b49bbf528fb2d30a11343a24d8_arm64"
],
"known_not_affected": [
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:3e7802fd4777d02152c225bd23d99d3a67301ef7dcc4d86624dc0852905b89c0_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:658118be2dd7dde63668822f2b10bf2155d1a7264435c31e9da01c4eed429a31_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:6ebecac905954551ee9e1d8ace2282305823528e5d81f430020390e6f0146733_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:9f138971e0419cf08273b296c86770a6a8146e96b19f354df51141794cb2dc50_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:0c292a7860239fcaf9dc3b99ded7fb3bf35bb04e36419731012a407a055ce93a_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:84a60e844b90441a353b605ec9d893426a2cba422c45306090273a738b029242_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:86dc4e5cb44e3e7519fa3fb4c994b2cc9204117a728c458b3994c8c6dfba372d_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:9a0705a74dbf6f6dc4f202696462940aa8c21358c60678d8c06f39e438ee410d_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:6cad955d303121f214c9200fdded75a18c0ebca4d6676fc49fb82c06fc4790fc_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:933f790fe6a2652dde798dcb39e4daeb6ad2a3b371d3b4930ef4f016a70769ed_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:942b6a4d4299e09ba619144ee216cb5eea73dd8aea6117ae4cb92a82c026c76b_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:e7607a6ca262ba1f9403d8a89e8f9771b84cac45e43eaee739789cf0cb8ebd29_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:0a49e3ed4090ee01e433871ef2765d8c74813333f6a641f2edff6fd56ede8d76_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:21230f1cee5974dc459f4b31f829f942cf27d2b7adf081ade185f78b8554822f_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:7aaa6d41e175e70f6a96ee44ba47805987a818858a19517698ec564d2d4c6c61_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:d3092e5ad323b1454a7ee54d54ff0aae0f5cb44603a93a80087768e984c917fc_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:b5a49391fd646c612bff8ee78e55f193f17141a3ef567eefdbaa21e9edaf4ed1_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:846cfa73983011c3f351e0584ace035ad06713f78e625e351922c33c31fc35f6_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:a753821c3238712b53436e7689ed0bf6dde224aa9bbcca70c4018709e7391ff5_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:abc4ca39454ce581794f6e80b272878b1aa81636d84933de5de0035888d9e231_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:ace068e3a65adc34ebba6a38242d4bb65e8cdd05c846daadfaa9e687e666b0bb_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:1cc18f61f97007488f929514f0d96e7ee799cbeb57c8040393510fb5df1308ea_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:391eda856869508163773cf3d8f457bc27bae4619009abab4e1bc95c34013a80_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:b623dd3f2f055038655d3ec62983d6bf7f519d4b2d010c89f2809870ab75c3ff_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:d6d1b43384c9532b4d5c0af85df5a6086b986494825216103c02bfe67ddb1f33_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:10cc203162a18a29b59faedf70efbdce132e92f64f915d3265c4fcb44711df9c_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:1beb2ef462b304a691c1bfd855bc6f70d26895a290de7524e0806ea023f92a30_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:8006f2dbeae12667c5a31827ef0f022733a950234cd55a0239334f3003b6e438_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:a716d3e3cc713c7494d0c051d23a872f4d8404f5f2c5226b13c715c901122872_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:19356ed9f617a6fccc1b299c05c07a54d078d1cde15ebe6663e2e11da3b7ac61_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1dad4897c8b22566fd61a83af3ae9f235001d5b8e5cdd40ed6d76bf7f58b508a_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1e20f4f7824339c4685afa6e309f8c143c245d824ae7d781488816fa1d62d17c_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:8fa9769e07dd82241952df0f4dd80e3d9671a9df66f0a4390d009123c6f09179_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-66471"
},
{
"category": "external",
"summary": "RHBZ#2419467",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419467"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-66471",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66471"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-66471",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-66471"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/commit/c19571de34c47de3a766541b041637ba5f716ed7",
"url": "https://github.com/urllib3/urllib3/commit/c19571de34c47de3a766541b041637ba5f716ed7"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/security/advisories/GHSA-2xpw-w6gg-jr37",
"url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-2xpw-w6gg-jr37"
}
],
"release_date": "2025-12-05T16:06:08.531000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-24T07:31:25+00:00",
"details": "It is recommended that existing users of Red Hat OpenShift Builds 1.6.3 upgrades to to 1.6.4",
"product_ids": [
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:0a3b22036310909533456be9c03ae6b7b3c5d91b89b245533925cfe81e523d9e_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:d9a636edf9d0ea72339a6cf4af5d343f8ff0723cd466581a80968820405f9a15_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:e1489201089cda6b2b6dfe8b3b74bb4565030586de1ba18888727a5ddba4dea1_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:ea105c68e91862c8d0279240d9d92d1d27b816b49bbf528fb2d30a11343a24d8_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:5549"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:3e7802fd4777d02152c225bd23d99d3a67301ef7dcc4d86624dc0852905b89c0_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:658118be2dd7dde63668822f2b10bf2155d1a7264435c31e9da01c4eed429a31_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:6ebecac905954551ee9e1d8ace2282305823528e5d81f430020390e6f0146733_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:9f138971e0419cf08273b296c86770a6a8146e96b19f354df51141794cb2dc50_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:0c292a7860239fcaf9dc3b99ded7fb3bf35bb04e36419731012a407a055ce93a_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:84a60e844b90441a353b605ec9d893426a2cba422c45306090273a738b029242_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:86dc4e5cb44e3e7519fa3fb4c994b2cc9204117a728c458b3994c8c6dfba372d_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:9a0705a74dbf6f6dc4f202696462940aa8c21358c60678d8c06f39e438ee410d_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:6cad955d303121f214c9200fdded75a18c0ebca4d6676fc49fb82c06fc4790fc_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:933f790fe6a2652dde798dcb39e4daeb6ad2a3b371d3b4930ef4f016a70769ed_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:942b6a4d4299e09ba619144ee216cb5eea73dd8aea6117ae4cb92a82c026c76b_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:e7607a6ca262ba1f9403d8a89e8f9771b84cac45e43eaee739789cf0cb8ebd29_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:0a49e3ed4090ee01e433871ef2765d8c74813333f6a641f2edff6fd56ede8d76_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:21230f1cee5974dc459f4b31f829f942cf27d2b7adf081ade185f78b8554822f_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:7aaa6d41e175e70f6a96ee44ba47805987a818858a19517698ec564d2d4c6c61_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:d3092e5ad323b1454a7ee54d54ff0aae0f5cb44603a93a80087768e984c917fc_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:b5a49391fd646c612bff8ee78e55f193f17141a3ef567eefdbaa21e9edaf4ed1_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:846cfa73983011c3f351e0584ace035ad06713f78e625e351922c33c31fc35f6_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:a753821c3238712b53436e7689ed0bf6dde224aa9bbcca70c4018709e7391ff5_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:abc4ca39454ce581794f6e80b272878b1aa81636d84933de5de0035888d9e231_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:ace068e3a65adc34ebba6a38242d4bb65e8cdd05c846daadfaa9e687e666b0bb_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:0a3b22036310909533456be9c03ae6b7b3c5d91b89b245533925cfe81e523d9e_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:d9a636edf9d0ea72339a6cf4af5d343f8ff0723cd466581a80968820405f9a15_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:e1489201089cda6b2b6dfe8b3b74bb4565030586de1ba18888727a5ddba4dea1_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:ea105c68e91862c8d0279240d9d92d1d27b816b49bbf528fb2d30a11343a24d8_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:1cc18f61f97007488f929514f0d96e7ee799cbeb57c8040393510fb5df1308ea_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:391eda856869508163773cf3d8f457bc27bae4619009abab4e1bc95c34013a80_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:b623dd3f2f055038655d3ec62983d6bf7f519d4b2d010c89f2809870ab75c3ff_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:d6d1b43384c9532b4d5c0af85df5a6086b986494825216103c02bfe67ddb1f33_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:10cc203162a18a29b59faedf70efbdce132e92f64f915d3265c4fcb44711df9c_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:1beb2ef462b304a691c1bfd855bc6f70d26895a290de7524e0806ea023f92a30_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:8006f2dbeae12667c5a31827ef0f022733a950234cd55a0239334f3003b6e438_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:a716d3e3cc713c7494d0c051d23a872f4d8404f5f2c5226b13c715c901122872_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:19356ed9f617a6fccc1b299c05c07a54d078d1cde15ebe6663e2e11da3b7ac61_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1dad4897c8b22566fd61a83af3ae9f235001d5b8e5cdd40ed6d76bf7f58b508a_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1e20f4f7824339c4685afa6e309f8c143c245d824ae7d781488816fa1d62d17c_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:8fa9769e07dd82241952df0f4dd80e3d9671a9df66f0a4390d009123c6f09179_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:3e7802fd4777d02152c225bd23d99d3a67301ef7dcc4d86624dc0852905b89c0_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:658118be2dd7dde63668822f2b10bf2155d1a7264435c31e9da01c4eed429a31_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:6ebecac905954551ee9e1d8ace2282305823528e5d81f430020390e6f0146733_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:9f138971e0419cf08273b296c86770a6a8146e96b19f354df51141794cb2dc50_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:0c292a7860239fcaf9dc3b99ded7fb3bf35bb04e36419731012a407a055ce93a_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:84a60e844b90441a353b605ec9d893426a2cba422c45306090273a738b029242_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:86dc4e5cb44e3e7519fa3fb4c994b2cc9204117a728c458b3994c8c6dfba372d_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:9a0705a74dbf6f6dc4f202696462940aa8c21358c60678d8c06f39e438ee410d_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:6cad955d303121f214c9200fdded75a18c0ebca4d6676fc49fb82c06fc4790fc_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:933f790fe6a2652dde798dcb39e4daeb6ad2a3b371d3b4930ef4f016a70769ed_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:942b6a4d4299e09ba619144ee216cb5eea73dd8aea6117ae4cb92a82c026c76b_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:e7607a6ca262ba1f9403d8a89e8f9771b84cac45e43eaee739789cf0cb8ebd29_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:0a49e3ed4090ee01e433871ef2765d8c74813333f6a641f2edff6fd56ede8d76_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:21230f1cee5974dc459f4b31f829f942cf27d2b7adf081ade185f78b8554822f_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:7aaa6d41e175e70f6a96ee44ba47805987a818858a19517698ec564d2d4c6c61_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:d3092e5ad323b1454a7ee54d54ff0aae0f5cb44603a93a80087768e984c917fc_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:b5a49391fd646c612bff8ee78e55f193f17141a3ef567eefdbaa21e9edaf4ed1_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:846cfa73983011c3f351e0584ace035ad06713f78e625e351922c33c31fc35f6_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:a753821c3238712b53436e7689ed0bf6dde224aa9bbcca70c4018709e7391ff5_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:abc4ca39454ce581794f6e80b272878b1aa81636d84933de5de0035888d9e231_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:ace068e3a65adc34ebba6a38242d4bb65e8cdd05c846daadfaa9e687e666b0bb_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:0a3b22036310909533456be9c03ae6b7b3c5d91b89b245533925cfe81e523d9e_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:d9a636edf9d0ea72339a6cf4af5d343f8ff0723cd466581a80968820405f9a15_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:e1489201089cda6b2b6dfe8b3b74bb4565030586de1ba18888727a5ddba4dea1_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:ea105c68e91862c8d0279240d9d92d1d27b816b49bbf528fb2d30a11343a24d8_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:1cc18f61f97007488f929514f0d96e7ee799cbeb57c8040393510fb5df1308ea_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:391eda856869508163773cf3d8f457bc27bae4619009abab4e1bc95c34013a80_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:b623dd3f2f055038655d3ec62983d6bf7f519d4b2d010c89f2809870ab75c3ff_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:d6d1b43384c9532b4d5c0af85df5a6086b986494825216103c02bfe67ddb1f33_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:10cc203162a18a29b59faedf70efbdce132e92f64f915d3265c4fcb44711df9c_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:1beb2ef462b304a691c1bfd855bc6f70d26895a290de7524e0806ea023f92a30_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:8006f2dbeae12667c5a31827ef0f022733a950234cd55a0239334f3003b6e438_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:a716d3e3cc713c7494d0c051d23a872f4d8404f5f2c5226b13c715c901122872_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:19356ed9f617a6fccc1b299c05c07a54d078d1cde15ebe6663e2e11da3b7ac61_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1dad4897c8b22566fd61a83af3ae9f235001d5b8e5cdd40ed6d76bf7f58b508a_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1e20f4f7824339c4685afa6e309f8c143c245d824ae7d781488816fa1d62d17c_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:8fa9769e07dd82241952df0f4dd80e3d9671a9df66f0a4390d009123c6f09179_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "urllib3: urllib3 Streaming API improperly handles highly compressed data"
},
{
"cve": "CVE-2025-68121",
"discovery_date": "2026-02-05T18:01:30.086058+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:3e7802fd4777d02152c225bd23d99d3a67301ef7dcc4d86624dc0852905b89c0_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:658118be2dd7dde63668822f2b10bf2155d1a7264435c31e9da01c4eed429a31_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:6ebecac905954551ee9e1d8ace2282305823528e5d81f430020390e6f0146733_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:9f138971e0419cf08273b296c86770a6a8146e96b19f354df51141794cb2dc50_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:0c292a7860239fcaf9dc3b99ded7fb3bf35bb04e36419731012a407a055ce93a_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:84a60e844b90441a353b605ec9d893426a2cba422c45306090273a738b029242_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:86dc4e5cb44e3e7519fa3fb4c994b2cc9204117a728c458b3994c8c6dfba372d_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:9a0705a74dbf6f6dc4f202696462940aa8c21358c60678d8c06f39e438ee410d_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:6cad955d303121f214c9200fdded75a18c0ebca4d6676fc49fb82c06fc4790fc_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:933f790fe6a2652dde798dcb39e4daeb6ad2a3b371d3b4930ef4f016a70769ed_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:942b6a4d4299e09ba619144ee216cb5eea73dd8aea6117ae4cb92a82c026c76b_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:e7607a6ca262ba1f9403d8a89e8f9771b84cac45e43eaee739789cf0cb8ebd29_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:0a49e3ed4090ee01e433871ef2765d8c74813333f6a641f2edff6fd56ede8d76_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:21230f1cee5974dc459f4b31f829f942cf27d2b7adf081ade185f78b8554822f_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:7aaa6d41e175e70f6a96ee44ba47805987a818858a19517698ec564d2d4c6c61_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:d3092e5ad323b1454a7ee54d54ff0aae0f5cb44603a93a80087768e984c917fc_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:b5a49391fd646c612bff8ee78e55f193f17141a3ef567eefdbaa21e9edaf4ed1_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:846cfa73983011c3f351e0584ace035ad06713f78e625e351922c33c31fc35f6_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:a753821c3238712b53436e7689ed0bf6dde224aa9bbcca70c4018709e7391ff5_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:abc4ca39454ce581794f6e80b272878b1aa81636d84933de5de0035888d9e231_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:ace068e3a65adc34ebba6a38242d4bb65e8cdd05c846daadfaa9e687e666b0bb_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:0a3b22036310909533456be9c03ae6b7b3c5d91b89b245533925cfe81e523d9e_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:d9a636edf9d0ea72339a6cf4af5d343f8ff0723cd466581a80968820405f9a15_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:e1489201089cda6b2b6dfe8b3b74bb4565030586de1ba18888727a5ddba4dea1_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:ea105c68e91862c8d0279240d9d92d1d27b816b49bbf528fb2d30a11343a24d8_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:1cc18f61f97007488f929514f0d96e7ee799cbeb57c8040393510fb5df1308ea_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:391eda856869508163773cf3d8f457bc27bae4619009abab4e1bc95c34013a80_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:b623dd3f2f055038655d3ec62983d6bf7f519d4b2d010c89f2809870ab75c3ff_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:d6d1b43384c9532b4d5c0af85df5a6086b986494825216103c02bfe67ddb1f33_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:19356ed9f617a6fccc1b299c05c07a54d078d1cde15ebe6663e2e11da3b7ac61_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1dad4897c8b22566fd61a83af3ae9f235001d5b8e5cdd40ed6d76bf7f58b508a_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1e20f4f7824339c4685afa6e309f8c143c245d824ae7d781488816fa1d62d17c_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:8fa9769e07dd82241952df0f4dd80e3d9671a9df66f0a4390d009123c6f09179_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2437111"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the crypto/tls component. This vulnerability occurs during Transport Layer Security (TLS) session resumption when certificate authority (CA) settings are modified between the initial and resumed handshakes. An attacker could exploit this to bypass certificate validation, allowing a client or server to establish a connection that should have been rejected. This could lead to an authentication bypass under specific conditions.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/tls: crypto/tls: Incorrect certificate validation during TLS session resumption",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This is a moderate flaw because it only occurs under specific conditions, such as TLS session resumption with runtime changes to certificate authority settings. Exploitation is not straightforward and requires a controlled setup. The impact is limited to certificate validation within the same component and does not affect system availability.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:10cc203162a18a29b59faedf70efbdce132e92f64f915d3265c4fcb44711df9c_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:1beb2ef462b304a691c1bfd855bc6f70d26895a290de7524e0806ea023f92a30_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:8006f2dbeae12667c5a31827ef0f022733a950234cd55a0239334f3003b6e438_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:a716d3e3cc713c7494d0c051d23a872f4d8404f5f2c5226b13c715c901122872_amd64"
],
"known_not_affected": [
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:3e7802fd4777d02152c225bd23d99d3a67301ef7dcc4d86624dc0852905b89c0_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:658118be2dd7dde63668822f2b10bf2155d1a7264435c31e9da01c4eed429a31_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:6ebecac905954551ee9e1d8ace2282305823528e5d81f430020390e6f0146733_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:9f138971e0419cf08273b296c86770a6a8146e96b19f354df51141794cb2dc50_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:0c292a7860239fcaf9dc3b99ded7fb3bf35bb04e36419731012a407a055ce93a_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:84a60e844b90441a353b605ec9d893426a2cba422c45306090273a738b029242_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:86dc4e5cb44e3e7519fa3fb4c994b2cc9204117a728c458b3994c8c6dfba372d_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:9a0705a74dbf6f6dc4f202696462940aa8c21358c60678d8c06f39e438ee410d_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:6cad955d303121f214c9200fdded75a18c0ebca4d6676fc49fb82c06fc4790fc_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:933f790fe6a2652dde798dcb39e4daeb6ad2a3b371d3b4930ef4f016a70769ed_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:942b6a4d4299e09ba619144ee216cb5eea73dd8aea6117ae4cb92a82c026c76b_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:e7607a6ca262ba1f9403d8a89e8f9771b84cac45e43eaee739789cf0cb8ebd29_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:0a49e3ed4090ee01e433871ef2765d8c74813333f6a641f2edff6fd56ede8d76_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:21230f1cee5974dc459f4b31f829f942cf27d2b7adf081ade185f78b8554822f_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:7aaa6d41e175e70f6a96ee44ba47805987a818858a19517698ec564d2d4c6c61_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:d3092e5ad323b1454a7ee54d54ff0aae0f5cb44603a93a80087768e984c917fc_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:b5a49391fd646c612bff8ee78e55f193f17141a3ef567eefdbaa21e9edaf4ed1_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:846cfa73983011c3f351e0584ace035ad06713f78e625e351922c33c31fc35f6_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:a753821c3238712b53436e7689ed0bf6dde224aa9bbcca70c4018709e7391ff5_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:abc4ca39454ce581794f6e80b272878b1aa81636d84933de5de0035888d9e231_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:ace068e3a65adc34ebba6a38242d4bb65e8cdd05c846daadfaa9e687e666b0bb_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:0a3b22036310909533456be9c03ae6b7b3c5d91b89b245533925cfe81e523d9e_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:d9a636edf9d0ea72339a6cf4af5d343f8ff0723cd466581a80968820405f9a15_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:e1489201089cda6b2b6dfe8b3b74bb4565030586de1ba18888727a5ddba4dea1_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:ea105c68e91862c8d0279240d9d92d1d27b816b49bbf528fb2d30a11343a24d8_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:1cc18f61f97007488f929514f0d96e7ee799cbeb57c8040393510fb5df1308ea_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:391eda856869508163773cf3d8f457bc27bae4619009abab4e1bc95c34013a80_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:b623dd3f2f055038655d3ec62983d6bf7f519d4b2d010c89f2809870ab75c3ff_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:d6d1b43384c9532b4d5c0af85df5a6086b986494825216103c02bfe67ddb1f33_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:19356ed9f617a6fccc1b299c05c07a54d078d1cde15ebe6663e2e11da3b7ac61_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1dad4897c8b22566fd61a83af3ae9f235001d5b8e5cdd40ed6d76bf7f58b508a_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1e20f4f7824339c4685afa6e309f8c143c245d824ae7d781488816fa1d62d17c_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:8fa9769e07dd82241952df0f4dd80e3d9671a9df66f0a4390d009123c6f09179_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "RHBZ#2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"category": "external",
"summary": "https://go.dev/cl/737700",
"url": "https://go.dev/cl/737700"
},
{
"category": "external",
"summary": "https://go.dev/issue/77217",
"url": "https://go.dev/issue/77217"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk",
"url": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4337",
"url": "https://pkg.go.dev/vuln/GO-2026-4337"
}
],
"release_date": "2026-02-05T17:48:44.141000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-24T07:31:25+00:00",
"details": "It is recommended that existing users of Red Hat OpenShift Builds 1.6.3 upgrades to to 1.6.4",
"product_ids": [
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:10cc203162a18a29b59faedf70efbdce132e92f64f915d3265c4fcb44711df9c_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:1beb2ef462b304a691c1bfd855bc6f70d26895a290de7524e0806ea023f92a30_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:8006f2dbeae12667c5a31827ef0f022733a950234cd55a0239334f3003b6e438_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:a716d3e3cc713c7494d0c051d23a872f4d8404f5f2c5226b13c715c901122872_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:5549"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:3e7802fd4777d02152c225bd23d99d3a67301ef7dcc4d86624dc0852905b89c0_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:658118be2dd7dde63668822f2b10bf2155d1a7264435c31e9da01c4eed429a31_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:6ebecac905954551ee9e1d8ace2282305823528e5d81f430020390e6f0146733_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:9f138971e0419cf08273b296c86770a6a8146e96b19f354df51141794cb2dc50_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:0c292a7860239fcaf9dc3b99ded7fb3bf35bb04e36419731012a407a055ce93a_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:84a60e844b90441a353b605ec9d893426a2cba422c45306090273a738b029242_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:86dc4e5cb44e3e7519fa3fb4c994b2cc9204117a728c458b3994c8c6dfba372d_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:9a0705a74dbf6f6dc4f202696462940aa8c21358c60678d8c06f39e438ee410d_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:6cad955d303121f214c9200fdded75a18c0ebca4d6676fc49fb82c06fc4790fc_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:933f790fe6a2652dde798dcb39e4daeb6ad2a3b371d3b4930ef4f016a70769ed_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:942b6a4d4299e09ba619144ee216cb5eea73dd8aea6117ae4cb92a82c026c76b_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:e7607a6ca262ba1f9403d8a89e8f9771b84cac45e43eaee739789cf0cb8ebd29_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:0a49e3ed4090ee01e433871ef2765d8c74813333f6a641f2edff6fd56ede8d76_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:21230f1cee5974dc459f4b31f829f942cf27d2b7adf081ade185f78b8554822f_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:7aaa6d41e175e70f6a96ee44ba47805987a818858a19517698ec564d2d4c6c61_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:d3092e5ad323b1454a7ee54d54ff0aae0f5cb44603a93a80087768e984c917fc_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:b5a49391fd646c612bff8ee78e55f193f17141a3ef567eefdbaa21e9edaf4ed1_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:846cfa73983011c3f351e0584ace035ad06713f78e625e351922c33c31fc35f6_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:a753821c3238712b53436e7689ed0bf6dde224aa9bbcca70c4018709e7391ff5_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:abc4ca39454ce581794f6e80b272878b1aa81636d84933de5de0035888d9e231_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:ace068e3a65adc34ebba6a38242d4bb65e8cdd05c846daadfaa9e687e666b0bb_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:0a3b22036310909533456be9c03ae6b7b3c5d91b89b245533925cfe81e523d9e_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:d9a636edf9d0ea72339a6cf4af5d343f8ff0723cd466581a80968820405f9a15_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:e1489201089cda6b2b6dfe8b3b74bb4565030586de1ba18888727a5ddba4dea1_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:ea105c68e91862c8d0279240d9d92d1d27b816b49bbf528fb2d30a11343a24d8_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:1cc18f61f97007488f929514f0d96e7ee799cbeb57c8040393510fb5df1308ea_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:391eda856869508163773cf3d8f457bc27bae4619009abab4e1bc95c34013a80_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:b623dd3f2f055038655d3ec62983d6bf7f519d4b2d010c89f2809870ab75c3ff_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:d6d1b43384c9532b4d5c0af85df5a6086b986494825216103c02bfe67ddb1f33_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:10cc203162a18a29b59faedf70efbdce132e92f64f915d3265c4fcb44711df9c_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:1beb2ef462b304a691c1bfd855bc6f70d26895a290de7524e0806ea023f92a30_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:8006f2dbeae12667c5a31827ef0f022733a950234cd55a0239334f3003b6e438_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:a716d3e3cc713c7494d0c051d23a872f4d8404f5f2c5226b13c715c901122872_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:19356ed9f617a6fccc1b299c05c07a54d078d1cde15ebe6663e2e11da3b7ac61_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1dad4897c8b22566fd61a83af3ae9f235001d5b8e5cdd40ed6d76bf7f58b508a_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1e20f4f7824339c4685afa6e309f8c143c245d824ae7d781488816fa1d62d17c_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:8fa9769e07dd82241952df0f4dd80e3d9671a9df66f0a4390d009123c6f09179_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "crypto/tls: crypto/tls: Incorrect certificate validation during TLS session resumption"
},
{
"cve": "CVE-2026-25679",
"cwe": {
"id": "CWE-1286",
"name": "Improper Validation of Syntactic Correctness of Input"
},
"discovery_date": "2026-03-06T22:02:11.567841+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:3e7802fd4777d02152c225bd23d99d3a67301ef7dcc4d86624dc0852905b89c0_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:658118be2dd7dde63668822f2b10bf2155d1a7264435c31e9da01c4eed429a31_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:6ebecac905954551ee9e1d8ace2282305823528e5d81f430020390e6f0146733_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:9f138971e0419cf08273b296c86770a6a8146e96b19f354df51141794cb2dc50_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:0c292a7860239fcaf9dc3b99ded7fb3bf35bb04e36419731012a407a055ce93a_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:84a60e844b90441a353b605ec9d893426a2cba422c45306090273a738b029242_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:86dc4e5cb44e3e7519fa3fb4c994b2cc9204117a728c458b3994c8c6dfba372d_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:9a0705a74dbf6f6dc4f202696462940aa8c21358c60678d8c06f39e438ee410d_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:6cad955d303121f214c9200fdded75a18c0ebca4d6676fc49fb82c06fc4790fc_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:933f790fe6a2652dde798dcb39e4daeb6ad2a3b371d3b4930ef4f016a70769ed_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:942b6a4d4299e09ba619144ee216cb5eea73dd8aea6117ae4cb92a82c026c76b_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:e7607a6ca262ba1f9403d8a89e8f9771b84cac45e43eaee739789cf0cb8ebd29_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:0a49e3ed4090ee01e433871ef2765d8c74813333f6a641f2edff6fd56ede8d76_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:21230f1cee5974dc459f4b31f829f942cf27d2b7adf081ade185f78b8554822f_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:7aaa6d41e175e70f6a96ee44ba47805987a818858a19517698ec564d2d4c6c61_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:d3092e5ad323b1454a7ee54d54ff0aae0f5cb44603a93a80087768e984c917fc_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:b5a49391fd646c612bff8ee78e55f193f17141a3ef567eefdbaa21e9edaf4ed1_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:846cfa73983011c3f351e0584ace035ad06713f78e625e351922c33c31fc35f6_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:a753821c3238712b53436e7689ed0bf6dde224aa9bbcca70c4018709e7391ff5_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:abc4ca39454ce581794f6e80b272878b1aa81636d84933de5de0035888d9e231_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:ace068e3a65adc34ebba6a38242d4bb65e8cdd05c846daadfaa9e687e666b0bb_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:0a3b22036310909533456be9c03ae6b7b3c5d91b89b245533925cfe81e523d9e_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:d9a636edf9d0ea72339a6cf4af5d343f8ff0723cd466581a80968820405f9a15_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:e1489201089cda6b2b6dfe8b3b74bb4565030586de1ba18888727a5ddba4dea1_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:ea105c68e91862c8d0279240d9d92d1d27b816b49bbf528fb2d30a11343a24d8_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:1cc18f61f97007488f929514f0d96e7ee799cbeb57c8040393510fb5df1308ea_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:391eda856869508163773cf3d8f457bc27bae4619009abab4e1bc95c34013a80_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:b623dd3f2f055038655d3ec62983d6bf7f519d4b2d010c89f2809870ab75c3ff_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:d6d1b43384c9532b4d5c0af85df5a6086b986494825216103c02bfe67ddb1f33_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:19356ed9f617a6fccc1b299c05c07a54d078d1cde15ebe6663e2e11da3b7ac61_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1dad4897c8b22566fd61a83af3ae9f235001d5b8e5cdd40ed6d76bf7f58b508a_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1e20f4f7824339c4685afa6e309f8c143c245d824ae7d781488816fa1d62d17c_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:8fa9769e07dd82241952df0f4dd80e3d9671a9df66f0a4390d009123c6f09179_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2445356"
}
],
"notes": [
{
"category": "description",
"text": "The Go standard library function net/url.Parse insufficiently validated the host/authority component and accepted some invalid URLs by effectively treating garbage before an IP-literal as ignorable. The function should have rejected this as invalid.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "net/url: Incorrect parsing of IPv6 host literals in net/url",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:10cc203162a18a29b59faedf70efbdce132e92f64f915d3265c4fcb44711df9c_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:1beb2ef462b304a691c1bfd855bc6f70d26895a290de7524e0806ea023f92a30_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:8006f2dbeae12667c5a31827ef0f022733a950234cd55a0239334f3003b6e438_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:a716d3e3cc713c7494d0c051d23a872f4d8404f5f2c5226b13c715c901122872_amd64"
],
"known_not_affected": [
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:3e7802fd4777d02152c225bd23d99d3a67301ef7dcc4d86624dc0852905b89c0_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:658118be2dd7dde63668822f2b10bf2155d1a7264435c31e9da01c4eed429a31_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:6ebecac905954551ee9e1d8ace2282305823528e5d81f430020390e6f0146733_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:9f138971e0419cf08273b296c86770a6a8146e96b19f354df51141794cb2dc50_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:0c292a7860239fcaf9dc3b99ded7fb3bf35bb04e36419731012a407a055ce93a_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:84a60e844b90441a353b605ec9d893426a2cba422c45306090273a738b029242_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:86dc4e5cb44e3e7519fa3fb4c994b2cc9204117a728c458b3994c8c6dfba372d_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:9a0705a74dbf6f6dc4f202696462940aa8c21358c60678d8c06f39e438ee410d_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:6cad955d303121f214c9200fdded75a18c0ebca4d6676fc49fb82c06fc4790fc_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:933f790fe6a2652dde798dcb39e4daeb6ad2a3b371d3b4930ef4f016a70769ed_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:942b6a4d4299e09ba619144ee216cb5eea73dd8aea6117ae4cb92a82c026c76b_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:e7607a6ca262ba1f9403d8a89e8f9771b84cac45e43eaee739789cf0cb8ebd29_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:0a49e3ed4090ee01e433871ef2765d8c74813333f6a641f2edff6fd56ede8d76_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:21230f1cee5974dc459f4b31f829f942cf27d2b7adf081ade185f78b8554822f_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:7aaa6d41e175e70f6a96ee44ba47805987a818858a19517698ec564d2d4c6c61_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:d3092e5ad323b1454a7ee54d54ff0aae0f5cb44603a93a80087768e984c917fc_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:b5a49391fd646c612bff8ee78e55f193f17141a3ef567eefdbaa21e9edaf4ed1_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:846cfa73983011c3f351e0584ace035ad06713f78e625e351922c33c31fc35f6_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:a753821c3238712b53436e7689ed0bf6dde224aa9bbcca70c4018709e7391ff5_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:abc4ca39454ce581794f6e80b272878b1aa81636d84933de5de0035888d9e231_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:ace068e3a65adc34ebba6a38242d4bb65e8cdd05c846daadfaa9e687e666b0bb_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:0a3b22036310909533456be9c03ae6b7b3c5d91b89b245533925cfe81e523d9e_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:d9a636edf9d0ea72339a6cf4af5d343f8ff0723cd466581a80968820405f9a15_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:e1489201089cda6b2b6dfe8b3b74bb4565030586de1ba18888727a5ddba4dea1_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:ea105c68e91862c8d0279240d9d92d1d27b816b49bbf528fb2d30a11343a24d8_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:1cc18f61f97007488f929514f0d96e7ee799cbeb57c8040393510fb5df1308ea_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:391eda856869508163773cf3d8f457bc27bae4619009abab4e1bc95c34013a80_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:b623dd3f2f055038655d3ec62983d6bf7f519d4b2d010c89f2809870ab75c3ff_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:d6d1b43384c9532b4d5c0af85df5a6086b986494825216103c02bfe67ddb1f33_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:19356ed9f617a6fccc1b299c05c07a54d078d1cde15ebe6663e2e11da3b7ac61_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1dad4897c8b22566fd61a83af3ae9f235001d5b8e5cdd40ed6d76bf7f58b508a_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1e20f4f7824339c4685afa6e309f8c143c245d824ae7d781488816fa1d62d17c_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:8fa9769e07dd82241952df0f4dd80e3d9671a9df66f0a4390d009123c6f09179_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-25679"
},
{
"category": "external",
"summary": "RHBZ#2445356",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2445356"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-25679",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25679"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-25679",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25679"
},
{
"category": "external",
"summary": "https://go.dev/cl/752180",
"url": "https://go.dev/cl/752180"
},
{
"category": "external",
"summary": "https://go.dev/issue/77578",
"url": "https://go.dev/issue/77578"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk",
"url": "https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4601",
"url": "https://pkg.go.dev/vuln/GO-2026-4601"
}
],
"release_date": "2026-03-06T21:28:14.211000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-24T07:31:25+00:00",
"details": "It is recommended that existing users of Red Hat OpenShift Builds 1.6.3 upgrades to to 1.6.4",
"product_ids": [
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:10cc203162a18a29b59faedf70efbdce132e92f64f915d3265c4fcb44711df9c_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:1beb2ef462b304a691c1bfd855bc6f70d26895a290de7524e0806ea023f92a30_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:8006f2dbeae12667c5a31827ef0f022733a950234cd55a0239334f3003b6e438_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:a716d3e3cc713c7494d0c051d23a872f4d8404f5f2c5226b13c715c901122872_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:5549"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:3e7802fd4777d02152c225bd23d99d3a67301ef7dcc4d86624dc0852905b89c0_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:658118be2dd7dde63668822f2b10bf2155d1a7264435c31e9da01c4eed429a31_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:6ebecac905954551ee9e1d8ace2282305823528e5d81f430020390e6f0146733_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:9f138971e0419cf08273b296c86770a6a8146e96b19f354df51141794cb2dc50_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:0c292a7860239fcaf9dc3b99ded7fb3bf35bb04e36419731012a407a055ce93a_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:84a60e844b90441a353b605ec9d893426a2cba422c45306090273a738b029242_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:86dc4e5cb44e3e7519fa3fb4c994b2cc9204117a728c458b3994c8c6dfba372d_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:9a0705a74dbf6f6dc4f202696462940aa8c21358c60678d8c06f39e438ee410d_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:6cad955d303121f214c9200fdded75a18c0ebca4d6676fc49fb82c06fc4790fc_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:933f790fe6a2652dde798dcb39e4daeb6ad2a3b371d3b4930ef4f016a70769ed_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:942b6a4d4299e09ba619144ee216cb5eea73dd8aea6117ae4cb92a82c026c76b_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:e7607a6ca262ba1f9403d8a89e8f9771b84cac45e43eaee739789cf0cb8ebd29_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:0a49e3ed4090ee01e433871ef2765d8c74813333f6a641f2edff6fd56ede8d76_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:21230f1cee5974dc459f4b31f829f942cf27d2b7adf081ade185f78b8554822f_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:7aaa6d41e175e70f6a96ee44ba47805987a818858a19517698ec564d2d4c6c61_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:d3092e5ad323b1454a7ee54d54ff0aae0f5cb44603a93a80087768e984c917fc_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:b5a49391fd646c612bff8ee78e55f193f17141a3ef567eefdbaa21e9edaf4ed1_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:846cfa73983011c3f351e0584ace035ad06713f78e625e351922c33c31fc35f6_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:a753821c3238712b53436e7689ed0bf6dde224aa9bbcca70c4018709e7391ff5_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:abc4ca39454ce581794f6e80b272878b1aa81636d84933de5de0035888d9e231_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:ace068e3a65adc34ebba6a38242d4bb65e8cdd05c846daadfaa9e687e666b0bb_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:0a3b22036310909533456be9c03ae6b7b3c5d91b89b245533925cfe81e523d9e_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:d9a636edf9d0ea72339a6cf4af5d343f8ff0723cd466581a80968820405f9a15_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:e1489201089cda6b2b6dfe8b3b74bb4565030586de1ba18888727a5ddba4dea1_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:ea105c68e91862c8d0279240d9d92d1d27b816b49bbf528fb2d30a11343a24d8_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:1cc18f61f97007488f929514f0d96e7ee799cbeb57c8040393510fb5df1308ea_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:391eda856869508163773cf3d8f457bc27bae4619009abab4e1bc95c34013a80_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:b623dd3f2f055038655d3ec62983d6bf7f519d4b2d010c89f2809870ab75c3ff_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:d6d1b43384c9532b4d5c0af85df5a6086b986494825216103c02bfe67ddb1f33_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:10cc203162a18a29b59faedf70efbdce132e92f64f915d3265c4fcb44711df9c_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:1beb2ef462b304a691c1bfd855bc6f70d26895a290de7524e0806ea023f92a30_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:8006f2dbeae12667c5a31827ef0f022733a950234cd55a0239334f3003b6e438_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:a716d3e3cc713c7494d0c051d23a872f4d8404f5f2c5226b13c715c901122872_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:19356ed9f617a6fccc1b299c05c07a54d078d1cde15ebe6663e2e11da3b7ac61_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1dad4897c8b22566fd61a83af3ae9f235001d5b8e5cdd40ed6d76bf7f58b508a_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1e20f4f7824339c4685afa6e309f8c143c245d824ae7d781488816fa1d62d17c_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:8fa9769e07dd82241952df0f4dd80e3d9671a9df66f0a4390d009123c6f09179_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:3e7802fd4777d02152c225bd23d99d3a67301ef7dcc4d86624dc0852905b89c0_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:658118be2dd7dde63668822f2b10bf2155d1a7264435c31e9da01c4eed429a31_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:6ebecac905954551ee9e1d8ace2282305823528e5d81f430020390e6f0146733_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:9f138971e0419cf08273b296c86770a6a8146e96b19f354df51141794cb2dc50_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:0c292a7860239fcaf9dc3b99ded7fb3bf35bb04e36419731012a407a055ce93a_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:84a60e844b90441a353b605ec9d893426a2cba422c45306090273a738b029242_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:86dc4e5cb44e3e7519fa3fb4c994b2cc9204117a728c458b3994c8c6dfba372d_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:9a0705a74dbf6f6dc4f202696462940aa8c21358c60678d8c06f39e438ee410d_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:6cad955d303121f214c9200fdded75a18c0ebca4d6676fc49fb82c06fc4790fc_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:933f790fe6a2652dde798dcb39e4daeb6ad2a3b371d3b4930ef4f016a70769ed_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:942b6a4d4299e09ba619144ee216cb5eea73dd8aea6117ae4cb92a82c026c76b_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:e7607a6ca262ba1f9403d8a89e8f9771b84cac45e43eaee739789cf0cb8ebd29_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:0a49e3ed4090ee01e433871ef2765d8c74813333f6a641f2edff6fd56ede8d76_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:21230f1cee5974dc459f4b31f829f942cf27d2b7adf081ade185f78b8554822f_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:7aaa6d41e175e70f6a96ee44ba47805987a818858a19517698ec564d2d4c6c61_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:d3092e5ad323b1454a7ee54d54ff0aae0f5cb44603a93a80087768e984c917fc_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:b5a49391fd646c612bff8ee78e55f193f17141a3ef567eefdbaa21e9edaf4ed1_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:846cfa73983011c3f351e0584ace035ad06713f78e625e351922c33c31fc35f6_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:a753821c3238712b53436e7689ed0bf6dde224aa9bbcca70c4018709e7391ff5_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:abc4ca39454ce581794f6e80b272878b1aa81636d84933de5de0035888d9e231_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:ace068e3a65adc34ebba6a38242d4bb65e8cdd05c846daadfaa9e687e666b0bb_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:0a3b22036310909533456be9c03ae6b7b3c5d91b89b245533925cfe81e523d9e_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:d9a636edf9d0ea72339a6cf4af5d343f8ff0723cd466581a80968820405f9a15_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:e1489201089cda6b2b6dfe8b3b74bb4565030586de1ba18888727a5ddba4dea1_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:ea105c68e91862c8d0279240d9d92d1d27b816b49bbf528fb2d30a11343a24d8_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:1cc18f61f97007488f929514f0d96e7ee799cbeb57c8040393510fb5df1308ea_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:391eda856869508163773cf3d8f457bc27bae4619009abab4e1bc95c34013a80_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:b623dd3f2f055038655d3ec62983d6bf7f519d4b2d010c89f2809870ab75c3ff_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:d6d1b43384c9532b4d5c0af85df5a6086b986494825216103c02bfe67ddb1f33_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:10cc203162a18a29b59faedf70efbdce132e92f64f915d3265c4fcb44711df9c_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:1beb2ef462b304a691c1bfd855bc6f70d26895a290de7524e0806ea023f92a30_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:8006f2dbeae12667c5a31827ef0f022733a950234cd55a0239334f3003b6e438_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:a716d3e3cc713c7494d0c051d23a872f4d8404f5f2c5226b13c715c901122872_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:19356ed9f617a6fccc1b299c05c07a54d078d1cde15ebe6663e2e11da3b7ac61_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1dad4897c8b22566fd61a83af3ae9f235001d5b8e5cdd40ed6d76bf7f58b508a_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1e20f4f7824339c4685afa6e309f8c143c245d824ae7d781488816fa1d62d17c_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:8fa9769e07dd82241952df0f4dd80e3d9671a9df66f0a4390d009123c6f09179_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "net/url: Incorrect parsing of IPv6 host literals in net/url"
},
{
"cve": "CVE-2026-27137",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"discovery_date": "2026-03-06T22:01:38.859733+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:3e7802fd4777d02152c225bd23d99d3a67301ef7dcc4d86624dc0852905b89c0_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:658118be2dd7dde63668822f2b10bf2155d1a7264435c31e9da01c4eed429a31_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:6ebecac905954551ee9e1d8ace2282305823528e5d81f430020390e6f0146733_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:9f138971e0419cf08273b296c86770a6a8146e96b19f354df51141794cb2dc50_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:0c292a7860239fcaf9dc3b99ded7fb3bf35bb04e36419731012a407a055ce93a_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:84a60e844b90441a353b605ec9d893426a2cba422c45306090273a738b029242_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:86dc4e5cb44e3e7519fa3fb4c994b2cc9204117a728c458b3994c8c6dfba372d_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:9a0705a74dbf6f6dc4f202696462940aa8c21358c60678d8c06f39e438ee410d_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:6cad955d303121f214c9200fdded75a18c0ebca4d6676fc49fb82c06fc4790fc_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:933f790fe6a2652dde798dcb39e4daeb6ad2a3b371d3b4930ef4f016a70769ed_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:942b6a4d4299e09ba619144ee216cb5eea73dd8aea6117ae4cb92a82c026c76b_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:e7607a6ca262ba1f9403d8a89e8f9771b84cac45e43eaee739789cf0cb8ebd29_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:0a49e3ed4090ee01e433871ef2765d8c74813333f6a641f2edff6fd56ede8d76_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:21230f1cee5974dc459f4b31f829f942cf27d2b7adf081ade185f78b8554822f_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:7aaa6d41e175e70f6a96ee44ba47805987a818858a19517698ec564d2d4c6c61_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:d3092e5ad323b1454a7ee54d54ff0aae0f5cb44603a93a80087768e984c917fc_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:b5a49391fd646c612bff8ee78e55f193f17141a3ef567eefdbaa21e9edaf4ed1_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:846cfa73983011c3f351e0584ace035ad06713f78e625e351922c33c31fc35f6_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:a753821c3238712b53436e7689ed0bf6dde224aa9bbcca70c4018709e7391ff5_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:abc4ca39454ce581794f6e80b272878b1aa81636d84933de5de0035888d9e231_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:ace068e3a65adc34ebba6a38242d4bb65e8cdd05c846daadfaa9e687e666b0bb_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:0a3b22036310909533456be9c03ae6b7b3c5d91b89b245533925cfe81e523d9e_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:d9a636edf9d0ea72339a6cf4af5d343f8ff0723cd466581a80968820405f9a15_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:e1489201089cda6b2b6dfe8b3b74bb4565030586de1ba18888727a5ddba4dea1_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:ea105c68e91862c8d0279240d9d92d1d27b816b49bbf528fb2d30a11343a24d8_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:1cc18f61f97007488f929514f0d96e7ee799cbeb57c8040393510fb5df1308ea_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:391eda856869508163773cf3d8f457bc27bae4619009abab4e1bc95c34013a80_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:b623dd3f2f055038655d3ec62983d6bf7f519d4b2d010c89f2809870ab75c3ff_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:d6d1b43384c9532b4d5c0af85df5a6086b986494825216103c02bfe67ddb1f33_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:19356ed9f617a6fccc1b299c05c07a54d078d1cde15ebe6663e2e11da3b7ac61_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1dad4897c8b22566fd61a83af3ae9f235001d5b8e5cdd40ed6d76bf7f58b508a_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1e20f4f7824339c4685afa6e309f8c143c245d824ae7d781488816fa1d62d17c_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:8fa9769e07dd82241952df0f4dd80e3d9671a9df66f0a4390d009123c6f09179_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2445345"
}
],
"notes": [
{
"category": "description",
"text": "A certificate validation flaw has been discovered in the golang crypto/x509 module. When verifying a certificate chain which contains a certificate containing multiple email address constraints which share common local portions but different domain portions, these constraints will not be properly applied, and only the last constraint will be considered.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: Incorrect enforcement of email constraints in crypto/x509",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:10cc203162a18a29b59faedf70efbdce132e92f64f915d3265c4fcb44711df9c_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:1beb2ef462b304a691c1bfd855bc6f70d26895a290de7524e0806ea023f92a30_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:8006f2dbeae12667c5a31827ef0f022733a950234cd55a0239334f3003b6e438_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:a716d3e3cc713c7494d0c051d23a872f4d8404f5f2c5226b13c715c901122872_amd64"
],
"known_not_affected": [
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:3e7802fd4777d02152c225bd23d99d3a67301ef7dcc4d86624dc0852905b89c0_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:658118be2dd7dde63668822f2b10bf2155d1a7264435c31e9da01c4eed429a31_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:6ebecac905954551ee9e1d8ace2282305823528e5d81f430020390e6f0146733_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:9f138971e0419cf08273b296c86770a6a8146e96b19f354df51141794cb2dc50_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:0c292a7860239fcaf9dc3b99ded7fb3bf35bb04e36419731012a407a055ce93a_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:84a60e844b90441a353b605ec9d893426a2cba422c45306090273a738b029242_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:86dc4e5cb44e3e7519fa3fb4c994b2cc9204117a728c458b3994c8c6dfba372d_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:9a0705a74dbf6f6dc4f202696462940aa8c21358c60678d8c06f39e438ee410d_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:6cad955d303121f214c9200fdded75a18c0ebca4d6676fc49fb82c06fc4790fc_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:933f790fe6a2652dde798dcb39e4daeb6ad2a3b371d3b4930ef4f016a70769ed_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:942b6a4d4299e09ba619144ee216cb5eea73dd8aea6117ae4cb92a82c026c76b_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:e7607a6ca262ba1f9403d8a89e8f9771b84cac45e43eaee739789cf0cb8ebd29_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:0a49e3ed4090ee01e433871ef2765d8c74813333f6a641f2edff6fd56ede8d76_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:21230f1cee5974dc459f4b31f829f942cf27d2b7adf081ade185f78b8554822f_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:7aaa6d41e175e70f6a96ee44ba47805987a818858a19517698ec564d2d4c6c61_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:d3092e5ad323b1454a7ee54d54ff0aae0f5cb44603a93a80087768e984c917fc_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:b5a49391fd646c612bff8ee78e55f193f17141a3ef567eefdbaa21e9edaf4ed1_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:846cfa73983011c3f351e0584ace035ad06713f78e625e351922c33c31fc35f6_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:a753821c3238712b53436e7689ed0bf6dde224aa9bbcca70c4018709e7391ff5_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:abc4ca39454ce581794f6e80b272878b1aa81636d84933de5de0035888d9e231_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:ace068e3a65adc34ebba6a38242d4bb65e8cdd05c846daadfaa9e687e666b0bb_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:0a3b22036310909533456be9c03ae6b7b3c5d91b89b245533925cfe81e523d9e_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:d9a636edf9d0ea72339a6cf4af5d343f8ff0723cd466581a80968820405f9a15_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:e1489201089cda6b2b6dfe8b3b74bb4565030586de1ba18888727a5ddba4dea1_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:ea105c68e91862c8d0279240d9d92d1d27b816b49bbf528fb2d30a11343a24d8_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:1cc18f61f97007488f929514f0d96e7ee799cbeb57c8040393510fb5df1308ea_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:391eda856869508163773cf3d8f457bc27bae4619009abab4e1bc95c34013a80_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:b623dd3f2f055038655d3ec62983d6bf7f519d4b2d010c89f2809870ab75c3ff_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:d6d1b43384c9532b4d5c0af85df5a6086b986494825216103c02bfe67ddb1f33_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:19356ed9f617a6fccc1b299c05c07a54d078d1cde15ebe6663e2e11da3b7ac61_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1dad4897c8b22566fd61a83af3ae9f235001d5b8e5cdd40ed6d76bf7f58b508a_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1e20f4f7824339c4685afa6e309f8c143c245d824ae7d781488816fa1d62d17c_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:8fa9769e07dd82241952df0f4dd80e3d9671a9df66f0a4390d009123c6f09179_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-27137"
},
{
"category": "external",
"summary": "RHBZ#2445345",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2445345"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-27137",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27137"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-27137",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27137"
},
{
"category": "external",
"summary": "https://go.dev/cl/752182",
"url": "https://go.dev/cl/752182"
},
{
"category": "external",
"summary": "https://go.dev/issue/77952",
"url": "https://go.dev/issue/77952"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk",
"url": "https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4599",
"url": "https://pkg.go.dev/vuln/GO-2026-4599"
}
],
"release_date": "2026-03-06T21:28:13.748000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-24T07:31:25+00:00",
"details": "It is recommended that existing users of Red Hat OpenShift Builds 1.6.3 upgrades to to 1.6.4",
"product_ids": [
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:10cc203162a18a29b59faedf70efbdce132e92f64f915d3265c4fcb44711df9c_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:1beb2ef462b304a691c1bfd855bc6f70d26895a290de7524e0806ea023f92a30_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:8006f2dbeae12667c5a31827ef0f022733a950234cd55a0239334f3003b6e438_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:a716d3e3cc713c7494d0c051d23a872f4d8404f5f2c5226b13c715c901122872_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:5549"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:3e7802fd4777d02152c225bd23d99d3a67301ef7dcc4d86624dc0852905b89c0_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:658118be2dd7dde63668822f2b10bf2155d1a7264435c31e9da01c4eed429a31_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:6ebecac905954551ee9e1d8ace2282305823528e5d81f430020390e6f0146733_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:9f138971e0419cf08273b296c86770a6a8146e96b19f354df51141794cb2dc50_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:0c292a7860239fcaf9dc3b99ded7fb3bf35bb04e36419731012a407a055ce93a_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:84a60e844b90441a353b605ec9d893426a2cba422c45306090273a738b029242_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:86dc4e5cb44e3e7519fa3fb4c994b2cc9204117a728c458b3994c8c6dfba372d_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:9a0705a74dbf6f6dc4f202696462940aa8c21358c60678d8c06f39e438ee410d_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:6cad955d303121f214c9200fdded75a18c0ebca4d6676fc49fb82c06fc4790fc_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:933f790fe6a2652dde798dcb39e4daeb6ad2a3b371d3b4930ef4f016a70769ed_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:942b6a4d4299e09ba619144ee216cb5eea73dd8aea6117ae4cb92a82c026c76b_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:e7607a6ca262ba1f9403d8a89e8f9771b84cac45e43eaee739789cf0cb8ebd29_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:0a49e3ed4090ee01e433871ef2765d8c74813333f6a641f2edff6fd56ede8d76_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:21230f1cee5974dc459f4b31f829f942cf27d2b7adf081ade185f78b8554822f_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:7aaa6d41e175e70f6a96ee44ba47805987a818858a19517698ec564d2d4c6c61_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:d3092e5ad323b1454a7ee54d54ff0aae0f5cb44603a93a80087768e984c917fc_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:b5a49391fd646c612bff8ee78e55f193f17141a3ef567eefdbaa21e9edaf4ed1_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:846cfa73983011c3f351e0584ace035ad06713f78e625e351922c33c31fc35f6_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:a753821c3238712b53436e7689ed0bf6dde224aa9bbcca70c4018709e7391ff5_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:abc4ca39454ce581794f6e80b272878b1aa81636d84933de5de0035888d9e231_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:ace068e3a65adc34ebba6a38242d4bb65e8cdd05c846daadfaa9e687e666b0bb_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:0a3b22036310909533456be9c03ae6b7b3c5d91b89b245533925cfe81e523d9e_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:d9a636edf9d0ea72339a6cf4af5d343f8ff0723cd466581a80968820405f9a15_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:e1489201089cda6b2b6dfe8b3b74bb4565030586de1ba18888727a5ddba4dea1_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:ea105c68e91862c8d0279240d9d92d1d27b816b49bbf528fb2d30a11343a24d8_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:1cc18f61f97007488f929514f0d96e7ee799cbeb57c8040393510fb5df1308ea_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:391eda856869508163773cf3d8f457bc27bae4619009abab4e1bc95c34013a80_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:b623dd3f2f055038655d3ec62983d6bf7f519d4b2d010c89f2809870ab75c3ff_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:d6d1b43384c9532b4d5c0af85df5a6086b986494825216103c02bfe67ddb1f33_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:10cc203162a18a29b59faedf70efbdce132e92f64f915d3265c4fcb44711df9c_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:1beb2ef462b304a691c1bfd855bc6f70d26895a290de7524e0806ea023f92a30_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:8006f2dbeae12667c5a31827ef0f022733a950234cd55a0239334f3003b6e438_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:a716d3e3cc713c7494d0c051d23a872f4d8404f5f2c5226b13c715c901122872_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:19356ed9f617a6fccc1b299c05c07a54d078d1cde15ebe6663e2e11da3b7ac61_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1dad4897c8b22566fd61a83af3ae9f235001d5b8e5cdd40ed6d76bf7f58b508a_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1e20f4f7824339c4685afa6e309f8c143c245d824ae7d781488816fa1d62d17c_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:8fa9769e07dd82241952df0f4dd80e3d9671a9df66f0a4390d009123c6f09179_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:3e7802fd4777d02152c225bd23d99d3a67301ef7dcc4d86624dc0852905b89c0_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:658118be2dd7dde63668822f2b10bf2155d1a7264435c31e9da01c4eed429a31_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:6ebecac905954551ee9e1d8ace2282305823528e5d81f430020390e6f0146733_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:9f138971e0419cf08273b296c86770a6a8146e96b19f354df51141794cb2dc50_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:0c292a7860239fcaf9dc3b99ded7fb3bf35bb04e36419731012a407a055ce93a_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:84a60e844b90441a353b605ec9d893426a2cba422c45306090273a738b029242_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:86dc4e5cb44e3e7519fa3fb4c994b2cc9204117a728c458b3994c8c6dfba372d_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:9a0705a74dbf6f6dc4f202696462940aa8c21358c60678d8c06f39e438ee410d_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:6cad955d303121f214c9200fdded75a18c0ebca4d6676fc49fb82c06fc4790fc_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:933f790fe6a2652dde798dcb39e4daeb6ad2a3b371d3b4930ef4f016a70769ed_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:942b6a4d4299e09ba619144ee216cb5eea73dd8aea6117ae4cb92a82c026c76b_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:e7607a6ca262ba1f9403d8a89e8f9771b84cac45e43eaee739789cf0cb8ebd29_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:0a49e3ed4090ee01e433871ef2765d8c74813333f6a641f2edff6fd56ede8d76_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:21230f1cee5974dc459f4b31f829f942cf27d2b7adf081ade185f78b8554822f_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:7aaa6d41e175e70f6a96ee44ba47805987a818858a19517698ec564d2d4c6c61_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:d3092e5ad323b1454a7ee54d54ff0aae0f5cb44603a93a80087768e984c917fc_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:b5a49391fd646c612bff8ee78e55f193f17141a3ef567eefdbaa21e9edaf4ed1_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:846cfa73983011c3f351e0584ace035ad06713f78e625e351922c33c31fc35f6_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:a753821c3238712b53436e7689ed0bf6dde224aa9bbcca70c4018709e7391ff5_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:abc4ca39454ce581794f6e80b272878b1aa81636d84933de5de0035888d9e231_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:ace068e3a65adc34ebba6a38242d4bb65e8cdd05c846daadfaa9e687e666b0bb_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:0a3b22036310909533456be9c03ae6b7b3c5d91b89b245533925cfe81e523d9e_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:d9a636edf9d0ea72339a6cf4af5d343f8ff0723cd466581a80968820405f9a15_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:e1489201089cda6b2b6dfe8b3b74bb4565030586de1ba18888727a5ddba4dea1_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:ea105c68e91862c8d0279240d9d92d1d27b816b49bbf528fb2d30a11343a24d8_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:1cc18f61f97007488f929514f0d96e7ee799cbeb57c8040393510fb5df1308ea_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:391eda856869508163773cf3d8f457bc27bae4619009abab4e1bc95c34013a80_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:b623dd3f2f055038655d3ec62983d6bf7f519d4b2d010c89f2809870ab75c3ff_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:d6d1b43384c9532b4d5c0af85df5a6086b986494825216103c02bfe67ddb1f33_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:10cc203162a18a29b59faedf70efbdce132e92f64f915d3265c4fcb44711df9c_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:1beb2ef462b304a691c1bfd855bc6f70d26895a290de7524e0806ea023f92a30_ppc64le",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:8006f2dbeae12667c5a31827ef0f022733a950234cd55a0239334f3003b6e438_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:a716d3e3cc713c7494d0c051d23a872f4d8404f5f2c5226b13c715c901122872_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:19356ed9f617a6fccc1b299c05c07a54d078d1cde15ebe6663e2e11da3b7ac61_arm64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1dad4897c8b22566fd61a83af3ae9f235001d5b8e5cdd40ed6d76bf7f58b508a_amd64",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1e20f4f7824339c4685afa6e309f8c143c245d824ae7d781488816fa1d62d17c_s390x",
"Red Hat OpenShift Builds 1.6.4:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:8fa9769e07dd82241952df0f4dd80e3d9671a9df66f0a4390d009123c6f09179_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: Incorrect enforcement of email constraints in crypto/x509"
}
]
}
RHSA-2026:8151
Vulnerability from csaf_redhat - Published: 2026-04-14 15:55 - Updated: 2026-04-23 06:09A flaw was found in the net/url package in the Go standard library. The package does not enforce a limit on the number of unique query parameters it parses. A Go application using the net/http.Request.ParseForm method will try to process all parameters provided in the request. A specially crafted HTTP request containing a massive number of query parameters will cause the application to consume an excessive amount of memory, eventually causing the application to crash or become unresponsive, resulting in a denial of service.
A flaw was found in the archive/zip package in the Go standard library. A super-linear file name indexing algorithm is used in the first time a file in an archive is opened. A crafted zip archive containing a specific arrangement of file names can cause an excessive CPU and memory consumption. A Go application processing a malicious archive can become unresponsive or crash, resulting in a denial of service.
A flaw was found in golang. A remote attacker could exploit this vulnerability by providing a specially crafted certificate during the error string construction process within the `HostnameError.Error()` function. This flaw, caused by unbounded string concatenation, leads to excessive resource consumption. Successful exploitation can result in a denial of service (DoS) for the affected system.
A flaw was found in the crypto/tls component. This vulnerability occurs during Transport Layer Security (TLS) session resumption when certificate authority (CA) settings are modified between the initial and resumed handshakes. An attacker could exploit this to bypass certificate validation, allowing a client or server to establish a connection that should have been rejected. This could lead to an authentication bypass under specific conditions.
Multiple CoreDNS server implementations (gRPC, HTTPS, and HTTP/3) lack critical resource-limiting controls. An unauthenticated remote attacker can exhaust memory and degrade or crash the server by opening many concurrent connections, streams, or sending oversized request bodies. The issue is similar in nature to CVE-2025-47950 (QUIC DoS) but affects additional server types that do not enforce connection limits, stream limits, or message size constraints.
urllib3 is an HTTP client library for Python. urllib3's streaming API is designed for the efficient handling of large HTTP responses by reading the content in chunks, rather than loading the entire response body into memory at once. urllib3 can perform decoding or decompression based on the HTTP `Content-Encoding` header (e.g., `gzip`, `deflate`, `br`, or `zstd`). When using the streaming API, the library decompresses only the necessary bytes, enabling partial content consumption. Starting in version 1.22 and prior to version 2.6.3, for HTTP redirect responses, the library would read the entire response body to drain the connection and decompress the content unnecessarily. This decompression occurred even before any read methods were called, and configured read limits did not restrict the amount of decompressed data. As a result, there was no safeguard against decompression bombs. A malicious server could exploit this to trigger excessive resource consumption on the client. Applications and libraries are affected when they stream content from untrusted sources by setting `preload_content=False` when they do not disable redirects. Users should upgrade to at least urllib3 v2.6.3, in which the library does not decode content of redirect responses when `preload_content=False`. If upgrading is not immediately possible, disable redirects by setting `redirect=False` for requests to untrusted source.
The Go standard library function net/url.Parse insufficiently validated the host/authority component and accepted some invalid URLs by effectively treating garbage before an IP-literal as ignorable. The function should have rejected this as invalid.
A flaw was found in CoreDNS, a DNS server that uses a chain of plugins. This logical vulnerability allows an attacker to bypass DNS access controls. The issue occurs because security plugins, such as 'acl', are evaluated before the 'rewrite' plugin, creating a Time-of-Check Time-of-Use (TOCTOU) flaw. This flaw enables an attacker to circumvent intended access restrictions.
A flaw was found in CoreDNS, a DNS server that chains plugins. A remote attacker can exploit this flaw by sending specially crafted DNS queries. This vulnerability exists in CoreDNS's loop detection plugin due to the use of a predictable pseudo-random number generator (PRNG) for generating a secret query name. Successful exploitation can lead to a denial of service (DoS) by crashing the DNS server.
A certificate validation flaw has been discovered in the golang crypto/x509 module. When verifying a certificate chain which contains a certificate containing multiple email address constraints which share common local portions but different domain portions, these constraints will not be properly applied, and only the last constraint will be considered.
A flaw was found in gRPC-Go, the Go language implementation of gRPC. This vulnerability, an authorization bypass, is caused by improper input validation of the HTTP/2 `:path` pseudo-header. A remote attacker can exploit this by sending raw HTTP/2 frames with a malformed `:path` that omits the mandatory leading slash. This allows the attacker to bypass defined security policies, potentially leading to unauthorized access to services or information disclosure.
| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Submariner v0.22 General Availability release images, which provide enhancements, security fixes, and updated container images.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.\nRed Hat Advanced Cluster Management for Kubernetes v2.15",
"title": "Topic"
},
{
"category": "general",
"text": "Submariner is a Kubernetes operator that enables cross-cluster connectivity for services and pods, implementing KEP-1645 (Multi-Cluster Services API). After deploying the Submariner operator, it can enable direct networking between pods and services across different Kubernetes clusters.\n\nFor more information about Submariner, see the Submariner open source community website at: https://submariner.io/.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:8151",
"url": "https://access.redhat.com/errata/RHSA-2026:8151"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61726",
"url": "https://access.redhat.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61728",
"url": "https://access.redhat.com/security/cve/CVE-2025-61728"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61729",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-68121",
"url": "https://access.redhat.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-68151",
"url": "https://access.redhat.com/security/cve/CVE-2025-68151"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-21441",
"url": "https://access.redhat.com/security/cve/CVE-2026-21441"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-25679",
"url": "https://access.redhat.com/security/cve/CVE-2026-25679"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-26017",
"url": "https://access.redhat.com/security/cve/CVE-2026-26017"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-26018",
"url": "https://access.redhat.com/security/cve/CVE-2026-26018"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-27137",
"url": "https://access.redhat.com/security/cve/CVE-2026-27137"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-33186",
"url": "https://access.redhat.com/security/cve/CVE-2026-33186"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_8151.json"
}
],
"title": "Red Hat Security Advisory: Submariner v0.22 security fixes and container updates",
"tracking": {
"current_release_date": "2026-04-23T06:09:09+00:00",
"generator": {
"date": "2026-04-23T06:09:09+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.5"
}
},
"id": "RHSA-2026:8151",
"initial_release_date": "2026-04-14T15:55:27+00:00",
"revision_history": [
{
"date": "2026-04-14T15:55:27+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-04-14T15:55:34+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-23T06:09:09+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Advanced Cluster Management for Kubernetes 2.15",
"product": {
"name": "Red Hat Advanced Cluster Management for Kubernetes 2.15",
"product_id": "Red Hat Advanced Cluster Management for Kubernetes 2.15",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:acm:2.15::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat Advanced Cluster Management for Kubernetes"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:b54f4ec7c1e1f45077ad840b6ddbe3388b640f3acc8b29f68ff59547805ee64d_amd64",
"product": {
"name": "registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:b54f4ec7c1e1f45077ad840b6ddbe3388b640f3acc8b29f68ff59547805ee64d_amd64",
"product_id": "registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:b54f4ec7c1e1f45077ad840b6ddbe3388b640f3acc8b29f68ff59547805ee64d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/lighthouse-agent-rhel9@sha256%3Ab54f4ec7c1e1f45077ad840b6ddbe3388b640f3acc8b29f68ff59547805ee64d?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2\u0026tag=1774084104"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:db1083469ea0c8bf20c10252f4e5f500dd38daca85a996e834f866f9618c3e95_amd64",
"product": {
"name": "registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:db1083469ea0c8bf20c10252f4e5f500dd38daca85a996e834f866f9618c3e95_amd64",
"product_id": "registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:db1083469ea0c8bf20c10252f4e5f500dd38daca85a996e834f866f9618c3e95_amd64",
"product_identification_helper": {
"purl": "pkg:oci/lighthouse-coredns-rhel9@sha256%3Adb1083469ea0c8bf20c10252f4e5f500dd38daca85a996e834f866f9618c3e95?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2\u0026tag=1774086225"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhacm2/nettest-rhel9@sha256:3780b6e2fa5c3c0328a161d6328ed828879c5bdb38cc2ab451366b60ffa5b043_amd64",
"product": {
"name": "registry.redhat.io/rhacm2/nettest-rhel9@sha256:3780b6e2fa5c3c0328a161d6328ed828879c5bdb38cc2ab451366b60ffa5b043_amd64",
"product_id": "registry.redhat.io/rhacm2/nettest-rhel9@sha256:3780b6e2fa5c3c0328a161d6328ed828879c5bdb38cc2ab451366b60ffa5b043_amd64",
"product_identification_helper": {
"purl": "pkg:oci/nettest-rhel9@sha256%3A3780b6e2fa5c3c0328a161d6328ed828879c5bdb38cc2ab451366b60ffa5b043?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2\u0026tag=1774372741"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhacm2/subctl-rhel9@sha256:613ec029444a86d5510c67551d9b346379413f79064b4a406f8e4ad10b71f5a0_amd64",
"product": {
"name": "registry.redhat.io/rhacm2/subctl-rhel9@sha256:613ec029444a86d5510c67551d9b346379413f79064b4a406f8e4ad10b71f5a0_amd64",
"product_id": "registry.redhat.io/rhacm2/subctl-rhel9@sha256:613ec029444a86d5510c67551d9b346379413f79064b4a406f8e4ad10b71f5a0_amd64",
"product_identification_helper": {
"purl": "pkg:oci/subctl-rhel9@sha256%3A613ec029444a86d5510c67551d9b346379413f79064b4a406f8e4ad10b71f5a0?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2\u0026tag=1774085848"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhacm2/submariner-operator-bundle@sha256:39088cefc6419019cd9d83bf2f717634fcd01d9befd37b8342553956fae5dd5f_amd64",
"product": {
"name": "registry.redhat.io/rhacm2/submariner-operator-bundle@sha256:39088cefc6419019cd9d83bf2f717634fcd01d9befd37b8342553956fae5dd5f_amd64",
"product_id": "registry.redhat.io/rhacm2/submariner-operator-bundle@sha256:39088cefc6419019cd9d83bf2f717634fcd01d9befd37b8342553956fae5dd5f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/submariner-operator-bundle@sha256%3A39088cefc6419019cd9d83bf2f717634fcd01d9befd37b8342553956fae5dd5f?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2\u0026tag=1774565831"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:1294c67c44cd5ecde081e35432874b6cabdcd17252f9dfc773eb5158213550e7_amd64",
"product": {
"name": "registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:1294c67c44cd5ecde081e35432874b6cabdcd17252f9dfc773eb5158213550e7_amd64",
"product_id": "registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:1294c67c44cd5ecde081e35432874b6cabdcd17252f9dfc773eb5158213550e7_amd64",
"product_identification_helper": {
"purl": "pkg:oci/submariner-gateway-rhel9@sha256%3A1294c67c44cd5ecde081e35432874b6cabdcd17252f9dfc773eb5158213550e7?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2\u0026tag=1774550350"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:5f8f4618887f2176dc24bbf6419112f85a68e58d49ff47cb1bbd198f2e148d9d_amd64",
"product": {
"name": "registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:5f8f4618887f2176dc24bbf6419112f85a68e58d49ff47cb1bbd198f2e148d9d_amd64",
"product_id": "registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:5f8f4618887f2176dc24bbf6419112f85a68e58d49ff47cb1bbd198f2e148d9d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/submariner-globalnet-rhel9@sha256%3A5f8f4618887f2176dc24bbf6419112f85a68e58d49ff47cb1bbd198f2e148d9d?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2\u0026tag=1774550347"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:3a481555d5376183a2ee392c409739417d5778e2c0559472f9070ccfe2918e2c_amd64",
"product": {
"name": "registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:3a481555d5376183a2ee392c409739417d5778e2c0559472f9070ccfe2918e2c_amd64",
"product_id": "registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:3a481555d5376183a2ee392c409739417d5778e2c0559472f9070ccfe2918e2c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/submariner-rhel9-operator@sha256%3A3a481555d5376183a2ee392c409739417d5778e2c0559472f9070ccfe2918e2c?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2\u0026tag=1774332596"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:ff86bbf817bfc8450074d2ee2e8e55f6e500e7f23d12e3e1ef949cb49acb5e32_amd64",
"product": {
"name": "registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:ff86bbf817bfc8450074d2ee2e8e55f6e500e7f23d12e3e1ef949cb49acb5e32_amd64",
"product_id": "registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:ff86bbf817bfc8450074d2ee2e8e55f6e500e7f23d12e3e1ef949cb49acb5e32_amd64",
"product_identification_helper": {
"purl": "pkg:oci/submariner-route-agent-rhel9@sha256%3Aff86bbf817bfc8450074d2ee2e8e55f6e500e7f23d12e3e1ef949cb49acb5e32?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2\u0026tag=1774550357"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:3a7d7ad6a28416cd4479b5cf1508067e10ce342f01c7bb4aa3676abbd9f43a4a_ppc64le",
"product": {
"name": "registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:3a7d7ad6a28416cd4479b5cf1508067e10ce342f01c7bb4aa3676abbd9f43a4a_ppc64le",
"product_id": "registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:3a7d7ad6a28416cd4479b5cf1508067e10ce342f01c7bb4aa3676abbd9f43a4a_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/lighthouse-agent-rhel9@sha256%3A3a7d7ad6a28416cd4479b5cf1508067e10ce342f01c7bb4aa3676abbd9f43a4a?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2\u0026tag=1774084104"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:251df7bb1820fed1c75e7b5dd14ed2d12a9bf2f3b74c87f6a0027ebf0641d4e5_ppc64le",
"product": {
"name": "registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:251df7bb1820fed1c75e7b5dd14ed2d12a9bf2f3b74c87f6a0027ebf0641d4e5_ppc64le",
"product_id": "registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:251df7bb1820fed1c75e7b5dd14ed2d12a9bf2f3b74c87f6a0027ebf0641d4e5_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/lighthouse-coredns-rhel9@sha256%3A251df7bb1820fed1c75e7b5dd14ed2d12a9bf2f3b74c87f6a0027ebf0641d4e5?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2\u0026tag=1774086225"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhacm2/nettest-rhel9@sha256:6c394c6c6de11664040b84bbdbe2ae8222bece13e36460774ab3c41fc92f932e_ppc64le",
"product": {
"name": "registry.redhat.io/rhacm2/nettest-rhel9@sha256:6c394c6c6de11664040b84bbdbe2ae8222bece13e36460774ab3c41fc92f932e_ppc64le",
"product_id": "registry.redhat.io/rhacm2/nettest-rhel9@sha256:6c394c6c6de11664040b84bbdbe2ae8222bece13e36460774ab3c41fc92f932e_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/nettest-rhel9@sha256%3A6c394c6c6de11664040b84bbdbe2ae8222bece13e36460774ab3c41fc92f932e?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2\u0026tag=1774372741"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhacm2/subctl-rhel9@sha256:d061e9013521b8b7fe281176926e8b4684fddded2bf166906d8fa5d15ac9da32_ppc64le",
"product": {
"name": "registry.redhat.io/rhacm2/subctl-rhel9@sha256:d061e9013521b8b7fe281176926e8b4684fddded2bf166906d8fa5d15ac9da32_ppc64le",
"product_id": "registry.redhat.io/rhacm2/subctl-rhel9@sha256:d061e9013521b8b7fe281176926e8b4684fddded2bf166906d8fa5d15ac9da32_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/subctl-rhel9@sha256%3Ad061e9013521b8b7fe281176926e8b4684fddded2bf166906d8fa5d15ac9da32?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2\u0026tag=1774085848"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:1823cb53424d92094ff3b1a151501771c5886b25bba4bab79197ad6fd32304ef_ppc64le",
"product": {
"name": "registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:1823cb53424d92094ff3b1a151501771c5886b25bba4bab79197ad6fd32304ef_ppc64le",
"product_id": "registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:1823cb53424d92094ff3b1a151501771c5886b25bba4bab79197ad6fd32304ef_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/submariner-gateway-rhel9@sha256%3A1823cb53424d92094ff3b1a151501771c5886b25bba4bab79197ad6fd32304ef?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2\u0026tag=1774550350"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:e3090d6f0a2ca71edf606ca49cafa063ac9ff3122f0d377ed9f25a37151d6fb0_ppc64le",
"product": {
"name": "registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:e3090d6f0a2ca71edf606ca49cafa063ac9ff3122f0d377ed9f25a37151d6fb0_ppc64le",
"product_id": "registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:e3090d6f0a2ca71edf606ca49cafa063ac9ff3122f0d377ed9f25a37151d6fb0_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/submariner-globalnet-rhel9@sha256%3Ae3090d6f0a2ca71edf606ca49cafa063ac9ff3122f0d377ed9f25a37151d6fb0?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2\u0026tag=1774550347"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:5b5f6ffba68d27f81bb5c26e4fb83d80a4b72523110e622d764f9337d1cb4826_ppc64le",
"product": {
"name": "registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:5b5f6ffba68d27f81bb5c26e4fb83d80a4b72523110e622d764f9337d1cb4826_ppc64le",
"product_id": "registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:5b5f6ffba68d27f81bb5c26e4fb83d80a4b72523110e622d764f9337d1cb4826_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/submariner-rhel9-operator@sha256%3A5b5f6ffba68d27f81bb5c26e4fb83d80a4b72523110e622d764f9337d1cb4826?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2\u0026tag=1774332596"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:9068b8224f902247d20403d43f7bf66f4d6d202de2ac3f80a46d8211e42e5564_ppc64le",
"product": {
"name": "registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:9068b8224f902247d20403d43f7bf66f4d6d202de2ac3f80a46d8211e42e5564_ppc64le",
"product_id": "registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:9068b8224f902247d20403d43f7bf66f4d6d202de2ac3f80a46d8211e42e5564_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/submariner-route-agent-rhel9@sha256%3A9068b8224f902247d20403d43f7bf66f4d6d202de2ac3f80a46d8211e42e5564?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2\u0026tag=1774550357"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:c9770153fe0b62c88b947de715ba5867af88c51ad65ec63d319be5a77dcc5c32_s390x",
"product": {
"name": "registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:c9770153fe0b62c88b947de715ba5867af88c51ad65ec63d319be5a77dcc5c32_s390x",
"product_id": "registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:c9770153fe0b62c88b947de715ba5867af88c51ad65ec63d319be5a77dcc5c32_s390x",
"product_identification_helper": {
"purl": "pkg:oci/lighthouse-agent-rhel9@sha256%3Ac9770153fe0b62c88b947de715ba5867af88c51ad65ec63d319be5a77dcc5c32?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2\u0026tag=1774084104"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:7ee76ee6dd4a832fccaca245b0f71def3736d90e37476281c273d081234747a2_s390x",
"product": {
"name": "registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:7ee76ee6dd4a832fccaca245b0f71def3736d90e37476281c273d081234747a2_s390x",
"product_id": "registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:7ee76ee6dd4a832fccaca245b0f71def3736d90e37476281c273d081234747a2_s390x",
"product_identification_helper": {
"purl": "pkg:oci/lighthouse-coredns-rhel9@sha256%3A7ee76ee6dd4a832fccaca245b0f71def3736d90e37476281c273d081234747a2?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2\u0026tag=1774086225"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhacm2/nettest-rhel9@sha256:a34e02a2aa68bdad0e1d2aba40bfc782b1b5b9d2b0bc7c9fd391af7417a454a0_s390x",
"product": {
"name": "registry.redhat.io/rhacm2/nettest-rhel9@sha256:a34e02a2aa68bdad0e1d2aba40bfc782b1b5b9d2b0bc7c9fd391af7417a454a0_s390x",
"product_id": "registry.redhat.io/rhacm2/nettest-rhel9@sha256:a34e02a2aa68bdad0e1d2aba40bfc782b1b5b9d2b0bc7c9fd391af7417a454a0_s390x",
"product_identification_helper": {
"purl": "pkg:oci/nettest-rhel9@sha256%3Aa34e02a2aa68bdad0e1d2aba40bfc782b1b5b9d2b0bc7c9fd391af7417a454a0?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2\u0026tag=1774372741"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhacm2/subctl-rhel9@sha256:9f29e3a800b04a0d188957d8f9ca35c85c39107c29fdf97b5b9ba15bbec4cc29_s390x",
"product": {
"name": "registry.redhat.io/rhacm2/subctl-rhel9@sha256:9f29e3a800b04a0d188957d8f9ca35c85c39107c29fdf97b5b9ba15bbec4cc29_s390x",
"product_id": "registry.redhat.io/rhacm2/subctl-rhel9@sha256:9f29e3a800b04a0d188957d8f9ca35c85c39107c29fdf97b5b9ba15bbec4cc29_s390x",
"product_identification_helper": {
"purl": "pkg:oci/subctl-rhel9@sha256%3A9f29e3a800b04a0d188957d8f9ca35c85c39107c29fdf97b5b9ba15bbec4cc29?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2\u0026tag=1774085848"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:d85a0d45300376bd1ba2b272d13c65fa957bf0f78a9ae50dff27eb0d5ce95735_s390x",
"product": {
"name": "registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:d85a0d45300376bd1ba2b272d13c65fa957bf0f78a9ae50dff27eb0d5ce95735_s390x",
"product_id": "registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:d85a0d45300376bd1ba2b272d13c65fa957bf0f78a9ae50dff27eb0d5ce95735_s390x",
"product_identification_helper": {
"purl": "pkg:oci/submariner-gateway-rhel9@sha256%3Ad85a0d45300376bd1ba2b272d13c65fa957bf0f78a9ae50dff27eb0d5ce95735?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2\u0026tag=1774550350"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:93a516a33793b18899586982bbf5b3d741cd8fc6d3285972cc014f823ca75a0d_s390x",
"product": {
"name": "registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:93a516a33793b18899586982bbf5b3d741cd8fc6d3285972cc014f823ca75a0d_s390x",
"product_id": "registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:93a516a33793b18899586982bbf5b3d741cd8fc6d3285972cc014f823ca75a0d_s390x",
"product_identification_helper": {
"purl": "pkg:oci/submariner-globalnet-rhel9@sha256%3A93a516a33793b18899586982bbf5b3d741cd8fc6d3285972cc014f823ca75a0d?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2\u0026tag=1774550347"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:4185f61ee8a0deb08e41e1c51753cdb6c6068c421c8e3dda7f1a86f67ab4fed3_s390x",
"product": {
"name": "registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:4185f61ee8a0deb08e41e1c51753cdb6c6068c421c8e3dda7f1a86f67ab4fed3_s390x",
"product_id": "registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:4185f61ee8a0deb08e41e1c51753cdb6c6068c421c8e3dda7f1a86f67ab4fed3_s390x",
"product_identification_helper": {
"purl": "pkg:oci/submariner-rhel9-operator@sha256%3A4185f61ee8a0deb08e41e1c51753cdb6c6068c421c8e3dda7f1a86f67ab4fed3?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2\u0026tag=1774332596"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:5ae8ef0d436d6e1d61d2b444a41639d5c98dfe468308d42710aa9a62e5f8fc2b_s390x",
"product": {
"name": "registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:5ae8ef0d436d6e1d61d2b444a41639d5c98dfe468308d42710aa9a62e5f8fc2b_s390x",
"product_id": "registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:5ae8ef0d436d6e1d61d2b444a41639d5c98dfe468308d42710aa9a62e5f8fc2b_s390x",
"product_identification_helper": {
"purl": "pkg:oci/submariner-route-agent-rhel9@sha256%3A5ae8ef0d436d6e1d61d2b444a41639d5c98dfe468308d42710aa9a62e5f8fc2b?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2\u0026tag=1774550357"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:d3d6fc310945928456e59f5fc04d149af2729d13c27f7c980876d8709e2ce864_arm64",
"product": {
"name": "registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:d3d6fc310945928456e59f5fc04d149af2729d13c27f7c980876d8709e2ce864_arm64",
"product_id": "registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:d3d6fc310945928456e59f5fc04d149af2729d13c27f7c980876d8709e2ce864_arm64",
"product_identification_helper": {
"purl": "pkg:oci/lighthouse-agent-rhel9@sha256%3Ad3d6fc310945928456e59f5fc04d149af2729d13c27f7c980876d8709e2ce864?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2\u0026tag=1774084104"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:8b17116d4d52c8ab22a72d9c3ff5e2b0820cc0be99ccc405c4d69a3f7ef933bf_arm64",
"product": {
"name": "registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:8b17116d4d52c8ab22a72d9c3ff5e2b0820cc0be99ccc405c4d69a3f7ef933bf_arm64",
"product_id": "registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:8b17116d4d52c8ab22a72d9c3ff5e2b0820cc0be99ccc405c4d69a3f7ef933bf_arm64",
"product_identification_helper": {
"purl": "pkg:oci/lighthouse-coredns-rhel9@sha256%3A8b17116d4d52c8ab22a72d9c3ff5e2b0820cc0be99ccc405c4d69a3f7ef933bf?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2\u0026tag=1774086225"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhacm2/nettest-rhel9@sha256:00b683c6d8a62a7057f64700526ef5f9eb10dec3809ee1c6d6abda6f76dd79fd_arm64",
"product": {
"name": "registry.redhat.io/rhacm2/nettest-rhel9@sha256:00b683c6d8a62a7057f64700526ef5f9eb10dec3809ee1c6d6abda6f76dd79fd_arm64",
"product_id": "registry.redhat.io/rhacm2/nettest-rhel9@sha256:00b683c6d8a62a7057f64700526ef5f9eb10dec3809ee1c6d6abda6f76dd79fd_arm64",
"product_identification_helper": {
"purl": "pkg:oci/nettest-rhel9@sha256%3A00b683c6d8a62a7057f64700526ef5f9eb10dec3809ee1c6d6abda6f76dd79fd?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2\u0026tag=1774372741"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhacm2/subctl-rhel9@sha256:6ceaac04b5db279336bdefa462ae02a84e631151315cb6fc657709b72671babf_arm64",
"product": {
"name": "registry.redhat.io/rhacm2/subctl-rhel9@sha256:6ceaac04b5db279336bdefa462ae02a84e631151315cb6fc657709b72671babf_arm64",
"product_id": "registry.redhat.io/rhacm2/subctl-rhel9@sha256:6ceaac04b5db279336bdefa462ae02a84e631151315cb6fc657709b72671babf_arm64",
"product_identification_helper": {
"purl": "pkg:oci/subctl-rhel9@sha256%3A6ceaac04b5db279336bdefa462ae02a84e631151315cb6fc657709b72671babf?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2\u0026tag=1774085848"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:c153b1c35cf9aa01c416e7d3dd90b89363715544544c09802039a7629f721c42_arm64",
"product": {
"name": "registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:c153b1c35cf9aa01c416e7d3dd90b89363715544544c09802039a7629f721c42_arm64",
"product_id": "registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:c153b1c35cf9aa01c416e7d3dd90b89363715544544c09802039a7629f721c42_arm64",
"product_identification_helper": {
"purl": "pkg:oci/submariner-gateway-rhel9@sha256%3Ac153b1c35cf9aa01c416e7d3dd90b89363715544544c09802039a7629f721c42?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2\u0026tag=1774550350"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:eedb220436102065b61787715d917459d01e4494a15dffb90474882e8f3086b9_arm64",
"product": {
"name": "registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:eedb220436102065b61787715d917459d01e4494a15dffb90474882e8f3086b9_arm64",
"product_id": "registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:eedb220436102065b61787715d917459d01e4494a15dffb90474882e8f3086b9_arm64",
"product_identification_helper": {
"purl": "pkg:oci/submariner-globalnet-rhel9@sha256%3Aeedb220436102065b61787715d917459d01e4494a15dffb90474882e8f3086b9?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2\u0026tag=1774550347"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:0d5f60990dd0863cb501bff5f7b94b979bea3f4ef05e07eb825228dfb3de3248_arm64",
"product": {
"name": "registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:0d5f60990dd0863cb501bff5f7b94b979bea3f4ef05e07eb825228dfb3de3248_arm64",
"product_id": "registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:0d5f60990dd0863cb501bff5f7b94b979bea3f4ef05e07eb825228dfb3de3248_arm64",
"product_identification_helper": {
"purl": "pkg:oci/submariner-rhel9-operator@sha256%3A0d5f60990dd0863cb501bff5f7b94b979bea3f4ef05e07eb825228dfb3de3248?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2\u0026tag=1774332596"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:09eb5fdd7c085c63b62fb3eb222e6d03ef88d43e56a12440626a10d908086ff7_arm64",
"product": {
"name": "registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:09eb5fdd7c085c63b62fb3eb222e6d03ef88d43e56a12440626a10d908086ff7_arm64",
"product_id": "registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:09eb5fdd7c085c63b62fb3eb222e6d03ef88d43e56a12440626a10d908086ff7_arm64",
"product_identification_helper": {
"purl": "pkg:oci/submariner-route-agent-rhel9@sha256%3A09eb5fdd7c085c63b62fb3eb222e6d03ef88d43e56a12440626a10d908086ff7?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2\u0026tag=1774550357"
}
}
}
],
"category": "architecture",
"name": "arm64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:3a7d7ad6a28416cd4479b5cf1508067e10ce342f01c7bb4aa3676abbd9f43a4a_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.15",
"product_id": "Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:3a7d7ad6a28416cd4479b5cf1508067e10ce342f01c7bb4aa3676abbd9f43a4a_ppc64le"
},
"product_reference": "registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:3a7d7ad6a28416cd4479b5cf1508067e10ce342f01c7bb4aa3676abbd9f43a4a_ppc64le",
"relates_to_product_reference": "Red Hat Advanced Cluster Management for Kubernetes 2.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:b54f4ec7c1e1f45077ad840b6ddbe3388b640f3acc8b29f68ff59547805ee64d_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.15",
"product_id": "Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:b54f4ec7c1e1f45077ad840b6ddbe3388b640f3acc8b29f68ff59547805ee64d_amd64"
},
"product_reference": "registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:b54f4ec7c1e1f45077ad840b6ddbe3388b640f3acc8b29f68ff59547805ee64d_amd64",
"relates_to_product_reference": "Red Hat Advanced Cluster Management for Kubernetes 2.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:c9770153fe0b62c88b947de715ba5867af88c51ad65ec63d319be5a77dcc5c32_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.15",
"product_id": "Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:c9770153fe0b62c88b947de715ba5867af88c51ad65ec63d319be5a77dcc5c32_s390x"
},
"product_reference": "registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:c9770153fe0b62c88b947de715ba5867af88c51ad65ec63d319be5a77dcc5c32_s390x",
"relates_to_product_reference": "Red Hat Advanced Cluster Management for Kubernetes 2.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:d3d6fc310945928456e59f5fc04d149af2729d13c27f7c980876d8709e2ce864_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.15",
"product_id": "Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:d3d6fc310945928456e59f5fc04d149af2729d13c27f7c980876d8709e2ce864_arm64"
},
"product_reference": "registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:d3d6fc310945928456e59f5fc04d149af2729d13c27f7c980876d8709e2ce864_arm64",
"relates_to_product_reference": "Red Hat Advanced Cluster Management for Kubernetes 2.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:251df7bb1820fed1c75e7b5dd14ed2d12a9bf2f3b74c87f6a0027ebf0641d4e5_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.15",
"product_id": "Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:251df7bb1820fed1c75e7b5dd14ed2d12a9bf2f3b74c87f6a0027ebf0641d4e5_ppc64le"
},
"product_reference": "registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:251df7bb1820fed1c75e7b5dd14ed2d12a9bf2f3b74c87f6a0027ebf0641d4e5_ppc64le",
"relates_to_product_reference": "Red Hat Advanced Cluster Management for Kubernetes 2.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:7ee76ee6dd4a832fccaca245b0f71def3736d90e37476281c273d081234747a2_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.15",
"product_id": "Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:7ee76ee6dd4a832fccaca245b0f71def3736d90e37476281c273d081234747a2_s390x"
},
"product_reference": "registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:7ee76ee6dd4a832fccaca245b0f71def3736d90e37476281c273d081234747a2_s390x",
"relates_to_product_reference": "Red Hat Advanced Cluster Management for Kubernetes 2.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:8b17116d4d52c8ab22a72d9c3ff5e2b0820cc0be99ccc405c4d69a3f7ef933bf_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.15",
"product_id": "Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:8b17116d4d52c8ab22a72d9c3ff5e2b0820cc0be99ccc405c4d69a3f7ef933bf_arm64"
},
"product_reference": "registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:8b17116d4d52c8ab22a72d9c3ff5e2b0820cc0be99ccc405c4d69a3f7ef933bf_arm64",
"relates_to_product_reference": "Red Hat Advanced Cluster Management for Kubernetes 2.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:db1083469ea0c8bf20c10252f4e5f500dd38daca85a996e834f866f9618c3e95_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.15",
"product_id": "Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:db1083469ea0c8bf20c10252f4e5f500dd38daca85a996e834f866f9618c3e95_amd64"
},
"product_reference": "registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:db1083469ea0c8bf20c10252f4e5f500dd38daca85a996e834f866f9618c3e95_amd64",
"relates_to_product_reference": "Red Hat Advanced Cluster Management for Kubernetes 2.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhacm2/nettest-rhel9@sha256:00b683c6d8a62a7057f64700526ef5f9eb10dec3809ee1c6d6abda6f76dd79fd_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.15",
"product_id": "Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:00b683c6d8a62a7057f64700526ef5f9eb10dec3809ee1c6d6abda6f76dd79fd_arm64"
},
"product_reference": "registry.redhat.io/rhacm2/nettest-rhel9@sha256:00b683c6d8a62a7057f64700526ef5f9eb10dec3809ee1c6d6abda6f76dd79fd_arm64",
"relates_to_product_reference": "Red Hat Advanced Cluster Management for Kubernetes 2.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhacm2/nettest-rhel9@sha256:3780b6e2fa5c3c0328a161d6328ed828879c5bdb38cc2ab451366b60ffa5b043_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.15",
"product_id": "Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:3780b6e2fa5c3c0328a161d6328ed828879c5bdb38cc2ab451366b60ffa5b043_amd64"
},
"product_reference": "registry.redhat.io/rhacm2/nettest-rhel9@sha256:3780b6e2fa5c3c0328a161d6328ed828879c5bdb38cc2ab451366b60ffa5b043_amd64",
"relates_to_product_reference": "Red Hat Advanced Cluster Management for Kubernetes 2.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhacm2/nettest-rhel9@sha256:6c394c6c6de11664040b84bbdbe2ae8222bece13e36460774ab3c41fc92f932e_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.15",
"product_id": "Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:6c394c6c6de11664040b84bbdbe2ae8222bece13e36460774ab3c41fc92f932e_ppc64le"
},
"product_reference": "registry.redhat.io/rhacm2/nettest-rhel9@sha256:6c394c6c6de11664040b84bbdbe2ae8222bece13e36460774ab3c41fc92f932e_ppc64le",
"relates_to_product_reference": "Red Hat Advanced Cluster Management for Kubernetes 2.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhacm2/nettest-rhel9@sha256:a34e02a2aa68bdad0e1d2aba40bfc782b1b5b9d2b0bc7c9fd391af7417a454a0_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.15",
"product_id": "Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:a34e02a2aa68bdad0e1d2aba40bfc782b1b5b9d2b0bc7c9fd391af7417a454a0_s390x"
},
"product_reference": "registry.redhat.io/rhacm2/nettest-rhel9@sha256:a34e02a2aa68bdad0e1d2aba40bfc782b1b5b9d2b0bc7c9fd391af7417a454a0_s390x",
"relates_to_product_reference": "Red Hat Advanced Cluster Management for Kubernetes 2.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhacm2/subctl-rhel9@sha256:613ec029444a86d5510c67551d9b346379413f79064b4a406f8e4ad10b71f5a0_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.15",
"product_id": "Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:613ec029444a86d5510c67551d9b346379413f79064b4a406f8e4ad10b71f5a0_amd64"
},
"product_reference": "registry.redhat.io/rhacm2/subctl-rhel9@sha256:613ec029444a86d5510c67551d9b346379413f79064b4a406f8e4ad10b71f5a0_amd64",
"relates_to_product_reference": "Red Hat Advanced Cluster Management for Kubernetes 2.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhacm2/subctl-rhel9@sha256:6ceaac04b5db279336bdefa462ae02a84e631151315cb6fc657709b72671babf_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.15",
"product_id": "Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:6ceaac04b5db279336bdefa462ae02a84e631151315cb6fc657709b72671babf_arm64"
},
"product_reference": "registry.redhat.io/rhacm2/subctl-rhel9@sha256:6ceaac04b5db279336bdefa462ae02a84e631151315cb6fc657709b72671babf_arm64",
"relates_to_product_reference": "Red Hat Advanced Cluster Management for Kubernetes 2.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhacm2/subctl-rhel9@sha256:9f29e3a800b04a0d188957d8f9ca35c85c39107c29fdf97b5b9ba15bbec4cc29_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.15",
"product_id": "Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:9f29e3a800b04a0d188957d8f9ca35c85c39107c29fdf97b5b9ba15bbec4cc29_s390x"
},
"product_reference": "registry.redhat.io/rhacm2/subctl-rhel9@sha256:9f29e3a800b04a0d188957d8f9ca35c85c39107c29fdf97b5b9ba15bbec4cc29_s390x",
"relates_to_product_reference": "Red Hat Advanced Cluster Management for Kubernetes 2.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhacm2/subctl-rhel9@sha256:d061e9013521b8b7fe281176926e8b4684fddded2bf166906d8fa5d15ac9da32_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.15",
"product_id": "Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:d061e9013521b8b7fe281176926e8b4684fddded2bf166906d8fa5d15ac9da32_ppc64le"
},
"product_reference": "registry.redhat.io/rhacm2/subctl-rhel9@sha256:d061e9013521b8b7fe281176926e8b4684fddded2bf166906d8fa5d15ac9da32_ppc64le",
"relates_to_product_reference": "Red Hat Advanced Cluster Management for Kubernetes 2.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:1294c67c44cd5ecde081e35432874b6cabdcd17252f9dfc773eb5158213550e7_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.15",
"product_id": "Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:1294c67c44cd5ecde081e35432874b6cabdcd17252f9dfc773eb5158213550e7_amd64"
},
"product_reference": "registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:1294c67c44cd5ecde081e35432874b6cabdcd17252f9dfc773eb5158213550e7_amd64",
"relates_to_product_reference": "Red Hat Advanced Cluster Management for Kubernetes 2.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:1823cb53424d92094ff3b1a151501771c5886b25bba4bab79197ad6fd32304ef_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.15",
"product_id": "Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:1823cb53424d92094ff3b1a151501771c5886b25bba4bab79197ad6fd32304ef_ppc64le"
},
"product_reference": "registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:1823cb53424d92094ff3b1a151501771c5886b25bba4bab79197ad6fd32304ef_ppc64le",
"relates_to_product_reference": "Red Hat Advanced Cluster Management for Kubernetes 2.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:c153b1c35cf9aa01c416e7d3dd90b89363715544544c09802039a7629f721c42_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.15",
"product_id": "Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:c153b1c35cf9aa01c416e7d3dd90b89363715544544c09802039a7629f721c42_arm64"
},
"product_reference": "registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:c153b1c35cf9aa01c416e7d3dd90b89363715544544c09802039a7629f721c42_arm64",
"relates_to_product_reference": "Red Hat Advanced Cluster Management for Kubernetes 2.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:d85a0d45300376bd1ba2b272d13c65fa957bf0f78a9ae50dff27eb0d5ce95735_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.15",
"product_id": "Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:d85a0d45300376bd1ba2b272d13c65fa957bf0f78a9ae50dff27eb0d5ce95735_s390x"
},
"product_reference": "registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:d85a0d45300376bd1ba2b272d13c65fa957bf0f78a9ae50dff27eb0d5ce95735_s390x",
"relates_to_product_reference": "Red Hat Advanced Cluster Management for Kubernetes 2.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:5f8f4618887f2176dc24bbf6419112f85a68e58d49ff47cb1bbd198f2e148d9d_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.15",
"product_id": "Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:5f8f4618887f2176dc24bbf6419112f85a68e58d49ff47cb1bbd198f2e148d9d_amd64"
},
"product_reference": "registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:5f8f4618887f2176dc24bbf6419112f85a68e58d49ff47cb1bbd198f2e148d9d_amd64",
"relates_to_product_reference": "Red Hat Advanced Cluster Management for Kubernetes 2.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:93a516a33793b18899586982bbf5b3d741cd8fc6d3285972cc014f823ca75a0d_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.15",
"product_id": "Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:93a516a33793b18899586982bbf5b3d741cd8fc6d3285972cc014f823ca75a0d_s390x"
},
"product_reference": "registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:93a516a33793b18899586982bbf5b3d741cd8fc6d3285972cc014f823ca75a0d_s390x",
"relates_to_product_reference": "Red Hat Advanced Cluster Management for Kubernetes 2.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:e3090d6f0a2ca71edf606ca49cafa063ac9ff3122f0d377ed9f25a37151d6fb0_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.15",
"product_id": "Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:e3090d6f0a2ca71edf606ca49cafa063ac9ff3122f0d377ed9f25a37151d6fb0_ppc64le"
},
"product_reference": "registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:e3090d6f0a2ca71edf606ca49cafa063ac9ff3122f0d377ed9f25a37151d6fb0_ppc64le",
"relates_to_product_reference": "Red Hat Advanced Cluster Management for Kubernetes 2.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:eedb220436102065b61787715d917459d01e4494a15dffb90474882e8f3086b9_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.15",
"product_id": "Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:eedb220436102065b61787715d917459d01e4494a15dffb90474882e8f3086b9_arm64"
},
"product_reference": "registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:eedb220436102065b61787715d917459d01e4494a15dffb90474882e8f3086b9_arm64",
"relates_to_product_reference": "Red Hat Advanced Cluster Management for Kubernetes 2.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhacm2/submariner-operator-bundle@sha256:39088cefc6419019cd9d83bf2f717634fcd01d9befd37b8342553956fae5dd5f_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.15",
"product_id": "Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-operator-bundle@sha256:39088cefc6419019cd9d83bf2f717634fcd01d9befd37b8342553956fae5dd5f_amd64"
},
"product_reference": "registry.redhat.io/rhacm2/submariner-operator-bundle@sha256:39088cefc6419019cd9d83bf2f717634fcd01d9befd37b8342553956fae5dd5f_amd64",
"relates_to_product_reference": "Red Hat Advanced Cluster Management for Kubernetes 2.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:0d5f60990dd0863cb501bff5f7b94b979bea3f4ef05e07eb825228dfb3de3248_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.15",
"product_id": "Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:0d5f60990dd0863cb501bff5f7b94b979bea3f4ef05e07eb825228dfb3de3248_arm64"
},
"product_reference": "registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:0d5f60990dd0863cb501bff5f7b94b979bea3f4ef05e07eb825228dfb3de3248_arm64",
"relates_to_product_reference": "Red Hat Advanced Cluster Management for Kubernetes 2.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:3a481555d5376183a2ee392c409739417d5778e2c0559472f9070ccfe2918e2c_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.15",
"product_id": "Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:3a481555d5376183a2ee392c409739417d5778e2c0559472f9070ccfe2918e2c_amd64"
},
"product_reference": "registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:3a481555d5376183a2ee392c409739417d5778e2c0559472f9070ccfe2918e2c_amd64",
"relates_to_product_reference": "Red Hat Advanced Cluster Management for Kubernetes 2.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:4185f61ee8a0deb08e41e1c51753cdb6c6068c421c8e3dda7f1a86f67ab4fed3_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.15",
"product_id": "Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:4185f61ee8a0deb08e41e1c51753cdb6c6068c421c8e3dda7f1a86f67ab4fed3_s390x"
},
"product_reference": "registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:4185f61ee8a0deb08e41e1c51753cdb6c6068c421c8e3dda7f1a86f67ab4fed3_s390x",
"relates_to_product_reference": "Red Hat Advanced Cluster Management for Kubernetes 2.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:5b5f6ffba68d27f81bb5c26e4fb83d80a4b72523110e622d764f9337d1cb4826_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.15",
"product_id": "Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:5b5f6ffba68d27f81bb5c26e4fb83d80a4b72523110e622d764f9337d1cb4826_ppc64le"
},
"product_reference": "registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:5b5f6ffba68d27f81bb5c26e4fb83d80a4b72523110e622d764f9337d1cb4826_ppc64le",
"relates_to_product_reference": "Red Hat Advanced Cluster Management for Kubernetes 2.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:09eb5fdd7c085c63b62fb3eb222e6d03ef88d43e56a12440626a10d908086ff7_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.15",
"product_id": "Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:09eb5fdd7c085c63b62fb3eb222e6d03ef88d43e56a12440626a10d908086ff7_arm64"
},
"product_reference": "registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:09eb5fdd7c085c63b62fb3eb222e6d03ef88d43e56a12440626a10d908086ff7_arm64",
"relates_to_product_reference": "Red Hat Advanced Cluster Management for Kubernetes 2.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:5ae8ef0d436d6e1d61d2b444a41639d5c98dfe468308d42710aa9a62e5f8fc2b_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.15",
"product_id": "Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:5ae8ef0d436d6e1d61d2b444a41639d5c98dfe468308d42710aa9a62e5f8fc2b_s390x"
},
"product_reference": "registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:5ae8ef0d436d6e1d61d2b444a41639d5c98dfe468308d42710aa9a62e5f8fc2b_s390x",
"relates_to_product_reference": "Red Hat Advanced Cluster Management for Kubernetes 2.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:9068b8224f902247d20403d43f7bf66f4d6d202de2ac3f80a46d8211e42e5564_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.15",
"product_id": "Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:9068b8224f902247d20403d43f7bf66f4d6d202de2ac3f80a46d8211e42e5564_ppc64le"
},
"product_reference": "registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:9068b8224f902247d20403d43f7bf66f4d6d202de2ac3f80a46d8211e42e5564_ppc64le",
"relates_to_product_reference": "Red Hat Advanced Cluster Management for Kubernetes 2.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:ff86bbf817bfc8450074d2ee2e8e55f6e500e7f23d12e3e1ef949cb49acb5e32_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.15",
"product_id": "Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:ff86bbf817bfc8450074d2ee2e8e55f6e500e7f23d12e3e1ef949cb49acb5e32_amd64"
},
"product_reference": "registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:ff86bbf817bfc8450074d2ee2e8e55f6e500e7f23d12e3e1ef949cb49acb5e32_amd64",
"relates_to_product_reference": "Red Hat Advanced Cluster Management for Kubernetes 2.15"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61726",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:42.791305+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:00b683c6d8a62a7057f64700526ef5f9eb10dec3809ee1c6d6abda6f76dd79fd_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:3780b6e2fa5c3c0328a161d6328ed828879c5bdb38cc2ab451366b60ffa5b043_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:6c394c6c6de11664040b84bbdbe2ae8222bece13e36460774ab3c41fc92f932e_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:a34e02a2aa68bdad0e1d2aba40bfc782b1b5b9d2b0bc7c9fd391af7417a454a0_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-operator-bundle@sha256:39088cefc6419019cd9d83bf2f717634fcd01d9befd37b8342553956fae5dd5f_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434432"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the net/url package in the Go standard library. The package does not enforce a limit on the number of unique query parameters it parses. A Go application using the net/http.Request.ParseForm method will try to process all parameters provided in the request. A specially crafted HTTP request containing a massive number of query parameters will cause the application to consume an excessive amount of memory, eventually causing the application to crash or become unresponsive, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/url: Memory exhaustion in query parameter parsing in net/url",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker must be able to send a specially crafted HTTP request to an application parsing URL-encoded forms with net/url, specifically a request containing a large number of unique query parameters. The request will cause the application to consume an excessive amount of memory and eventually result in a denial of service, with no impact to confidentiality or integrity. Due to this reason, this vulnerability has been rated with an important severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:3a7d7ad6a28416cd4479b5cf1508067e10ce342f01c7bb4aa3676abbd9f43a4a_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:b54f4ec7c1e1f45077ad840b6ddbe3388b640f3acc8b29f68ff59547805ee64d_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:c9770153fe0b62c88b947de715ba5867af88c51ad65ec63d319be5a77dcc5c32_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:d3d6fc310945928456e59f5fc04d149af2729d13c27f7c980876d8709e2ce864_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:251df7bb1820fed1c75e7b5dd14ed2d12a9bf2f3b74c87f6a0027ebf0641d4e5_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:7ee76ee6dd4a832fccaca245b0f71def3736d90e37476281c273d081234747a2_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:8b17116d4d52c8ab22a72d9c3ff5e2b0820cc0be99ccc405c4d69a3f7ef933bf_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:db1083469ea0c8bf20c10252f4e5f500dd38daca85a996e834f866f9618c3e95_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:613ec029444a86d5510c67551d9b346379413f79064b4a406f8e4ad10b71f5a0_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:6ceaac04b5db279336bdefa462ae02a84e631151315cb6fc657709b72671babf_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:9f29e3a800b04a0d188957d8f9ca35c85c39107c29fdf97b5b9ba15bbec4cc29_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:d061e9013521b8b7fe281176926e8b4684fddded2bf166906d8fa5d15ac9da32_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:1294c67c44cd5ecde081e35432874b6cabdcd17252f9dfc773eb5158213550e7_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:1823cb53424d92094ff3b1a151501771c5886b25bba4bab79197ad6fd32304ef_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:c153b1c35cf9aa01c416e7d3dd90b89363715544544c09802039a7629f721c42_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:d85a0d45300376bd1ba2b272d13c65fa957bf0f78a9ae50dff27eb0d5ce95735_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:5f8f4618887f2176dc24bbf6419112f85a68e58d49ff47cb1bbd198f2e148d9d_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:93a516a33793b18899586982bbf5b3d741cd8fc6d3285972cc014f823ca75a0d_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:e3090d6f0a2ca71edf606ca49cafa063ac9ff3122f0d377ed9f25a37151d6fb0_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:eedb220436102065b61787715d917459d01e4494a15dffb90474882e8f3086b9_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:0d5f60990dd0863cb501bff5f7b94b979bea3f4ef05e07eb825228dfb3de3248_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:3a481555d5376183a2ee392c409739417d5778e2c0559472f9070ccfe2918e2c_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:4185f61ee8a0deb08e41e1c51753cdb6c6068c421c8e3dda7f1a86f67ab4fed3_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:5b5f6ffba68d27f81bb5c26e4fb83d80a4b72523110e622d764f9337d1cb4826_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:09eb5fdd7c085c63b62fb3eb222e6d03ef88d43e56a12440626a10d908086ff7_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:5ae8ef0d436d6e1d61d2b444a41639d5c98dfe468308d42710aa9a62e5f8fc2b_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:9068b8224f902247d20403d43f7bf66f4d6d202de2ac3f80a46d8211e42e5564_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:ff86bbf817bfc8450074d2ee2e8e55f6e500e7f23d12e3e1ef949cb49acb5e32_amd64"
],
"known_not_affected": [
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:00b683c6d8a62a7057f64700526ef5f9eb10dec3809ee1c6d6abda6f76dd79fd_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:3780b6e2fa5c3c0328a161d6328ed828879c5bdb38cc2ab451366b60ffa5b043_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:6c394c6c6de11664040b84bbdbe2ae8222bece13e36460774ab3c41fc92f932e_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:a34e02a2aa68bdad0e1d2aba40bfc782b1b5b9d2b0bc7c9fd391af7417a454a0_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-operator-bundle@sha256:39088cefc6419019cd9d83bf2f717634fcd01d9befd37b8342553956fae5dd5f_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "RHBZ#2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"category": "external",
"summary": "https://go.dev/cl/736712",
"url": "https://go.dev/cl/736712"
},
{
"category": "external",
"summary": "https://go.dev/issue/77101",
"url": "https://go.dev/issue/77101"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4341",
"url": "https://pkg.go.dev/vuln/GO-2026-4341"
}
],
"release_date": "2026-01-28T19:30:31.215000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-14T15:55:27+00:00",
"details": "For release note details, see the upstream Submariner release notes:\n\nhttps://submariner.io/community/releases/\n\nDownstream-specific issues resolved:\n* ACM-28330\n* ACM-28332\n* ACM-28334\n* ACM-28336\n* ACM-28338\n* ACM-28340\n* ACM-28343\n* ACM-29328\n* ACM-29512\n* ACM-29661\n* ACM-29662\n* ACM-29681\n* ACM-29682\n* ACM-29683\n* ACM-29684\n* ACM-29777\n* ACM-29801\n* ACM-30135\n* ACM-30730\n* ACM-30731\n* ACM-31135\n* ACM-31137\n* ACM-31861\n* ACM-31872\n* ACM-31874\n* ACM-23783\n* ACM-24731\n* ACM-24797\n* ACM-25518\n* ACM-26321\n* ACM-26965\n* ACM-27273\n* ACM-28917\n* ACM-30321\n* ACM-30640\n* ACM-30970\n* ACM-8640\n\nFor more details, see the Red Hat Advanced Cluster Management for Kubernetes documentation:\n\nhttps://docs.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.15/",
"product_ids": [
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:3a7d7ad6a28416cd4479b5cf1508067e10ce342f01c7bb4aa3676abbd9f43a4a_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:b54f4ec7c1e1f45077ad840b6ddbe3388b640f3acc8b29f68ff59547805ee64d_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:c9770153fe0b62c88b947de715ba5867af88c51ad65ec63d319be5a77dcc5c32_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:d3d6fc310945928456e59f5fc04d149af2729d13c27f7c980876d8709e2ce864_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:251df7bb1820fed1c75e7b5dd14ed2d12a9bf2f3b74c87f6a0027ebf0641d4e5_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:7ee76ee6dd4a832fccaca245b0f71def3736d90e37476281c273d081234747a2_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:8b17116d4d52c8ab22a72d9c3ff5e2b0820cc0be99ccc405c4d69a3f7ef933bf_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:db1083469ea0c8bf20c10252f4e5f500dd38daca85a996e834f866f9618c3e95_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:613ec029444a86d5510c67551d9b346379413f79064b4a406f8e4ad10b71f5a0_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:6ceaac04b5db279336bdefa462ae02a84e631151315cb6fc657709b72671babf_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:9f29e3a800b04a0d188957d8f9ca35c85c39107c29fdf97b5b9ba15bbec4cc29_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:d061e9013521b8b7fe281176926e8b4684fddded2bf166906d8fa5d15ac9da32_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:1294c67c44cd5ecde081e35432874b6cabdcd17252f9dfc773eb5158213550e7_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:1823cb53424d92094ff3b1a151501771c5886b25bba4bab79197ad6fd32304ef_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:c153b1c35cf9aa01c416e7d3dd90b89363715544544c09802039a7629f721c42_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:d85a0d45300376bd1ba2b272d13c65fa957bf0f78a9ae50dff27eb0d5ce95735_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:5f8f4618887f2176dc24bbf6419112f85a68e58d49ff47cb1bbd198f2e148d9d_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:93a516a33793b18899586982bbf5b3d741cd8fc6d3285972cc014f823ca75a0d_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:e3090d6f0a2ca71edf606ca49cafa063ac9ff3122f0d377ed9f25a37151d6fb0_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:eedb220436102065b61787715d917459d01e4494a15dffb90474882e8f3086b9_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:0d5f60990dd0863cb501bff5f7b94b979bea3f4ef05e07eb825228dfb3de3248_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:3a481555d5376183a2ee392c409739417d5778e2c0559472f9070ccfe2918e2c_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:4185f61ee8a0deb08e41e1c51753cdb6c6068c421c8e3dda7f1a86f67ab4fed3_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:5b5f6ffba68d27f81bb5c26e4fb83d80a4b72523110e622d764f9337d1cb4826_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:09eb5fdd7c085c63b62fb3eb222e6d03ef88d43e56a12440626a10d908086ff7_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:5ae8ef0d436d6e1d61d2b444a41639d5c98dfe468308d42710aa9a62e5f8fc2b_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:9068b8224f902247d20403d43f7bf66f4d6d202de2ac3f80a46d8211e42e5564_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:ff86bbf817bfc8450074d2ee2e8e55f6e500e7f23d12e3e1ef949cb49acb5e32_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8151"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:3a7d7ad6a28416cd4479b5cf1508067e10ce342f01c7bb4aa3676abbd9f43a4a_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:b54f4ec7c1e1f45077ad840b6ddbe3388b640f3acc8b29f68ff59547805ee64d_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:c9770153fe0b62c88b947de715ba5867af88c51ad65ec63d319be5a77dcc5c32_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:d3d6fc310945928456e59f5fc04d149af2729d13c27f7c980876d8709e2ce864_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:251df7bb1820fed1c75e7b5dd14ed2d12a9bf2f3b74c87f6a0027ebf0641d4e5_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:7ee76ee6dd4a832fccaca245b0f71def3736d90e37476281c273d081234747a2_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:8b17116d4d52c8ab22a72d9c3ff5e2b0820cc0be99ccc405c4d69a3f7ef933bf_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:db1083469ea0c8bf20c10252f4e5f500dd38daca85a996e834f866f9618c3e95_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:00b683c6d8a62a7057f64700526ef5f9eb10dec3809ee1c6d6abda6f76dd79fd_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:3780b6e2fa5c3c0328a161d6328ed828879c5bdb38cc2ab451366b60ffa5b043_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:6c394c6c6de11664040b84bbdbe2ae8222bece13e36460774ab3c41fc92f932e_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:a34e02a2aa68bdad0e1d2aba40bfc782b1b5b9d2b0bc7c9fd391af7417a454a0_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:613ec029444a86d5510c67551d9b346379413f79064b4a406f8e4ad10b71f5a0_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:6ceaac04b5db279336bdefa462ae02a84e631151315cb6fc657709b72671babf_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:9f29e3a800b04a0d188957d8f9ca35c85c39107c29fdf97b5b9ba15bbec4cc29_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:d061e9013521b8b7fe281176926e8b4684fddded2bf166906d8fa5d15ac9da32_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:1294c67c44cd5ecde081e35432874b6cabdcd17252f9dfc773eb5158213550e7_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:1823cb53424d92094ff3b1a151501771c5886b25bba4bab79197ad6fd32304ef_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:c153b1c35cf9aa01c416e7d3dd90b89363715544544c09802039a7629f721c42_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:d85a0d45300376bd1ba2b272d13c65fa957bf0f78a9ae50dff27eb0d5ce95735_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:5f8f4618887f2176dc24bbf6419112f85a68e58d49ff47cb1bbd198f2e148d9d_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:93a516a33793b18899586982bbf5b3d741cd8fc6d3285972cc014f823ca75a0d_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:e3090d6f0a2ca71edf606ca49cafa063ac9ff3122f0d377ed9f25a37151d6fb0_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:eedb220436102065b61787715d917459d01e4494a15dffb90474882e8f3086b9_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-operator-bundle@sha256:39088cefc6419019cd9d83bf2f717634fcd01d9befd37b8342553956fae5dd5f_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:0d5f60990dd0863cb501bff5f7b94b979bea3f4ef05e07eb825228dfb3de3248_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:3a481555d5376183a2ee392c409739417d5778e2c0559472f9070ccfe2918e2c_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:4185f61ee8a0deb08e41e1c51753cdb6c6068c421c8e3dda7f1a86f67ab4fed3_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:5b5f6ffba68d27f81bb5c26e4fb83d80a4b72523110e622d764f9337d1cb4826_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:09eb5fdd7c085c63b62fb3eb222e6d03ef88d43e56a12440626a10d908086ff7_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:5ae8ef0d436d6e1d61d2b444a41639d5c98dfe468308d42710aa9a62e5f8fc2b_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:9068b8224f902247d20403d43f7bf66f4d6d202de2ac3f80a46d8211e42e5564_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:ff86bbf817bfc8450074d2ee2e8e55f6e500e7f23d12e3e1ef949cb49acb5e32_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:3a7d7ad6a28416cd4479b5cf1508067e10ce342f01c7bb4aa3676abbd9f43a4a_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:b54f4ec7c1e1f45077ad840b6ddbe3388b640f3acc8b29f68ff59547805ee64d_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:c9770153fe0b62c88b947de715ba5867af88c51ad65ec63d319be5a77dcc5c32_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:d3d6fc310945928456e59f5fc04d149af2729d13c27f7c980876d8709e2ce864_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:251df7bb1820fed1c75e7b5dd14ed2d12a9bf2f3b74c87f6a0027ebf0641d4e5_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:7ee76ee6dd4a832fccaca245b0f71def3736d90e37476281c273d081234747a2_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:8b17116d4d52c8ab22a72d9c3ff5e2b0820cc0be99ccc405c4d69a3f7ef933bf_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:db1083469ea0c8bf20c10252f4e5f500dd38daca85a996e834f866f9618c3e95_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:00b683c6d8a62a7057f64700526ef5f9eb10dec3809ee1c6d6abda6f76dd79fd_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:3780b6e2fa5c3c0328a161d6328ed828879c5bdb38cc2ab451366b60ffa5b043_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:6c394c6c6de11664040b84bbdbe2ae8222bece13e36460774ab3c41fc92f932e_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:a34e02a2aa68bdad0e1d2aba40bfc782b1b5b9d2b0bc7c9fd391af7417a454a0_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:613ec029444a86d5510c67551d9b346379413f79064b4a406f8e4ad10b71f5a0_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:6ceaac04b5db279336bdefa462ae02a84e631151315cb6fc657709b72671babf_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:9f29e3a800b04a0d188957d8f9ca35c85c39107c29fdf97b5b9ba15bbec4cc29_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:d061e9013521b8b7fe281176926e8b4684fddded2bf166906d8fa5d15ac9da32_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:1294c67c44cd5ecde081e35432874b6cabdcd17252f9dfc773eb5158213550e7_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:1823cb53424d92094ff3b1a151501771c5886b25bba4bab79197ad6fd32304ef_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:c153b1c35cf9aa01c416e7d3dd90b89363715544544c09802039a7629f721c42_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:d85a0d45300376bd1ba2b272d13c65fa957bf0f78a9ae50dff27eb0d5ce95735_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:5f8f4618887f2176dc24bbf6419112f85a68e58d49ff47cb1bbd198f2e148d9d_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:93a516a33793b18899586982bbf5b3d741cd8fc6d3285972cc014f823ca75a0d_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:e3090d6f0a2ca71edf606ca49cafa063ac9ff3122f0d377ed9f25a37151d6fb0_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:eedb220436102065b61787715d917459d01e4494a15dffb90474882e8f3086b9_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-operator-bundle@sha256:39088cefc6419019cd9d83bf2f717634fcd01d9befd37b8342553956fae5dd5f_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:0d5f60990dd0863cb501bff5f7b94b979bea3f4ef05e07eb825228dfb3de3248_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:3a481555d5376183a2ee392c409739417d5778e2c0559472f9070ccfe2918e2c_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:4185f61ee8a0deb08e41e1c51753cdb6c6068c421c8e3dda7f1a86f67ab4fed3_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:5b5f6ffba68d27f81bb5c26e4fb83d80a4b72523110e622d764f9337d1cb4826_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:09eb5fdd7c085c63b62fb3eb222e6d03ef88d43e56a12440626a10d908086ff7_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:5ae8ef0d436d6e1d61d2b444a41639d5c98dfe468308d42710aa9a62e5f8fc2b_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:9068b8224f902247d20403d43f7bf66f4d6d202de2ac3f80a46d8211e42e5564_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:ff86bbf817bfc8450074d2ee2e8e55f6e500e7f23d12e3e1ef949cb49acb5e32_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: net/url: Memory exhaustion in query parameter parsing in net/url"
},
{
"cve": "CVE-2025-61728",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:39.965024+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:3a7d7ad6a28416cd4479b5cf1508067e10ce342f01c7bb4aa3676abbd9f43a4a_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:b54f4ec7c1e1f45077ad840b6ddbe3388b640f3acc8b29f68ff59547805ee64d_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:c9770153fe0b62c88b947de715ba5867af88c51ad65ec63d319be5a77dcc5c32_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:d3d6fc310945928456e59f5fc04d149af2729d13c27f7c980876d8709e2ce864_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:00b683c6d8a62a7057f64700526ef5f9eb10dec3809ee1c6d6abda6f76dd79fd_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:3780b6e2fa5c3c0328a161d6328ed828879c5bdb38cc2ab451366b60ffa5b043_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:6c394c6c6de11664040b84bbdbe2ae8222bece13e36460774ab3c41fc92f932e_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:a34e02a2aa68bdad0e1d2aba40bfc782b1b5b9d2b0bc7c9fd391af7417a454a0_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:613ec029444a86d5510c67551d9b346379413f79064b4a406f8e4ad10b71f5a0_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:6ceaac04b5db279336bdefa462ae02a84e631151315cb6fc657709b72671babf_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:9f29e3a800b04a0d188957d8f9ca35c85c39107c29fdf97b5b9ba15bbec4cc29_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:d061e9013521b8b7fe281176926e8b4684fddded2bf166906d8fa5d15ac9da32_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:1294c67c44cd5ecde081e35432874b6cabdcd17252f9dfc773eb5158213550e7_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:1823cb53424d92094ff3b1a151501771c5886b25bba4bab79197ad6fd32304ef_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:c153b1c35cf9aa01c416e7d3dd90b89363715544544c09802039a7629f721c42_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:d85a0d45300376bd1ba2b272d13c65fa957bf0f78a9ae50dff27eb0d5ce95735_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:5f8f4618887f2176dc24bbf6419112f85a68e58d49ff47cb1bbd198f2e148d9d_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:93a516a33793b18899586982bbf5b3d741cd8fc6d3285972cc014f823ca75a0d_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:e3090d6f0a2ca71edf606ca49cafa063ac9ff3122f0d377ed9f25a37151d6fb0_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:eedb220436102065b61787715d917459d01e4494a15dffb90474882e8f3086b9_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-operator-bundle@sha256:39088cefc6419019cd9d83bf2f717634fcd01d9befd37b8342553956fae5dd5f_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:0d5f60990dd0863cb501bff5f7b94b979bea3f4ef05e07eb825228dfb3de3248_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:3a481555d5376183a2ee392c409739417d5778e2c0559472f9070ccfe2918e2c_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:4185f61ee8a0deb08e41e1c51753cdb6c6068c421c8e3dda7f1a86f67ab4fed3_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:5b5f6ffba68d27f81bb5c26e4fb83d80a4b72523110e622d764f9337d1cb4826_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:09eb5fdd7c085c63b62fb3eb222e6d03ef88d43e56a12440626a10d908086ff7_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:5ae8ef0d436d6e1d61d2b444a41639d5c98dfe468308d42710aa9a62e5f8fc2b_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:9068b8224f902247d20403d43f7bf66f4d6d202de2ac3f80a46d8211e42e5564_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:ff86bbf817bfc8450074d2ee2e8e55f6e500e7f23d12e3e1ef949cb49acb5e32_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434431"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the archive/zip package in the Go standard library. A super-linear file name indexing algorithm is used in the first time a file in an archive is opened. A crafted zip archive containing a specific arrangement of file names can cause an excessive CPU and memory consumption. A Go application processing a malicious archive can become unresponsive or crash, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to be able to process a malicious zip archive with an application using the archive/zip package. Additionally, this vulnerability can cause a Go application to consume an excessive amount of CPU and memory, eventually resulting in a denial of service with no other security impact. Due to these reasons, this flaw has been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:251df7bb1820fed1c75e7b5dd14ed2d12a9bf2f3b74c87f6a0027ebf0641d4e5_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:7ee76ee6dd4a832fccaca245b0f71def3736d90e37476281c273d081234747a2_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:8b17116d4d52c8ab22a72d9c3ff5e2b0820cc0be99ccc405c4d69a3f7ef933bf_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:db1083469ea0c8bf20c10252f4e5f500dd38daca85a996e834f866f9618c3e95_amd64"
],
"known_not_affected": [
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:3a7d7ad6a28416cd4479b5cf1508067e10ce342f01c7bb4aa3676abbd9f43a4a_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:b54f4ec7c1e1f45077ad840b6ddbe3388b640f3acc8b29f68ff59547805ee64d_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:c9770153fe0b62c88b947de715ba5867af88c51ad65ec63d319be5a77dcc5c32_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:d3d6fc310945928456e59f5fc04d149af2729d13c27f7c980876d8709e2ce864_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:00b683c6d8a62a7057f64700526ef5f9eb10dec3809ee1c6d6abda6f76dd79fd_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:3780b6e2fa5c3c0328a161d6328ed828879c5bdb38cc2ab451366b60ffa5b043_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:6c394c6c6de11664040b84bbdbe2ae8222bece13e36460774ab3c41fc92f932e_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:a34e02a2aa68bdad0e1d2aba40bfc782b1b5b9d2b0bc7c9fd391af7417a454a0_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:613ec029444a86d5510c67551d9b346379413f79064b4a406f8e4ad10b71f5a0_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:6ceaac04b5db279336bdefa462ae02a84e631151315cb6fc657709b72671babf_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:9f29e3a800b04a0d188957d8f9ca35c85c39107c29fdf97b5b9ba15bbec4cc29_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:d061e9013521b8b7fe281176926e8b4684fddded2bf166906d8fa5d15ac9da32_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:1294c67c44cd5ecde081e35432874b6cabdcd17252f9dfc773eb5158213550e7_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:1823cb53424d92094ff3b1a151501771c5886b25bba4bab79197ad6fd32304ef_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:c153b1c35cf9aa01c416e7d3dd90b89363715544544c09802039a7629f721c42_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:d85a0d45300376bd1ba2b272d13c65fa957bf0f78a9ae50dff27eb0d5ce95735_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:5f8f4618887f2176dc24bbf6419112f85a68e58d49ff47cb1bbd198f2e148d9d_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:93a516a33793b18899586982bbf5b3d741cd8fc6d3285972cc014f823ca75a0d_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:e3090d6f0a2ca71edf606ca49cafa063ac9ff3122f0d377ed9f25a37151d6fb0_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:eedb220436102065b61787715d917459d01e4494a15dffb90474882e8f3086b9_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-operator-bundle@sha256:39088cefc6419019cd9d83bf2f717634fcd01d9befd37b8342553956fae5dd5f_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:0d5f60990dd0863cb501bff5f7b94b979bea3f4ef05e07eb825228dfb3de3248_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:3a481555d5376183a2ee392c409739417d5778e2c0559472f9070ccfe2918e2c_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:4185f61ee8a0deb08e41e1c51753cdb6c6068c421c8e3dda7f1a86f67ab4fed3_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:5b5f6ffba68d27f81bb5c26e4fb83d80a4b72523110e622d764f9337d1cb4826_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:09eb5fdd7c085c63b62fb3eb222e6d03ef88d43e56a12440626a10d908086ff7_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:5ae8ef0d436d6e1d61d2b444a41639d5c98dfe468308d42710aa9a62e5f8fc2b_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:9068b8224f902247d20403d43f7bf66f4d6d202de2ac3f80a46d8211e42e5564_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:ff86bbf817bfc8450074d2ee2e8e55f6e500e7f23d12e3e1ef949cb49acb5e32_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61728"
},
{
"category": "external",
"summary": "RHBZ#2434431",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434431"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61728"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728"
},
{
"category": "external",
"summary": "https://go.dev/cl/736713",
"url": "https://go.dev/cl/736713"
},
{
"category": "external",
"summary": "https://go.dev/issue/77102",
"url": "https://go.dev/issue/77102"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4342",
"url": "https://pkg.go.dev/vuln/GO-2026-4342"
}
],
"release_date": "2026-01-28T19:30:31.354000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-14T15:55:27+00:00",
"details": "For release note details, see the upstream Submariner release notes:\n\nhttps://submariner.io/community/releases/\n\nDownstream-specific issues resolved:\n* ACM-28330\n* ACM-28332\n* ACM-28334\n* ACM-28336\n* ACM-28338\n* ACM-28340\n* ACM-28343\n* ACM-29328\n* ACM-29512\n* ACM-29661\n* ACM-29662\n* ACM-29681\n* ACM-29682\n* ACM-29683\n* ACM-29684\n* ACM-29777\n* ACM-29801\n* ACM-30135\n* ACM-30730\n* ACM-30731\n* ACM-31135\n* ACM-31137\n* ACM-31861\n* ACM-31872\n* ACM-31874\n* ACM-23783\n* ACM-24731\n* ACM-24797\n* ACM-25518\n* ACM-26321\n* ACM-26965\n* ACM-27273\n* ACM-28917\n* ACM-30321\n* ACM-30640\n* ACM-30970\n* ACM-8640\n\nFor more details, see the Red Hat Advanced Cluster Management for Kubernetes documentation:\n\nhttps://docs.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.15/",
"product_ids": [
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:251df7bb1820fed1c75e7b5dd14ed2d12a9bf2f3b74c87f6a0027ebf0641d4e5_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:7ee76ee6dd4a832fccaca245b0f71def3736d90e37476281c273d081234747a2_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:8b17116d4d52c8ab22a72d9c3ff5e2b0820cc0be99ccc405c4d69a3f7ef933bf_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:db1083469ea0c8bf20c10252f4e5f500dd38daca85a996e834f866f9618c3e95_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8151"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, implement a timeout in your archive/zip processing logic to abort the operation if it exceeds a few seconds, preventing the application from consuming an excessive amount of resources.",
"product_ids": [
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:3a7d7ad6a28416cd4479b5cf1508067e10ce342f01c7bb4aa3676abbd9f43a4a_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:b54f4ec7c1e1f45077ad840b6ddbe3388b640f3acc8b29f68ff59547805ee64d_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:c9770153fe0b62c88b947de715ba5867af88c51ad65ec63d319be5a77dcc5c32_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:d3d6fc310945928456e59f5fc04d149af2729d13c27f7c980876d8709e2ce864_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:251df7bb1820fed1c75e7b5dd14ed2d12a9bf2f3b74c87f6a0027ebf0641d4e5_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:7ee76ee6dd4a832fccaca245b0f71def3736d90e37476281c273d081234747a2_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:8b17116d4d52c8ab22a72d9c3ff5e2b0820cc0be99ccc405c4d69a3f7ef933bf_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:db1083469ea0c8bf20c10252f4e5f500dd38daca85a996e834f866f9618c3e95_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:00b683c6d8a62a7057f64700526ef5f9eb10dec3809ee1c6d6abda6f76dd79fd_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:3780b6e2fa5c3c0328a161d6328ed828879c5bdb38cc2ab451366b60ffa5b043_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:6c394c6c6de11664040b84bbdbe2ae8222bece13e36460774ab3c41fc92f932e_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:a34e02a2aa68bdad0e1d2aba40bfc782b1b5b9d2b0bc7c9fd391af7417a454a0_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:613ec029444a86d5510c67551d9b346379413f79064b4a406f8e4ad10b71f5a0_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:6ceaac04b5db279336bdefa462ae02a84e631151315cb6fc657709b72671babf_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:9f29e3a800b04a0d188957d8f9ca35c85c39107c29fdf97b5b9ba15bbec4cc29_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:d061e9013521b8b7fe281176926e8b4684fddded2bf166906d8fa5d15ac9da32_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:1294c67c44cd5ecde081e35432874b6cabdcd17252f9dfc773eb5158213550e7_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:1823cb53424d92094ff3b1a151501771c5886b25bba4bab79197ad6fd32304ef_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:c153b1c35cf9aa01c416e7d3dd90b89363715544544c09802039a7629f721c42_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:d85a0d45300376bd1ba2b272d13c65fa957bf0f78a9ae50dff27eb0d5ce95735_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:5f8f4618887f2176dc24bbf6419112f85a68e58d49ff47cb1bbd198f2e148d9d_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:93a516a33793b18899586982bbf5b3d741cd8fc6d3285972cc014f823ca75a0d_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:e3090d6f0a2ca71edf606ca49cafa063ac9ff3122f0d377ed9f25a37151d6fb0_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:eedb220436102065b61787715d917459d01e4494a15dffb90474882e8f3086b9_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-operator-bundle@sha256:39088cefc6419019cd9d83bf2f717634fcd01d9befd37b8342553956fae5dd5f_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:0d5f60990dd0863cb501bff5f7b94b979bea3f4ef05e07eb825228dfb3de3248_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:3a481555d5376183a2ee392c409739417d5778e2c0559472f9070ccfe2918e2c_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:4185f61ee8a0deb08e41e1c51753cdb6c6068c421c8e3dda7f1a86f67ab4fed3_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:5b5f6ffba68d27f81bb5c26e4fb83d80a4b72523110e622d764f9337d1cb4826_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:09eb5fdd7c085c63b62fb3eb222e6d03ef88d43e56a12440626a10d908086ff7_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:5ae8ef0d436d6e1d61d2b444a41639d5c98dfe468308d42710aa9a62e5f8fc2b_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:9068b8224f902247d20403d43f7bf66f4d6d202de2ac3f80a46d8211e42e5564_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:ff86bbf817bfc8450074d2ee2e8e55f6e500e7f23d12e3e1ef949cb49acb5e32_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:3a7d7ad6a28416cd4479b5cf1508067e10ce342f01c7bb4aa3676abbd9f43a4a_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:b54f4ec7c1e1f45077ad840b6ddbe3388b640f3acc8b29f68ff59547805ee64d_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:c9770153fe0b62c88b947de715ba5867af88c51ad65ec63d319be5a77dcc5c32_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:d3d6fc310945928456e59f5fc04d149af2729d13c27f7c980876d8709e2ce864_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:251df7bb1820fed1c75e7b5dd14ed2d12a9bf2f3b74c87f6a0027ebf0641d4e5_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:7ee76ee6dd4a832fccaca245b0f71def3736d90e37476281c273d081234747a2_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:8b17116d4d52c8ab22a72d9c3ff5e2b0820cc0be99ccc405c4d69a3f7ef933bf_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:db1083469ea0c8bf20c10252f4e5f500dd38daca85a996e834f866f9618c3e95_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:00b683c6d8a62a7057f64700526ef5f9eb10dec3809ee1c6d6abda6f76dd79fd_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:3780b6e2fa5c3c0328a161d6328ed828879c5bdb38cc2ab451366b60ffa5b043_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:6c394c6c6de11664040b84bbdbe2ae8222bece13e36460774ab3c41fc92f932e_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:a34e02a2aa68bdad0e1d2aba40bfc782b1b5b9d2b0bc7c9fd391af7417a454a0_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:613ec029444a86d5510c67551d9b346379413f79064b4a406f8e4ad10b71f5a0_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:6ceaac04b5db279336bdefa462ae02a84e631151315cb6fc657709b72671babf_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:9f29e3a800b04a0d188957d8f9ca35c85c39107c29fdf97b5b9ba15bbec4cc29_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:d061e9013521b8b7fe281176926e8b4684fddded2bf166906d8fa5d15ac9da32_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:1294c67c44cd5ecde081e35432874b6cabdcd17252f9dfc773eb5158213550e7_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:1823cb53424d92094ff3b1a151501771c5886b25bba4bab79197ad6fd32304ef_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:c153b1c35cf9aa01c416e7d3dd90b89363715544544c09802039a7629f721c42_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:d85a0d45300376bd1ba2b272d13c65fa957bf0f78a9ae50dff27eb0d5ce95735_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:5f8f4618887f2176dc24bbf6419112f85a68e58d49ff47cb1bbd198f2e148d9d_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:93a516a33793b18899586982bbf5b3d741cd8fc6d3285972cc014f823ca75a0d_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:e3090d6f0a2ca71edf606ca49cafa063ac9ff3122f0d377ed9f25a37151d6fb0_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:eedb220436102065b61787715d917459d01e4494a15dffb90474882e8f3086b9_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-operator-bundle@sha256:39088cefc6419019cd9d83bf2f717634fcd01d9befd37b8342553956fae5dd5f_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:0d5f60990dd0863cb501bff5f7b94b979bea3f4ef05e07eb825228dfb3de3248_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:3a481555d5376183a2ee392c409739417d5778e2c0559472f9070ccfe2918e2c_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:4185f61ee8a0deb08e41e1c51753cdb6c6068c421c8e3dda7f1a86f67ab4fed3_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:5b5f6ffba68d27f81bb5c26e4fb83d80a4b72523110e622d764f9337d1cb4826_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:09eb5fdd7c085c63b62fb3eb222e6d03ef88d43e56a12440626a10d908086ff7_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:5ae8ef0d436d6e1d61d2b444a41639d5c98dfe468308d42710aa9a62e5f8fc2b_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:9068b8224f902247d20403d43f7bf66f4d6d202de2ac3f80a46d8211e42e5564_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:ff86bbf817bfc8450074d2ee2e8e55f6e500e7f23d12e3e1ef949cb49acb5e32_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip"
},
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:3a7d7ad6a28416cd4479b5cf1508067e10ce342f01c7bb4aa3676abbd9f43a4a_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:b54f4ec7c1e1f45077ad840b6ddbe3388b640f3acc8b29f68ff59547805ee64d_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:c9770153fe0b62c88b947de715ba5867af88c51ad65ec63d319be5a77dcc5c32_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:d3d6fc310945928456e59f5fc04d149af2729d13c27f7c980876d8709e2ce864_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:251df7bb1820fed1c75e7b5dd14ed2d12a9bf2f3b74c87f6a0027ebf0641d4e5_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:7ee76ee6dd4a832fccaca245b0f71def3736d90e37476281c273d081234747a2_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:8b17116d4d52c8ab22a72d9c3ff5e2b0820cc0be99ccc405c4d69a3f7ef933bf_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:db1083469ea0c8bf20c10252f4e5f500dd38daca85a996e834f866f9618c3e95_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:00b683c6d8a62a7057f64700526ef5f9eb10dec3809ee1c6d6abda6f76dd79fd_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:3780b6e2fa5c3c0328a161d6328ed828879c5bdb38cc2ab451366b60ffa5b043_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:6c394c6c6de11664040b84bbdbe2ae8222bece13e36460774ab3c41fc92f932e_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:a34e02a2aa68bdad0e1d2aba40bfc782b1b5b9d2b0bc7c9fd391af7417a454a0_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:1294c67c44cd5ecde081e35432874b6cabdcd17252f9dfc773eb5158213550e7_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:1823cb53424d92094ff3b1a151501771c5886b25bba4bab79197ad6fd32304ef_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:c153b1c35cf9aa01c416e7d3dd90b89363715544544c09802039a7629f721c42_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:d85a0d45300376bd1ba2b272d13c65fa957bf0f78a9ae50dff27eb0d5ce95735_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:5f8f4618887f2176dc24bbf6419112f85a68e58d49ff47cb1bbd198f2e148d9d_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:93a516a33793b18899586982bbf5b3d741cd8fc6d3285972cc014f823ca75a0d_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:e3090d6f0a2ca71edf606ca49cafa063ac9ff3122f0d377ed9f25a37151d6fb0_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:eedb220436102065b61787715d917459d01e4494a15dffb90474882e8f3086b9_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-operator-bundle@sha256:39088cefc6419019cd9d83bf2f717634fcd01d9befd37b8342553956fae5dd5f_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:0d5f60990dd0863cb501bff5f7b94b979bea3f4ef05e07eb825228dfb3de3248_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:3a481555d5376183a2ee392c409739417d5778e2c0559472f9070ccfe2918e2c_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:4185f61ee8a0deb08e41e1c51753cdb6c6068c421c8e3dda7f1a86f67ab4fed3_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:5b5f6ffba68d27f81bb5c26e4fb83d80a4b72523110e622d764f9337d1cb4826_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:09eb5fdd7c085c63b62fb3eb222e6d03ef88d43e56a12440626a10d908086ff7_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:5ae8ef0d436d6e1d61d2b444a41639d5c98dfe468308d42710aa9a62e5f8fc2b_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:9068b8224f902247d20403d43f7bf66f4d6d202de2ac3f80a46d8211e42e5564_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:ff86bbf817bfc8450074d2ee2e8e55f6e500e7f23d12e3e1ef949cb49acb5e32_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang. A remote attacker could exploit this vulnerability by providing a specially crafted certificate during the error string construction process within the `HostnameError.Error()` function. This flaw, caused by unbounded string concatenation, leads to excessive resource consumption. Successful exploitation can result in a denial of service (DoS) for the affected system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:613ec029444a86d5510c67551d9b346379413f79064b4a406f8e4ad10b71f5a0_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:6ceaac04b5db279336bdefa462ae02a84e631151315cb6fc657709b72671babf_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:9f29e3a800b04a0d188957d8f9ca35c85c39107c29fdf97b5b9ba15bbec4cc29_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:d061e9013521b8b7fe281176926e8b4684fddded2bf166906d8fa5d15ac9da32_ppc64le"
],
"known_not_affected": [
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:3a7d7ad6a28416cd4479b5cf1508067e10ce342f01c7bb4aa3676abbd9f43a4a_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:b54f4ec7c1e1f45077ad840b6ddbe3388b640f3acc8b29f68ff59547805ee64d_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:c9770153fe0b62c88b947de715ba5867af88c51ad65ec63d319be5a77dcc5c32_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:d3d6fc310945928456e59f5fc04d149af2729d13c27f7c980876d8709e2ce864_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:251df7bb1820fed1c75e7b5dd14ed2d12a9bf2f3b74c87f6a0027ebf0641d4e5_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:7ee76ee6dd4a832fccaca245b0f71def3736d90e37476281c273d081234747a2_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:8b17116d4d52c8ab22a72d9c3ff5e2b0820cc0be99ccc405c4d69a3f7ef933bf_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:db1083469ea0c8bf20c10252f4e5f500dd38daca85a996e834f866f9618c3e95_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:00b683c6d8a62a7057f64700526ef5f9eb10dec3809ee1c6d6abda6f76dd79fd_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:3780b6e2fa5c3c0328a161d6328ed828879c5bdb38cc2ab451366b60ffa5b043_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:6c394c6c6de11664040b84bbdbe2ae8222bece13e36460774ab3c41fc92f932e_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:a34e02a2aa68bdad0e1d2aba40bfc782b1b5b9d2b0bc7c9fd391af7417a454a0_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:1294c67c44cd5ecde081e35432874b6cabdcd17252f9dfc773eb5158213550e7_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:1823cb53424d92094ff3b1a151501771c5886b25bba4bab79197ad6fd32304ef_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:c153b1c35cf9aa01c416e7d3dd90b89363715544544c09802039a7629f721c42_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:d85a0d45300376bd1ba2b272d13c65fa957bf0f78a9ae50dff27eb0d5ce95735_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:5f8f4618887f2176dc24bbf6419112f85a68e58d49ff47cb1bbd198f2e148d9d_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:93a516a33793b18899586982bbf5b3d741cd8fc6d3285972cc014f823ca75a0d_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:e3090d6f0a2ca71edf606ca49cafa063ac9ff3122f0d377ed9f25a37151d6fb0_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:eedb220436102065b61787715d917459d01e4494a15dffb90474882e8f3086b9_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-operator-bundle@sha256:39088cefc6419019cd9d83bf2f717634fcd01d9befd37b8342553956fae5dd5f_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:0d5f60990dd0863cb501bff5f7b94b979bea3f4ef05e07eb825228dfb3de3248_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:3a481555d5376183a2ee392c409739417d5778e2c0559472f9070ccfe2918e2c_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:4185f61ee8a0deb08e41e1c51753cdb6c6068c421c8e3dda7f1a86f67ab4fed3_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:5b5f6ffba68d27f81bb5c26e4fb83d80a4b72523110e622d764f9337d1cb4826_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:09eb5fdd7c085c63b62fb3eb222e6d03ef88d43e56a12440626a10d908086ff7_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:5ae8ef0d436d6e1d61d2b444a41639d5c98dfe468308d42710aa9a62e5f8fc2b_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:9068b8224f902247d20403d43f7bf66f4d6d202de2ac3f80a46d8211e42e5564_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:ff86bbf817bfc8450074d2ee2e8e55f6e500e7f23d12e3e1ef949cb49acb5e32_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-14T15:55:27+00:00",
"details": "For release note details, see the upstream Submariner release notes:\n\nhttps://submariner.io/community/releases/\n\nDownstream-specific issues resolved:\n* ACM-28330\n* ACM-28332\n* ACM-28334\n* ACM-28336\n* ACM-28338\n* ACM-28340\n* ACM-28343\n* ACM-29328\n* ACM-29512\n* ACM-29661\n* ACM-29662\n* ACM-29681\n* ACM-29682\n* ACM-29683\n* ACM-29684\n* ACM-29777\n* ACM-29801\n* ACM-30135\n* ACM-30730\n* ACM-30731\n* ACM-31135\n* ACM-31137\n* ACM-31861\n* ACM-31872\n* ACM-31874\n* ACM-23783\n* ACM-24731\n* ACM-24797\n* ACM-25518\n* ACM-26321\n* ACM-26965\n* ACM-27273\n* ACM-28917\n* ACM-30321\n* ACM-30640\n* ACM-30970\n* ACM-8640\n\nFor more details, see the Red Hat Advanced Cluster Management for Kubernetes documentation:\n\nhttps://docs.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.15/",
"product_ids": [
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:613ec029444a86d5510c67551d9b346379413f79064b4a406f8e4ad10b71f5a0_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:6ceaac04b5db279336bdefa462ae02a84e631151315cb6fc657709b72671babf_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:9f29e3a800b04a0d188957d8f9ca35c85c39107c29fdf97b5b9ba15bbec4cc29_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:d061e9013521b8b7fe281176926e8b4684fddded2bf166906d8fa5d15ac9da32_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8151"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:3a7d7ad6a28416cd4479b5cf1508067e10ce342f01c7bb4aa3676abbd9f43a4a_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:b54f4ec7c1e1f45077ad840b6ddbe3388b640f3acc8b29f68ff59547805ee64d_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:c9770153fe0b62c88b947de715ba5867af88c51ad65ec63d319be5a77dcc5c32_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:d3d6fc310945928456e59f5fc04d149af2729d13c27f7c980876d8709e2ce864_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:251df7bb1820fed1c75e7b5dd14ed2d12a9bf2f3b74c87f6a0027ebf0641d4e5_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:7ee76ee6dd4a832fccaca245b0f71def3736d90e37476281c273d081234747a2_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:8b17116d4d52c8ab22a72d9c3ff5e2b0820cc0be99ccc405c4d69a3f7ef933bf_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:db1083469ea0c8bf20c10252f4e5f500dd38daca85a996e834f866f9618c3e95_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:00b683c6d8a62a7057f64700526ef5f9eb10dec3809ee1c6d6abda6f76dd79fd_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:3780b6e2fa5c3c0328a161d6328ed828879c5bdb38cc2ab451366b60ffa5b043_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:6c394c6c6de11664040b84bbdbe2ae8222bece13e36460774ab3c41fc92f932e_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:a34e02a2aa68bdad0e1d2aba40bfc782b1b5b9d2b0bc7c9fd391af7417a454a0_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:613ec029444a86d5510c67551d9b346379413f79064b4a406f8e4ad10b71f5a0_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:6ceaac04b5db279336bdefa462ae02a84e631151315cb6fc657709b72671babf_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:9f29e3a800b04a0d188957d8f9ca35c85c39107c29fdf97b5b9ba15bbec4cc29_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:d061e9013521b8b7fe281176926e8b4684fddded2bf166906d8fa5d15ac9da32_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:1294c67c44cd5ecde081e35432874b6cabdcd17252f9dfc773eb5158213550e7_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:1823cb53424d92094ff3b1a151501771c5886b25bba4bab79197ad6fd32304ef_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:c153b1c35cf9aa01c416e7d3dd90b89363715544544c09802039a7629f721c42_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:d85a0d45300376bd1ba2b272d13c65fa957bf0f78a9ae50dff27eb0d5ce95735_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:5f8f4618887f2176dc24bbf6419112f85a68e58d49ff47cb1bbd198f2e148d9d_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:93a516a33793b18899586982bbf5b3d741cd8fc6d3285972cc014f823ca75a0d_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:e3090d6f0a2ca71edf606ca49cafa063ac9ff3122f0d377ed9f25a37151d6fb0_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:eedb220436102065b61787715d917459d01e4494a15dffb90474882e8f3086b9_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-operator-bundle@sha256:39088cefc6419019cd9d83bf2f717634fcd01d9befd37b8342553956fae5dd5f_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:0d5f60990dd0863cb501bff5f7b94b979bea3f4ef05e07eb825228dfb3de3248_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:3a481555d5376183a2ee392c409739417d5778e2c0559472f9070ccfe2918e2c_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:4185f61ee8a0deb08e41e1c51753cdb6c6068c421c8e3dda7f1a86f67ab4fed3_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:5b5f6ffba68d27f81bb5c26e4fb83d80a4b72523110e622d764f9337d1cb4826_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:09eb5fdd7c085c63b62fb3eb222e6d03ef88d43e56a12440626a10d908086ff7_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:5ae8ef0d436d6e1d61d2b444a41639d5c98dfe468308d42710aa9a62e5f8fc2b_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:9068b8224f902247d20403d43f7bf66f4d6d202de2ac3f80a46d8211e42e5564_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:ff86bbf817bfc8450074d2ee2e8e55f6e500e7f23d12e3e1ef949cb49acb5e32_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
},
{
"cve": "CVE-2025-68121",
"discovery_date": "2026-02-05T18:01:30.086058+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:3a7d7ad6a28416cd4479b5cf1508067e10ce342f01c7bb4aa3676abbd9f43a4a_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:b54f4ec7c1e1f45077ad840b6ddbe3388b640f3acc8b29f68ff59547805ee64d_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:c9770153fe0b62c88b947de715ba5867af88c51ad65ec63d319be5a77dcc5c32_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:d3d6fc310945928456e59f5fc04d149af2729d13c27f7c980876d8709e2ce864_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:251df7bb1820fed1c75e7b5dd14ed2d12a9bf2f3b74c87f6a0027ebf0641d4e5_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:7ee76ee6dd4a832fccaca245b0f71def3736d90e37476281c273d081234747a2_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:8b17116d4d52c8ab22a72d9c3ff5e2b0820cc0be99ccc405c4d69a3f7ef933bf_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:db1083469ea0c8bf20c10252f4e5f500dd38daca85a996e834f866f9618c3e95_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:00b683c6d8a62a7057f64700526ef5f9eb10dec3809ee1c6d6abda6f76dd79fd_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:3780b6e2fa5c3c0328a161d6328ed828879c5bdb38cc2ab451366b60ffa5b043_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:6c394c6c6de11664040b84bbdbe2ae8222bece13e36460774ab3c41fc92f932e_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:a34e02a2aa68bdad0e1d2aba40bfc782b1b5b9d2b0bc7c9fd391af7417a454a0_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:1294c67c44cd5ecde081e35432874b6cabdcd17252f9dfc773eb5158213550e7_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:1823cb53424d92094ff3b1a151501771c5886b25bba4bab79197ad6fd32304ef_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:c153b1c35cf9aa01c416e7d3dd90b89363715544544c09802039a7629f721c42_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:d85a0d45300376bd1ba2b272d13c65fa957bf0f78a9ae50dff27eb0d5ce95735_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:5f8f4618887f2176dc24bbf6419112f85a68e58d49ff47cb1bbd198f2e148d9d_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:93a516a33793b18899586982bbf5b3d741cd8fc6d3285972cc014f823ca75a0d_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:e3090d6f0a2ca71edf606ca49cafa063ac9ff3122f0d377ed9f25a37151d6fb0_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:eedb220436102065b61787715d917459d01e4494a15dffb90474882e8f3086b9_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-operator-bundle@sha256:39088cefc6419019cd9d83bf2f717634fcd01d9befd37b8342553956fae5dd5f_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:0d5f60990dd0863cb501bff5f7b94b979bea3f4ef05e07eb825228dfb3de3248_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:3a481555d5376183a2ee392c409739417d5778e2c0559472f9070ccfe2918e2c_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:4185f61ee8a0deb08e41e1c51753cdb6c6068c421c8e3dda7f1a86f67ab4fed3_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:5b5f6ffba68d27f81bb5c26e4fb83d80a4b72523110e622d764f9337d1cb4826_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:09eb5fdd7c085c63b62fb3eb222e6d03ef88d43e56a12440626a10d908086ff7_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:5ae8ef0d436d6e1d61d2b444a41639d5c98dfe468308d42710aa9a62e5f8fc2b_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:9068b8224f902247d20403d43f7bf66f4d6d202de2ac3f80a46d8211e42e5564_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:ff86bbf817bfc8450074d2ee2e8e55f6e500e7f23d12e3e1ef949cb49acb5e32_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2437111"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the crypto/tls component. This vulnerability occurs during Transport Layer Security (TLS) session resumption when certificate authority (CA) settings are modified between the initial and resumed handshakes. An attacker could exploit this to bypass certificate validation, allowing a client or server to establish a connection that should have been rejected. This could lead to an authentication bypass under specific conditions.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/tls: crypto/tls: Incorrect certificate validation during TLS session resumption",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This is a moderate flaw because it only occurs under specific conditions, such as TLS session resumption with runtime changes to certificate authority settings. Exploitation is not straightforward and requires a controlled setup. The impact is limited to certificate validation within the same component and does not affect system availability.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:613ec029444a86d5510c67551d9b346379413f79064b4a406f8e4ad10b71f5a0_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:6ceaac04b5db279336bdefa462ae02a84e631151315cb6fc657709b72671babf_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:9f29e3a800b04a0d188957d8f9ca35c85c39107c29fdf97b5b9ba15bbec4cc29_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:d061e9013521b8b7fe281176926e8b4684fddded2bf166906d8fa5d15ac9da32_ppc64le"
],
"known_not_affected": [
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:3a7d7ad6a28416cd4479b5cf1508067e10ce342f01c7bb4aa3676abbd9f43a4a_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:b54f4ec7c1e1f45077ad840b6ddbe3388b640f3acc8b29f68ff59547805ee64d_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:c9770153fe0b62c88b947de715ba5867af88c51ad65ec63d319be5a77dcc5c32_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:d3d6fc310945928456e59f5fc04d149af2729d13c27f7c980876d8709e2ce864_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:251df7bb1820fed1c75e7b5dd14ed2d12a9bf2f3b74c87f6a0027ebf0641d4e5_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:7ee76ee6dd4a832fccaca245b0f71def3736d90e37476281c273d081234747a2_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:8b17116d4d52c8ab22a72d9c3ff5e2b0820cc0be99ccc405c4d69a3f7ef933bf_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:db1083469ea0c8bf20c10252f4e5f500dd38daca85a996e834f866f9618c3e95_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:00b683c6d8a62a7057f64700526ef5f9eb10dec3809ee1c6d6abda6f76dd79fd_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:3780b6e2fa5c3c0328a161d6328ed828879c5bdb38cc2ab451366b60ffa5b043_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:6c394c6c6de11664040b84bbdbe2ae8222bece13e36460774ab3c41fc92f932e_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:a34e02a2aa68bdad0e1d2aba40bfc782b1b5b9d2b0bc7c9fd391af7417a454a0_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:1294c67c44cd5ecde081e35432874b6cabdcd17252f9dfc773eb5158213550e7_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:1823cb53424d92094ff3b1a151501771c5886b25bba4bab79197ad6fd32304ef_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:c153b1c35cf9aa01c416e7d3dd90b89363715544544c09802039a7629f721c42_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:d85a0d45300376bd1ba2b272d13c65fa957bf0f78a9ae50dff27eb0d5ce95735_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:5f8f4618887f2176dc24bbf6419112f85a68e58d49ff47cb1bbd198f2e148d9d_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:93a516a33793b18899586982bbf5b3d741cd8fc6d3285972cc014f823ca75a0d_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:e3090d6f0a2ca71edf606ca49cafa063ac9ff3122f0d377ed9f25a37151d6fb0_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:eedb220436102065b61787715d917459d01e4494a15dffb90474882e8f3086b9_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-operator-bundle@sha256:39088cefc6419019cd9d83bf2f717634fcd01d9befd37b8342553956fae5dd5f_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:0d5f60990dd0863cb501bff5f7b94b979bea3f4ef05e07eb825228dfb3de3248_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:3a481555d5376183a2ee392c409739417d5778e2c0559472f9070ccfe2918e2c_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:4185f61ee8a0deb08e41e1c51753cdb6c6068c421c8e3dda7f1a86f67ab4fed3_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:5b5f6ffba68d27f81bb5c26e4fb83d80a4b72523110e622d764f9337d1cb4826_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:09eb5fdd7c085c63b62fb3eb222e6d03ef88d43e56a12440626a10d908086ff7_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:5ae8ef0d436d6e1d61d2b444a41639d5c98dfe468308d42710aa9a62e5f8fc2b_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:9068b8224f902247d20403d43f7bf66f4d6d202de2ac3f80a46d8211e42e5564_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:ff86bbf817bfc8450074d2ee2e8e55f6e500e7f23d12e3e1ef949cb49acb5e32_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "RHBZ#2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"category": "external",
"summary": "https://go.dev/cl/737700",
"url": "https://go.dev/cl/737700"
},
{
"category": "external",
"summary": "https://go.dev/issue/77217",
"url": "https://go.dev/issue/77217"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk",
"url": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4337",
"url": "https://pkg.go.dev/vuln/GO-2026-4337"
}
],
"release_date": "2026-02-05T17:48:44.141000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-14T15:55:27+00:00",
"details": "For release note details, see the upstream Submariner release notes:\n\nhttps://submariner.io/community/releases/\n\nDownstream-specific issues resolved:\n* ACM-28330\n* ACM-28332\n* ACM-28334\n* ACM-28336\n* ACM-28338\n* ACM-28340\n* ACM-28343\n* ACM-29328\n* ACM-29512\n* ACM-29661\n* ACM-29662\n* ACM-29681\n* ACM-29682\n* ACM-29683\n* ACM-29684\n* ACM-29777\n* ACM-29801\n* ACM-30135\n* ACM-30730\n* ACM-30731\n* ACM-31135\n* ACM-31137\n* ACM-31861\n* ACM-31872\n* ACM-31874\n* ACM-23783\n* ACM-24731\n* ACM-24797\n* ACM-25518\n* ACM-26321\n* ACM-26965\n* ACM-27273\n* ACM-28917\n* ACM-30321\n* ACM-30640\n* ACM-30970\n* ACM-8640\n\nFor more details, see the Red Hat Advanced Cluster Management for Kubernetes documentation:\n\nhttps://docs.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.15/",
"product_ids": [
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:613ec029444a86d5510c67551d9b346379413f79064b4a406f8e4ad10b71f5a0_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:6ceaac04b5db279336bdefa462ae02a84e631151315cb6fc657709b72671babf_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:9f29e3a800b04a0d188957d8f9ca35c85c39107c29fdf97b5b9ba15bbec4cc29_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:d061e9013521b8b7fe281176926e8b4684fddded2bf166906d8fa5d15ac9da32_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8151"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:3a7d7ad6a28416cd4479b5cf1508067e10ce342f01c7bb4aa3676abbd9f43a4a_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:b54f4ec7c1e1f45077ad840b6ddbe3388b640f3acc8b29f68ff59547805ee64d_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:c9770153fe0b62c88b947de715ba5867af88c51ad65ec63d319be5a77dcc5c32_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:d3d6fc310945928456e59f5fc04d149af2729d13c27f7c980876d8709e2ce864_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:251df7bb1820fed1c75e7b5dd14ed2d12a9bf2f3b74c87f6a0027ebf0641d4e5_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:7ee76ee6dd4a832fccaca245b0f71def3736d90e37476281c273d081234747a2_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:8b17116d4d52c8ab22a72d9c3ff5e2b0820cc0be99ccc405c4d69a3f7ef933bf_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:db1083469ea0c8bf20c10252f4e5f500dd38daca85a996e834f866f9618c3e95_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:00b683c6d8a62a7057f64700526ef5f9eb10dec3809ee1c6d6abda6f76dd79fd_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:3780b6e2fa5c3c0328a161d6328ed828879c5bdb38cc2ab451366b60ffa5b043_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:6c394c6c6de11664040b84bbdbe2ae8222bece13e36460774ab3c41fc92f932e_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:a34e02a2aa68bdad0e1d2aba40bfc782b1b5b9d2b0bc7c9fd391af7417a454a0_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:613ec029444a86d5510c67551d9b346379413f79064b4a406f8e4ad10b71f5a0_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:6ceaac04b5db279336bdefa462ae02a84e631151315cb6fc657709b72671babf_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:9f29e3a800b04a0d188957d8f9ca35c85c39107c29fdf97b5b9ba15bbec4cc29_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:d061e9013521b8b7fe281176926e8b4684fddded2bf166906d8fa5d15ac9da32_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:1294c67c44cd5ecde081e35432874b6cabdcd17252f9dfc773eb5158213550e7_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:1823cb53424d92094ff3b1a151501771c5886b25bba4bab79197ad6fd32304ef_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:c153b1c35cf9aa01c416e7d3dd90b89363715544544c09802039a7629f721c42_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:d85a0d45300376bd1ba2b272d13c65fa957bf0f78a9ae50dff27eb0d5ce95735_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:5f8f4618887f2176dc24bbf6419112f85a68e58d49ff47cb1bbd198f2e148d9d_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:93a516a33793b18899586982bbf5b3d741cd8fc6d3285972cc014f823ca75a0d_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:e3090d6f0a2ca71edf606ca49cafa063ac9ff3122f0d377ed9f25a37151d6fb0_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:eedb220436102065b61787715d917459d01e4494a15dffb90474882e8f3086b9_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-operator-bundle@sha256:39088cefc6419019cd9d83bf2f717634fcd01d9befd37b8342553956fae5dd5f_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:0d5f60990dd0863cb501bff5f7b94b979bea3f4ef05e07eb825228dfb3de3248_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:3a481555d5376183a2ee392c409739417d5778e2c0559472f9070ccfe2918e2c_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:4185f61ee8a0deb08e41e1c51753cdb6c6068c421c8e3dda7f1a86f67ab4fed3_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:5b5f6ffba68d27f81bb5c26e4fb83d80a4b72523110e622d764f9337d1cb4826_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:09eb5fdd7c085c63b62fb3eb222e6d03ef88d43e56a12440626a10d908086ff7_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:5ae8ef0d436d6e1d61d2b444a41639d5c98dfe468308d42710aa9a62e5f8fc2b_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:9068b8224f902247d20403d43f7bf66f4d6d202de2ac3f80a46d8211e42e5564_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:ff86bbf817bfc8450074d2ee2e8e55f6e500e7f23d12e3e1ef949cb49acb5e32_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "crypto/tls: crypto/tls: Incorrect certificate validation during TLS session resumption"
},
{
"cve": "CVE-2025-68151",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-08T16:01:04.891768+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:3a7d7ad6a28416cd4479b5cf1508067e10ce342f01c7bb4aa3676abbd9f43a4a_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:b54f4ec7c1e1f45077ad840b6ddbe3388b640f3acc8b29f68ff59547805ee64d_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:c9770153fe0b62c88b947de715ba5867af88c51ad65ec63d319be5a77dcc5c32_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:d3d6fc310945928456e59f5fc04d149af2729d13c27f7c980876d8709e2ce864_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:00b683c6d8a62a7057f64700526ef5f9eb10dec3809ee1c6d6abda6f76dd79fd_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:3780b6e2fa5c3c0328a161d6328ed828879c5bdb38cc2ab451366b60ffa5b043_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:6c394c6c6de11664040b84bbdbe2ae8222bece13e36460774ab3c41fc92f932e_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:a34e02a2aa68bdad0e1d2aba40bfc782b1b5b9d2b0bc7c9fd391af7417a454a0_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:613ec029444a86d5510c67551d9b346379413f79064b4a406f8e4ad10b71f5a0_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:6ceaac04b5db279336bdefa462ae02a84e631151315cb6fc657709b72671babf_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:9f29e3a800b04a0d188957d8f9ca35c85c39107c29fdf97b5b9ba15bbec4cc29_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:d061e9013521b8b7fe281176926e8b4684fddded2bf166906d8fa5d15ac9da32_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:1294c67c44cd5ecde081e35432874b6cabdcd17252f9dfc773eb5158213550e7_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:1823cb53424d92094ff3b1a151501771c5886b25bba4bab79197ad6fd32304ef_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:c153b1c35cf9aa01c416e7d3dd90b89363715544544c09802039a7629f721c42_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:d85a0d45300376bd1ba2b272d13c65fa957bf0f78a9ae50dff27eb0d5ce95735_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:5f8f4618887f2176dc24bbf6419112f85a68e58d49ff47cb1bbd198f2e148d9d_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:93a516a33793b18899586982bbf5b3d741cd8fc6d3285972cc014f823ca75a0d_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:e3090d6f0a2ca71edf606ca49cafa063ac9ff3122f0d377ed9f25a37151d6fb0_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:eedb220436102065b61787715d917459d01e4494a15dffb90474882e8f3086b9_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-operator-bundle@sha256:39088cefc6419019cd9d83bf2f717634fcd01d9befd37b8342553956fae5dd5f_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:0d5f60990dd0863cb501bff5f7b94b979bea3f4ef05e07eb825228dfb3de3248_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:3a481555d5376183a2ee392c409739417d5778e2c0559472f9070ccfe2918e2c_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:4185f61ee8a0deb08e41e1c51753cdb6c6068c421c8e3dda7f1a86f67ab4fed3_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:5b5f6ffba68d27f81bb5c26e4fb83d80a4b72523110e622d764f9337d1cb4826_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:09eb5fdd7c085c63b62fb3eb222e6d03ef88d43e56a12440626a10d908086ff7_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:5ae8ef0d436d6e1d61d2b444a41639d5c98dfe468308d42710aa9a62e5f8fc2b_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:9068b8224f902247d20403d43f7bf66f4d6d202de2ac3f80a46d8211e42e5564_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:ff86bbf817bfc8450074d2ee2e8e55f6e500e7f23d12e3e1ef949cb49acb5e32_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2428009"
}
],
"notes": [
{
"category": "description",
"text": "Multiple CoreDNS server implementations (gRPC, HTTPS, and HTTP/3) lack critical resource-limiting controls. An unauthenticated remote attacker can exhaust memory and degrade or crash the server by opening many concurrent connections, streams, or sending oversized request bodies. The issue is similar in nature to CVE-2025-47950 (QUIC DoS) but affects additional server types that do not enforce connection limits, stream limits, or message size constraints.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "github.com/coredns/coredns/core/dnsserver: CoreDNS DoS via unbounded connections and oversized messages",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:251df7bb1820fed1c75e7b5dd14ed2d12a9bf2f3b74c87f6a0027ebf0641d4e5_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:7ee76ee6dd4a832fccaca245b0f71def3736d90e37476281c273d081234747a2_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:8b17116d4d52c8ab22a72d9c3ff5e2b0820cc0be99ccc405c4d69a3f7ef933bf_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:db1083469ea0c8bf20c10252f4e5f500dd38daca85a996e834f866f9618c3e95_amd64"
],
"known_not_affected": [
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:3a7d7ad6a28416cd4479b5cf1508067e10ce342f01c7bb4aa3676abbd9f43a4a_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:b54f4ec7c1e1f45077ad840b6ddbe3388b640f3acc8b29f68ff59547805ee64d_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:c9770153fe0b62c88b947de715ba5867af88c51ad65ec63d319be5a77dcc5c32_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:d3d6fc310945928456e59f5fc04d149af2729d13c27f7c980876d8709e2ce864_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:00b683c6d8a62a7057f64700526ef5f9eb10dec3809ee1c6d6abda6f76dd79fd_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:3780b6e2fa5c3c0328a161d6328ed828879c5bdb38cc2ab451366b60ffa5b043_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:6c394c6c6de11664040b84bbdbe2ae8222bece13e36460774ab3c41fc92f932e_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:a34e02a2aa68bdad0e1d2aba40bfc782b1b5b9d2b0bc7c9fd391af7417a454a0_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:613ec029444a86d5510c67551d9b346379413f79064b4a406f8e4ad10b71f5a0_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:6ceaac04b5db279336bdefa462ae02a84e631151315cb6fc657709b72671babf_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:9f29e3a800b04a0d188957d8f9ca35c85c39107c29fdf97b5b9ba15bbec4cc29_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:d061e9013521b8b7fe281176926e8b4684fddded2bf166906d8fa5d15ac9da32_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:1294c67c44cd5ecde081e35432874b6cabdcd17252f9dfc773eb5158213550e7_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:1823cb53424d92094ff3b1a151501771c5886b25bba4bab79197ad6fd32304ef_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:c153b1c35cf9aa01c416e7d3dd90b89363715544544c09802039a7629f721c42_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:d85a0d45300376bd1ba2b272d13c65fa957bf0f78a9ae50dff27eb0d5ce95735_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:5f8f4618887f2176dc24bbf6419112f85a68e58d49ff47cb1bbd198f2e148d9d_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:93a516a33793b18899586982bbf5b3d741cd8fc6d3285972cc014f823ca75a0d_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:e3090d6f0a2ca71edf606ca49cafa063ac9ff3122f0d377ed9f25a37151d6fb0_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:eedb220436102065b61787715d917459d01e4494a15dffb90474882e8f3086b9_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-operator-bundle@sha256:39088cefc6419019cd9d83bf2f717634fcd01d9befd37b8342553956fae5dd5f_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:0d5f60990dd0863cb501bff5f7b94b979bea3f4ef05e07eb825228dfb3de3248_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:3a481555d5376183a2ee392c409739417d5778e2c0559472f9070ccfe2918e2c_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:4185f61ee8a0deb08e41e1c51753cdb6c6068c421c8e3dda7f1a86f67ab4fed3_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:5b5f6ffba68d27f81bb5c26e4fb83d80a4b72523110e622d764f9337d1cb4826_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:09eb5fdd7c085c63b62fb3eb222e6d03ef88d43e56a12440626a10d908086ff7_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:5ae8ef0d436d6e1d61d2b444a41639d5c98dfe468308d42710aa9a62e5f8fc2b_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:9068b8224f902247d20403d43f7bf66f4d6d202de2ac3f80a46d8211e42e5564_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:ff86bbf817bfc8450074d2ee2e8e55f6e500e7f23d12e3e1ef949cb49acb5e32_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-68151"
},
{
"category": "external",
"summary": "RHBZ#2428009",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2428009"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-68151",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68151"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-68151",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68151"
},
{
"category": "external",
"summary": "https://github.com/coredns/coredns/commit/0d8cbb1a6bcb6bc9c1a489865278b8725fa20812",
"url": "https://github.com/coredns/coredns/commit/0d8cbb1a6bcb6bc9c1a489865278b8725fa20812"
},
{
"category": "external",
"summary": "https://github.com/coredns/coredns/pull/7490",
"url": "https://github.com/coredns/coredns/pull/7490"
},
{
"category": "external",
"summary": "https://github.com/coredns/coredns/security/advisories/GHSA-527x-5wrf-22m2",
"url": "https://github.com/coredns/coredns/security/advisories/GHSA-527x-5wrf-22m2"
}
],
"release_date": "2026-01-08T15:33:12.711000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-14T15:55:27+00:00",
"details": "For release note details, see the upstream Submariner release notes:\n\nhttps://submariner.io/community/releases/\n\nDownstream-specific issues resolved:\n* ACM-28330\n* ACM-28332\n* ACM-28334\n* ACM-28336\n* ACM-28338\n* ACM-28340\n* ACM-28343\n* ACM-29328\n* ACM-29512\n* ACM-29661\n* ACM-29662\n* ACM-29681\n* ACM-29682\n* ACM-29683\n* ACM-29684\n* ACM-29777\n* ACM-29801\n* ACM-30135\n* ACM-30730\n* ACM-30731\n* ACM-31135\n* ACM-31137\n* ACM-31861\n* ACM-31872\n* ACM-31874\n* ACM-23783\n* ACM-24731\n* ACM-24797\n* ACM-25518\n* ACM-26321\n* ACM-26965\n* ACM-27273\n* ACM-28917\n* ACM-30321\n* ACM-30640\n* ACM-30970\n* ACM-8640\n\nFor more details, see the Red Hat Advanced Cluster Management for Kubernetes documentation:\n\nhttps://docs.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.15/",
"product_ids": [
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:251df7bb1820fed1c75e7b5dd14ed2d12a9bf2f3b74c87f6a0027ebf0641d4e5_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:7ee76ee6dd4a832fccaca245b0f71def3736d90e37476281c273d081234747a2_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:8b17116d4d52c8ab22a72d9c3ff5e2b0820cc0be99ccc405c4d69a3f7ef933bf_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:db1083469ea0c8bf20c10252f4e5f500dd38daca85a996e834f866f9618c3e95_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8151"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:3a7d7ad6a28416cd4479b5cf1508067e10ce342f01c7bb4aa3676abbd9f43a4a_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:b54f4ec7c1e1f45077ad840b6ddbe3388b640f3acc8b29f68ff59547805ee64d_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:c9770153fe0b62c88b947de715ba5867af88c51ad65ec63d319be5a77dcc5c32_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:d3d6fc310945928456e59f5fc04d149af2729d13c27f7c980876d8709e2ce864_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:251df7bb1820fed1c75e7b5dd14ed2d12a9bf2f3b74c87f6a0027ebf0641d4e5_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:7ee76ee6dd4a832fccaca245b0f71def3736d90e37476281c273d081234747a2_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:8b17116d4d52c8ab22a72d9c3ff5e2b0820cc0be99ccc405c4d69a3f7ef933bf_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:db1083469ea0c8bf20c10252f4e5f500dd38daca85a996e834f866f9618c3e95_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:00b683c6d8a62a7057f64700526ef5f9eb10dec3809ee1c6d6abda6f76dd79fd_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:3780b6e2fa5c3c0328a161d6328ed828879c5bdb38cc2ab451366b60ffa5b043_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:6c394c6c6de11664040b84bbdbe2ae8222bece13e36460774ab3c41fc92f932e_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:a34e02a2aa68bdad0e1d2aba40bfc782b1b5b9d2b0bc7c9fd391af7417a454a0_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:613ec029444a86d5510c67551d9b346379413f79064b4a406f8e4ad10b71f5a0_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:6ceaac04b5db279336bdefa462ae02a84e631151315cb6fc657709b72671babf_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:9f29e3a800b04a0d188957d8f9ca35c85c39107c29fdf97b5b9ba15bbec4cc29_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:d061e9013521b8b7fe281176926e8b4684fddded2bf166906d8fa5d15ac9da32_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:1294c67c44cd5ecde081e35432874b6cabdcd17252f9dfc773eb5158213550e7_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:1823cb53424d92094ff3b1a151501771c5886b25bba4bab79197ad6fd32304ef_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:c153b1c35cf9aa01c416e7d3dd90b89363715544544c09802039a7629f721c42_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:d85a0d45300376bd1ba2b272d13c65fa957bf0f78a9ae50dff27eb0d5ce95735_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:5f8f4618887f2176dc24bbf6419112f85a68e58d49ff47cb1bbd198f2e148d9d_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:93a516a33793b18899586982bbf5b3d741cd8fc6d3285972cc014f823ca75a0d_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:e3090d6f0a2ca71edf606ca49cafa063ac9ff3122f0d377ed9f25a37151d6fb0_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:eedb220436102065b61787715d917459d01e4494a15dffb90474882e8f3086b9_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-operator-bundle@sha256:39088cefc6419019cd9d83bf2f717634fcd01d9befd37b8342553956fae5dd5f_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:0d5f60990dd0863cb501bff5f7b94b979bea3f4ef05e07eb825228dfb3de3248_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:3a481555d5376183a2ee392c409739417d5778e2c0559472f9070ccfe2918e2c_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:4185f61ee8a0deb08e41e1c51753cdb6c6068c421c8e3dda7f1a86f67ab4fed3_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:5b5f6ffba68d27f81bb5c26e4fb83d80a4b72523110e622d764f9337d1cb4826_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:09eb5fdd7c085c63b62fb3eb222e6d03ef88d43e56a12440626a10d908086ff7_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:5ae8ef0d436d6e1d61d2b444a41639d5c98dfe468308d42710aa9a62e5f8fc2b_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:9068b8224f902247d20403d43f7bf66f4d6d202de2ac3f80a46d8211e42e5564_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:ff86bbf817bfc8450074d2ee2e8e55f6e500e7f23d12e3e1ef949cb49acb5e32_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:3a7d7ad6a28416cd4479b5cf1508067e10ce342f01c7bb4aa3676abbd9f43a4a_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:b54f4ec7c1e1f45077ad840b6ddbe3388b640f3acc8b29f68ff59547805ee64d_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:c9770153fe0b62c88b947de715ba5867af88c51ad65ec63d319be5a77dcc5c32_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:d3d6fc310945928456e59f5fc04d149af2729d13c27f7c980876d8709e2ce864_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:251df7bb1820fed1c75e7b5dd14ed2d12a9bf2f3b74c87f6a0027ebf0641d4e5_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:7ee76ee6dd4a832fccaca245b0f71def3736d90e37476281c273d081234747a2_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:8b17116d4d52c8ab22a72d9c3ff5e2b0820cc0be99ccc405c4d69a3f7ef933bf_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:db1083469ea0c8bf20c10252f4e5f500dd38daca85a996e834f866f9618c3e95_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:00b683c6d8a62a7057f64700526ef5f9eb10dec3809ee1c6d6abda6f76dd79fd_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:3780b6e2fa5c3c0328a161d6328ed828879c5bdb38cc2ab451366b60ffa5b043_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:6c394c6c6de11664040b84bbdbe2ae8222bece13e36460774ab3c41fc92f932e_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:a34e02a2aa68bdad0e1d2aba40bfc782b1b5b9d2b0bc7c9fd391af7417a454a0_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:613ec029444a86d5510c67551d9b346379413f79064b4a406f8e4ad10b71f5a0_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:6ceaac04b5db279336bdefa462ae02a84e631151315cb6fc657709b72671babf_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:9f29e3a800b04a0d188957d8f9ca35c85c39107c29fdf97b5b9ba15bbec4cc29_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:d061e9013521b8b7fe281176926e8b4684fddded2bf166906d8fa5d15ac9da32_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:1294c67c44cd5ecde081e35432874b6cabdcd17252f9dfc773eb5158213550e7_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:1823cb53424d92094ff3b1a151501771c5886b25bba4bab79197ad6fd32304ef_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:c153b1c35cf9aa01c416e7d3dd90b89363715544544c09802039a7629f721c42_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:d85a0d45300376bd1ba2b272d13c65fa957bf0f78a9ae50dff27eb0d5ce95735_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:5f8f4618887f2176dc24bbf6419112f85a68e58d49ff47cb1bbd198f2e148d9d_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:93a516a33793b18899586982bbf5b3d741cd8fc6d3285972cc014f823ca75a0d_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:e3090d6f0a2ca71edf606ca49cafa063ac9ff3122f0d377ed9f25a37151d6fb0_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:eedb220436102065b61787715d917459d01e4494a15dffb90474882e8f3086b9_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-operator-bundle@sha256:39088cefc6419019cd9d83bf2f717634fcd01d9befd37b8342553956fae5dd5f_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:0d5f60990dd0863cb501bff5f7b94b979bea3f4ef05e07eb825228dfb3de3248_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:3a481555d5376183a2ee392c409739417d5778e2c0559472f9070ccfe2918e2c_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:4185f61ee8a0deb08e41e1c51753cdb6c6068c421c8e3dda7f1a86f67ab4fed3_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:5b5f6ffba68d27f81bb5c26e4fb83d80a4b72523110e622d764f9337d1cb4826_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:09eb5fdd7c085c63b62fb3eb222e6d03ef88d43e56a12440626a10d908086ff7_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:5ae8ef0d436d6e1d61d2b444a41639d5c98dfe468308d42710aa9a62e5f8fc2b_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:9068b8224f902247d20403d43f7bf66f4d6d202de2ac3f80a46d8211e42e5564_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:ff86bbf817bfc8450074d2ee2e8e55f6e500e7f23d12e3e1ef949cb49acb5e32_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "github.com/coredns/coredns/core/dnsserver: CoreDNS DoS via unbounded connections and oversized messages"
},
{
"cve": "CVE-2026-21441",
"cwe": {
"id": "CWE-409",
"name": "Improper Handling of Highly Compressed Data (Data Amplification)"
},
"discovery_date": "2026-01-07T23:01:59.422078+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-operator-bundle@sha256:39088cefc6419019cd9d83bf2f717634fcd01d9befd37b8342553956fae5dd5f_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:0d5f60990dd0863cb501bff5f7b94b979bea3f4ef05e07eb825228dfb3de3248_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:3a481555d5376183a2ee392c409739417d5778e2c0559472f9070ccfe2918e2c_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:4185f61ee8a0deb08e41e1c51753cdb6c6068c421c8e3dda7f1a86f67ab4fed3_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:5b5f6ffba68d27f81bb5c26e4fb83d80a4b72523110e622d764f9337d1cb4826_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2427726"
}
],
"notes": [
{
"category": "description",
"text": "urllib3 is an HTTP client library for Python. urllib3\u0027s streaming API is designed for the efficient handling of large HTTP responses by reading the content in chunks, rather than loading the entire response body into memory at once. urllib3 can perform decoding or decompression based on the HTTP `Content-Encoding` header (e.g., `gzip`, `deflate`, `br`, or `zstd`). When using the streaming API, the library decompresses only the necessary bytes, enabling partial content consumption. Starting in version 1.22 and prior to version 2.6.3, for HTTP redirect responses, the library would read the entire response body to drain the connection and decompress the content unnecessarily. This decompression occurred even before any read methods were called, and configured read limits did not restrict the amount of decompressed data. As a result, there was no safeguard against decompression bombs. A malicious server could exploit this to trigger excessive resource consumption on the client. Applications and libraries are affected when they stream content from untrusted sources by setting `preload_content=False` when they do not disable redirects. Users should upgrade to at least urllib3 v2.6.3, in which the library does not decode content of redirect responses when `preload_content=False`. If upgrading is not immediately possible, disable redirects by setting `redirect=False` for requests to untrusted source.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "urllib3: urllib3 vulnerable to decompression-bomb safeguard bypass when following HTTP redirects (streaming API)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:3a7d7ad6a28416cd4479b5cf1508067e10ce342f01c7bb4aa3676abbd9f43a4a_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:b54f4ec7c1e1f45077ad840b6ddbe3388b640f3acc8b29f68ff59547805ee64d_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:c9770153fe0b62c88b947de715ba5867af88c51ad65ec63d319be5a77dcc5c32_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:d3d6fc310945928456e59f5fc04d149af2729d13c27f7c980876d8709e2ce864_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:251df7bb1820fed1c75e7b5dd14ed2d12a9bf2f3b74c87f6a0027ebf0641d4e5_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:7ee76ee6dd4a832fccaca245b0f71def3736d90e37476281c273d081234747a2_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:8b17116d4d52c8ab22a72d9c3ff5e2b0820cc0be99ccc405c4d69a3f7ef933bf_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:db1083469ea0c8bf20c10252f4e5f500dd38daca85a996e834f866f9618c3e95_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:00b683c6d8a62a7057f64700526ef5f9eb10dec3809ee1c6d6abda6f76dd79fd_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:3780b6e2fa5c3c0328a161d6328ed828879c5bdb38cc2ab451366b60ffa5b043_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:6c394c6c6de11664040b84bbdbe2ae8222bece13e36460774ab3c41fc92f932e_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:a34e02a2aa68bdad0e1d2aba40bfc782b1b5b9d2b0bc7c9fd391af7417a454a0_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:613ec029444a86d5510c67551d9b346379413f79064b4a406f8e4ad10b71f5a0_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:6ceaac04b5db279336bdefa462ae02a84e631151315cb6fc657709b72671babf_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:9f29e3a800b04a0d188957d8f9ca35c85c39107c29fdf97b5b9ba15bbec4cc29_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:d061e9013521b8b7fe281176926e8b4684fddded2bf166906d8fa5d15ac9da32_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:1294c67c44cd5ecde081e35432874b6cabdcd17252f9dfc773eb5158213550e7_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:1823cb53424d92094ff3b1a151501771c5886b25bba4bab79197ad6fd32304ef_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:c153b1c35cf9aa01c416e7d3dd90b89363715544544c09802039a7629f721c42_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:d85a0d45300376bd1ba2b272d13c65fa957bf0f78a9ae50dff27eb0d5ce95735_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:5f8f4618887f2176dc24bbf6419112f85a68e58d49ff47cb1bbd198f2e148d9d_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:93a516a33793b18899586982bbf5b3d741cd8fc6d3285972cc014f823ca75a0d_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:e3090d6f0a2ca71edf606ca49cafa063ac9ff3122f0d377ed9f25a37151d6fb0_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:eedb220436102065b61787715d917459d01e4494a15dffb90474882e8f3086b9_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:09eb5fdd7c085c63b62fb3eb222e6d03ef88d43e56a12440626a10d908086ff7_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:5ae8ef0d436d6e1d61d2b444a41639d5c98dfe468308d42710aa9a62e5f8fc2b_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:9068b8224f902247d20403d43f7bf66f4d6d202de2ac3f80a46d8211e42e5564_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:ff86bbf817bfc8450074d2ee2e8e55f6e500e7f23d12e3e1ef949cb49acb5e32_amd64"
],
"known_not_affected": [
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-operator-bundle@sha256:39088cefc6419019cd9d83bf2f717634fcd01d9befd37b8342553956fae5dd5f_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:0d5f60990dd0863cb501bff5f7b94b979bea3f4ef05e07eb825228dfb3de3248_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:3a481555d5376183a2ee392c409739417d5778e2c0559472f9070ccfe2918e2c_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:4185f61ee8a0deb08e41e1c51753cdb6c6068c421c8e3dda7f1a86f67ab4fed3_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:5b5f6ffba68d27f81bb5c26e4fb83d80a4b72523110e622d764f9337d1cb4826_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-21441"
},
{
"category": "external",
"summary": "RHBZ#2427726",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2427726"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-21441",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21441"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-21441",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-21441"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/commit/8864ac407bba8607950025e0979c4c69bc7abc7b",
"url": "https://github.com/urllib3/urllib3/commit/8864ac407bba8607950025e0979c4c69bc7abc7b"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/security/advisories/GHSA-38jv-5279-wg99",
"url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-38jv-5279-wg99"
}
],
"release_date": "2026-01-07T22:09:01.936000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-14T15:55:27+00:00",
"details": "For release note details, see the upstream Submariner release notes:\n\nhttps://submariner.io/community/releases/\n\nDownstream-specific issues resolved:\n* ACM-28330\n* ACM-28332\n* ACM-28334\n* ACM-28336\n* ACM-28338\n* ACM-28340\n* ACM-28343\n* ACM-29328\n* ACM-29512\n* ACM-29661\n* ACM-29662\n* ACM-29681\n* ACM-29682\n* ACM-29683\n* ACM-29684\n* ACM-29777\n* ACM-29801\n* ACM-30135\n* ACM-30730\n* ACM-30731\n* ACM-31135\n* ACM-31137\n* ACM-31861\n* ACM-31872\n* ACM-31874\n* ACM-23783\n* ACM-24731\n* ACM-24797\n* ACM-25518\n* ACM-26321\n* ACM-26965\n* ACM-27273\n* ACM-28917\n* ACM-30321\n* ACM-30640\n* ACM-30970\n* ACM-8640\n\nFor more details, see the Red Hat Advanced Cluster Management for Kubernetes documentation:\n\nhttps://docs.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.15/",
"product_ids": [
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:3a7d7ad6a28416cd4479b5cf1508067e10ce342f01c7bb4aa3676abbd9f43a4a_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:b54f4ec7c1e1f45077ad840b6ddbe3388b640f3acc8b29f68ff59547805ee64d_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:c9770153fe0b62c88b947de715ba5867af88c51ad65ec63d319be5a77dcc5c32_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:d3d6fc310945928456e59f5fc04d149af2729d13c27f7c980876d8709e2ce864_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:251df7bb1820fed1c75e7b5dd14ed2d12a9bf2f3b74c87f6a0027ebf0641d4e5_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:7ee76ee6dd4a832fccaca245b0f71def3736d90e37476281c273d081234747a2_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:8b17116d4d52c8ab22a72d9c3ff5e2b0820cc0be99ccc405c4d69a3f7ef933bf_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:db1083469ea0c8bf20c10252f4e5f500dd38daca85a996e834f866f9618c3e95_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:00b683c6d8a62a7057f64700526ef5f9eb10dec3809ee1c6d6abda6f76dd79fd_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:3780b6e2fa5c3c0328a161d6328ed828879c5bdb38cc2ab451366b60ffa5b043_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:6c394c6c6de11664040b84bbdbe2ae8222bece13e36460774ab3c41fc92f932e_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:a34e02a2aa68bdad0e1d2aba40bfc782b1b5b9d2b0bc7c9fd391af7417a454a0_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:613ec029444a86d5510c67551d9b346379413f79064b4a406f8e4ad10b71f5a0_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:6ceaac04b5db279336bdefa462ae02a84e631151315cb6fc657709b72671babf_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:9f29e3a800b04a0d188957d8f9ca35c85c39107c29fdf97b5b9ba15bbec4cc29_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:d061e9013521b8b7fe281176926e8b4684fddded2bf166906d8fa5d15ac9da32_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:1294c67c44cd5ecde081e35432874b6cabdcd17252f9dfc773eb5158213550e7_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:1823cb53424d92094ff3b1a151501771c5886b25bba4bab79197ad6fd32304ef_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:c153b1c35cf9aa01c416e7d3dd90b89363715544544c09802039a7629f721c42_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:d85a0d45300376bd1ba2b272d13c65fa957bf0f78a9ae50dff27eb0d5ce95735_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:5f8f4618887f2176dc24bbf6419112f85a68e58d49ff47cb1bbd198f2e148d9d_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:93a516a33793b18899586982bbf5b3d741cd8fc6d3285972cc014f823ca75a0d_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:e3090d6f0a2ca71edf606ca49cafa063ac9ff3122f0d377ed9f25a37151d6fb0_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:eedb220436102065b61787715d917459d01e4494a15dffb90474882e8f3086b9_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:09eb5fdd7c085c63b62fb3eb222e6d03ef88d43e56a12440626a10d908086ff7_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:5ae8ef0d436d6e1d61d2b444a41639d5c98dfe468308d42710aa9a62e5f8fc2b_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:9068b8224f902247d20403d43f7bf66f4d6d202de2ac3f80a46d8211e42e5564_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:ff86bbf817bfc8450074d2ee2e8e55f6e500e7f23d12e3e1ef949cb49acb5e32_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8151"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:3a7d7ad6a28416cd4479b5cf1508067e10ce342f01c7bb4aa3676abbd9f43a4a_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:b54f4ec7c1e1f45077ad840b6ddbe3388b640f3acc8b29f68ff59547805ee64d_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:c9770153fe0b62c88b947de715ba5867af88c51ad65ec63d319be5a77dcc5c32_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:d3d6fc310945928456e59f5fc04d149af2729d13c27f7c980876d8709e2ce864_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:251df7bb1820fed1c75e7b5dd14ed2d12a9bf2f3b74c87f6a0027ebf0641d4e5_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:7ee76ee6dd4a832fccaca245b0f71def3736d90e37476281c273d081234747a2_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:8b17116d4d52c8ab22a72d9c3ff5e2b0820cc0be99ccc405c4d69a3f7ef933bf_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:db1083469ea0c8bf20c10252f4e5f500dd38daca85a996e834f866f9618c3e95_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:00b683c6d8a62a7057f64700526ef5f9eb10dec3809ee1c6d6abda6f76dd79fd_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:3780b6e2fa5c3c0328a161d6328ed828879c5bdb38cc2ab451366b60ffa5b043_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:6c394c6c6de11664040b84bbdbe2ae8222bece13e36460774ab3c41fc92f932e_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:a34e02a2aa68bdad0e1d2aba40bfc782b1b5b9d2b0bc7c9fd391af7417a454a0_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:613ec029444a86d5510c67551d9b346379413f79064b4a406f8e4ad10b71f5a0_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:6ceaac04b5db279336bdefa462ae02a84e631151315cb6fc657709b72671babf_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:9f29e3a800b04a0d188957d8f9ca35c85c39107c29fdf97b5b9ba15bbec4cc29_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:d061e9013521b8b7fe281176926e8b4684fddded2bf166906d8fa5d15ac9da32_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:1294c67c44cd5ecde081e35432874b6cabdcd17252f9dfc773eb5158213550e7_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:1823cb53424d92094ff3b1a151501771c5886b25bba4bab79197ad6fd32304ef_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:c153b1c35cf9aa01c416e7d3dd90b89363715544544c09802039a7629f721c42_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:d85a0d45300376bd1ba2b272d13c65fa957bf0f78a9ae50dff27eb0d5ce95735_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:5f8f4618887f2176dc24bbf6419112f85a68e58d49ff47cb1bbd198f2e148d9d_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:93a516a33793b18899586982bbf5b3d741cd8fc6d3285972cc014f823ca75a0d_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:e3090d6f0a2ca71edf606ca49cafa063ac9ff3122f0d377ed9f25a37151d6fb0_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:eedb220436102065b61787715d917459d01e4494a15dffb90474882e8f3086b9_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-operator-bundle@sha256:39088cefc6419019cd9d83bf2f717634fcd01d9befd37b8342553956fae5dd5f_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:0d5f60990dd0863cb501bff5f7b94b979bea3f4ef05e07eb825228dfb3de3248_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:3a481555d5376183a2ee392c409739417d5778e2c0559472f9070ccfe2918e2c_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:4185f61ee8a0deb08e41e1c51753cdb6c6068c421c8e3dda7f1a86f67ab4fed3_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:5b5f6ffba68d27f81bb5c26e4fb83d80a4b72523110e622d764f9337d1cb4826_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:09eb5fdd7c085c63b62fb3eb222e6d03ef88d43e56a12440626a10d908086ff7_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:5ae8ef0d436d6e1d61d2b444a41639d5c98dfe468308d42710aa9a62e5f8fc2b_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:9068b8224f902247d20403d43f7bf66f4d6d202de2ac3f80a46d8211e42e5564_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:ff86bbf817bfc8450074d2ee2e8e55f6e500e7f23d12e3e1ef949cb49acb5e32_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "urllib3: urllib3 vulnerable to decompression-bomb safeguard bypass when following HTTP redirects (streaming API)"
},
{
"cve": "CVE-2026-25679",
"cwe": {
"id": "CWE-1286",
"name": "Improper Validation of Syntactic Correctness of Input"
},
"discovery_date": "2026-03-06T22:02:11.567841+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:3a7d7ad6a28416cd4479b5cf1508067e10ce342f01c7bb4aa3676abbd9f43a4a_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:b54f4ec7c1e1f45077ad840b6ddbe3388b640f3acc8b29f68ff59547805ee64d_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:c9770153fe0b62c88b947de715ba5867af88c51ad65ec63d319be5a77dcc5c32_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:d3d6fc310945928456e59f5fc04d149af2729d13c27f7c980876d8709e2ce864_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:251df7bb1820fed1c75e7b5dd14ed2d12a9bf2f3b74c87f6a0027ebf0641d4e5_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:7ee76ee6dd4a832fccaca245b0f71def3736d90e37476281c273d081234747a2_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:8b17116d4d52c8ab22a72d9c3ff5e2b0820cc0be99ccc405c4d69a3f7ef933bf_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:db1083469ea0c8bf20c10252f4e5f500dd38daca85a996e834f866f9618c3e95_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:00b683c6d8a62a7057f64700526ef5f9eb10dec3809ee1c6d6abda6f76dd79fd_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:3780b6e2fa5c3c0328a161d6328ed828879c5bdb38cc2ab451366b60ffa5b043_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:6c394c6c6de11664040b84bbdbe2ae8222bece13e36460774ab3c41fc92f932e_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:a34e02a2aa68bdad0e1d2aba40bfc782b1b5b9d2b0bc7c9fd391af7417a454a0_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:1294c67c44cd5ecde081e35432874b6cabdcd17252f9dfc773eb5158213550e7_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:1823cb53424d92094ff3b1a151501771c5886b25bba4bab79197ad6fd32304ef_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:c153b1c35cf9aa01c416e7d3dd90b89363715544544c09802039a7629f721c42_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:d85a0d45300376bd1ba2b272d13c65fa957bf0f78a9ae50dff27eb0d5ce95735_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:5f8f4618887f2176dc24bbf6419112f85a68e58d49ff47cb1bbd198f2e148d9d_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:93a516a33793b18899586982bbf5b3d741cd8fc6d3285972cc014f823ca75a0d_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:e3090d6f0a2ca71edf606ca49cafa063ac9ff3122f0d377ed9f25a37151d6fb0_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:eedb220436102065b61787715d917459d01e4494a15dffb90474882e8f3086b9_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-operator-bundle@sha256:39088cefc6419019cd9d83bf2f717634fcd01d9befd37b8342553956fae5dd5f_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:0d5f60990dd0863cb501bff5f7b94b979bea3f4ef05e07eb825228dfb3de3248_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:3a481555d5376183a2ee392c409739417d5778e2c0559472f9070ccfe2918e2c_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:4185f61ee8a0deb08e41e1c51753cdb6c6068c421c8e3dda7f1a86f67ab4fed3_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:5b5f6ffba68d27f81bb5c26e4fb83d80a4b72523110e622d764f9337d1cb4826_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:09eb5fdd7c085c63b62fb3eb222e6d03ef88d43e56a12440626a10d908086ff7_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:5ae8ef0d436d6e1d61d2b444a41639d5c98dfe468308d42710aa9a62e5f8fc2b_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:9068b8224f902247d20403d43f7bf66f4d6d202de2ac3f80a46d8211e42e5564_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:ff86bbf817bfc8450074d2ee2e8e55f6e500e7f23d12e3e1ef949cb49acb5e32_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2445356"
}
],
"notes": [
{
"category": "description",
"text": "The Go standard library function net/url.Parse insufficiently validated the host/authority component and accepted some invalid URLs by effectively treating garbage before an IP-literal as ignorable. The function should have rejected this as invalid.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "net/url: Incorrect parsing of IPv6 host literals in net/url",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:613ec029444a86d5510c67551d9b346379413f79064b4a406f8e4ad10b71f5a0_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:6ceaac04b5db279336bdefa462ae02a84e631151315cb6fc657709b72671babf_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:9f29e3a800b04a0d188957d8f9ca35c85c39107c29fdf97b5b9ba15bbec4cc29_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:d061e9013521b8b7fe281176926e8b4684fddded2bf166906d8fa5d15ac9da32_ppc64le"
],
"known_not_affected": [
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:3a7d7ad6a28416cd4479b5cf1508067e10ce342f01c7bb4aa3676abbd9f43a4a_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:b54f4ec7c1e1f45077ad840b6ddbe3388b640f3acc8b29f68ff59547805ee64d_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:c9770153fe0b62c88b947de715ba5867af88c51ad65ec63d319be5a77dcc5c32_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:d3d6fc310945928456e59f5fc04d149af2729d13c27f7c980876d8709e2ce864_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:251df7bb1820fed1c75e7b5dd14ed2d12a9bf2f3b74c87f6a0027ebf0641d4e5_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:7ee76ee6dd4a832fccaca245b0f71def3736d90e37476281c273d081234747a2_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:8b17116d4d52c8ab22a72d9c3ff5e2b0820cc0be99ccc405c4d69a3f7ef933bf_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:db1083469ea0c8bf20c10252f4e5f500dd38daca85a996e834f866f9618c3e95_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:00b683c6d8a62a7057f64700526ef5f9eb10dec3809ee1c6d6abda6f76dd79fd_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:3780b6e2fa5c3c0328a161d6328ed828879c5bdb38cc2ab451366b60ffa5b043_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:6c394c6c6de11664040b84bbdbe2ae8222bece13e36460774ab3c41fc92f932e_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:a34e02a2aa68bdad0e1d2aba40bfc782b1b5b9d2b0bc7c9fd391af7417a454a0_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:1294c67c44cd5ecde081e35432874b6cabdcd17252f9dfc773eb5158213550e7_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:1823cb53424d92094ff3b1a151501771c5886b25bba4bab79197ad6fd32304ef_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:c153b1c35cf9aa01c416e7d3dd90b89363715544544c09802039a7629f721c42_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:d85a0d45300376bd1ba2b272d13c65fa957bf0f78a9ae50dff27eb0d5ce95735_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:5f8f4618887f2176dc24bbf6419112f85a68e58d49ff47cb1bbd198f2e148d9d_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:93a516a33793b18899586982bbf5b3d741cd8fc6d3285972cc014f823ca75a0d_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:e3090d6f0a2ca71edf606ca49cafa063ac9ff3122f0d377ed9f25a37151d6fb0_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:eedb220436102065b61787715d917459d01e4494a15dffb90474882e8f3086b9_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-operator-bundle@sha256:39088cefc6419019cd9d83bf2f717634fcd01d9befd37b8342553956fae5dd5f_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:0d5f60990dd0863cb501bff5f7b94b979bea3f4ef05e07eb825228dfb3de3248_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:3a481555d5376183a2ee392c409739417d5778e2c0559472f9070ccfe2918e2c_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:4185f61ee8a0deb08e41e1c51753cdb6c6068c421c8e3dda7f1a86f67ab4fed3_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:5b5f6ffba68d27f81bb5c26e4fb83d80a4b72523110e622d764f9337d1cb4826_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:09eb5fdd7c085c63b62fb3eb222e6d03ef88d43e56a12440626a10d908086ff7_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:5ae8ef0d436d6e1d61d2b444a41639d5c98dfe468308d42710aa9a62e5f8fc2b_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:9068b8224f902247d20403d43f7bf66f4d6d202de2ac3f80a46d8211e42e5564_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:ff86bbf817bfc8450074d2ee2e8e55f6e500e7f23d12e3e1ef949cb49acb5e32_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-25679"
},
{
"category": "external",
"summary": "RHBZ#2445356",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2445356"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-25679",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25679"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-25679",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25679"
},
{
"category": "external",
"summary": "https://go.dev/cl/752180",
"url": "https://go.dev/cl/752180"
},
{
"category": "external",
"summary": "https://go.dev/issue/77578",
"url": "https://go.dev/issue/77578"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk",
"url": "https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4601",
"url": "https://pkg.go.dev/vuln/GO-2026-4601"
}
],
"release_date": "2026-03-06T21:28:14.211000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-14T15:55:27+00:00",
"details": "For release note details, see the upstream Submariner release notes:\n\nhttps://submariner.io/community/releases/\n\nDownstream-specific issues resolved:\n* ACM-28330\n* ACM-28332\n* ACM-28334\n* ACM-28336\n* ACM-28338\n* ACM-28340\n* ACM-28343\n* ACM-29328\n* ACM-29512\n* ACM-29661\n* ACM-29662\n* ACM-29681\n* ACM-29682\n* ACM-29683\n* ACM-29684\n* ACM-29777\n* ACM-29801\n* ACM-30135\n* ACM-30730\n* ACM-30731\n* ACM-31135\n* ACM-31137\n* ACM-31861\n* ACM-31872\n* ACM-31874\n* ACM-23783\n* ACM-24731\n* ACM-24797\n* ACM-25518\n* ACM-26321\n* ACM-26965\n* ACM-27273\n* ACM-28917\n* ACM-30321\n* ACM-30640\n* ACM-30970\n* ACM-8640\n\nFor more details, see the Red Hat Advanced Cluster Management for Kubernetes documentation:\n\nhttps://docs.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.15/",
"product_ids": [
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:613ec029444a86d5510c67551d9b346379413f79064b4a406f8e4ad10b71f5a0_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:6ceaac04b5db279336bdefa462ae02a84e631151315cb6fc657709b72671babf_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:9f29e3a800b04a0d188957d8f9ca35c85c39107c29fdf97b5b9ba15bbec4cc29_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:d061e9013521b8b7fe281176926e8b4684fddded2bf166906d8fa5d15ac9da32_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8151"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:3a7d7ad6a28416cd4479b5cf1508067e10ce342f01c7bb4aa3676abbd9f43a4a_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:b54f4ec7c1e1f45077ad840b6ddbe3388b640f3acc8b29f68ff59547805ee64d_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:c9770153fe0b62c88b947de715ba5867af88c51ad65ec63d319be5a77dcc5c32_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:d3d6fc310945928456e59f5fc04d149af2729d13c27f7c980876d8709e2ce864_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:251df7bb1820fed1c75e7b5dd14ed2d12a9bf2f3b74c87f6a0027ebf0641d4e5_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:7ee76ee6dd4a832fccaca245b0f71def3736d90e37476281c273d081234747a2_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:8b17116d4d52c8ab22a72d9c3ff5e2b0820cc0be99ccc405c4d69a3f7ef933bf_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:db1083469ea0c8bf20c10252f4e5f500dd38daca85a996e834f866f9618c3e95_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:00b683c6d8a62a7057f64700526ef5f9eb10dec3809ee1c6d6abda6f76dd79fd_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:3780b6e2fa5c3c0328a161d6328ed828879c5bdb38cc2ab451366b60ffa5b043_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:6c394c6c6de11664040b84bbdbe2ae8222bece13e36460774ab3c41fc92f932e_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:a34e02a2aa68bdad0e1d2aba40bfc782b1b5b9d2b0bc7c9fd391af7417a454a0_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:613ec029444a86d5510c67551d9b346379413f79064b4a406f8e4ad10b71f5a0_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:6ceaac04b5db279336bdefa462ae02a84e631151315cb6fc657709b72671babf_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:9f29e3a800b04a0d188957d8f9ca35c85c39107c29fdf97b5b9ba15bbec4cc29_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:d061e9013521b8b7fe281176926e8b4684fddded2bf166906d8fa5d15ac9da32_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:1294c67c44cd5ecde081e35432874b6cabdcd17252f9dfc773eb5158213550e7_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:1823cb53424d92094ff3b1a151501771c5886b25bba4bab79197ad6fd32304ef_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:c153b1c35cf9aa01c416e7d3dd90b89363715544544c09802039a7629f721c42_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:d85a0d45300376bd1ba2b272d13c65fa957bf0f78a9ae50dff27eb0d5ce95735_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:5f8f4618887f2176dc24bbf6419112f85a68e58d49ff47cb1bbd198f2e148d9d_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:93a516a33793b18899586982bbf5b3d741cd8fc6d3285972cc014f823ca75a0d_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:e3090d6f0a2ca71edf606ca49cafa063ac9ff3122f0d377ed9f25a37151d6fb0_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:eedb220436102065b61787715d917459d01e4494a15dffb90474882e8f3086b9_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-operator-bundle@sha256:39088cefc6419019cd9d83bf2f717634fcd01d9befd37b8342553956fae5dd5f_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:0d5f60990dd0863cb501bff5f7b94b979bea3f4ef05e07eb825228dfb3de3248_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:3a481555d5376183a2ee392c409739417d5778e2c0559472f9070ccfe2918e2c_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:4185f61ee8a0deb08e41e1c51753cdb6c6068c421c8e3dda7f1a86f67ab4fed3_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:5b5f6ffba68d27f81bb5c26e4fb83d80a4b72523110e622d764f9337d1cb4826_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:09eb5fdd7c085c63b62fb3eb222e6d03ef88d43e56a12440626a10d908086ff7_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:5ae8ef0d436d6e1d61d2b444a41639d5c98dfe468308d42710aa9a62e5f8fc2b_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:9068b8224f902247d20403d43f7bf66f4d6d202de2ac3f80a46d8211e42e5564_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:ff86bbf817bfc8450074d2ee2e8e55f6e500e7f23d12e3e1ef949cb49acb5e32_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:3a7d7ad6a28416cd4479b5cf1508067e10ce342f01c7bb4aa3676abbd9f43a4a_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:b54f4ec7c1e1f45077ad840b6ddbe3388b640f3acc8b29f68ff59547805ee64d_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:c9770153fe0b62c88b947de715ba5867af88c51ad65ec63d319be5a77dcc5c32_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:d3d6fc310945928456e59f5fc04d149af2729d13c27f7c980876d8709e2ce864_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:251df7bb1820fed1c75e7b5dd14ed2d12a9bf2f3b74c87f6a0027ebf0641d4e5_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:7ee76ee6dd4a832fccaca245b0f71def3736d90e37476281c273d081234747a2_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:8b17116d4d52c8ab22a72d9c3ff5e2b0820cc0be99ccc405c4d69a3f7ef933bf_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:db1083469ea0c8bf20c10252f4e5f500dd38daca85a996e834f866f9618c3e95_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:00b683c6d8a62a7057f64700526ef5f9eb10dec3809ee1c6d6abda6f76dd79fd_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:3780b6e2fa5c3c0328a161d6328ed828879c5bdb38cc2ab451366b60ffa5b043_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:6c394c6c6de11664040b84bbdbe2ae8222bece13e36460774ab3c41fc92f932e_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:a34e02a2aa68bdad0e1d2aba40bfc782b1b5b9d2b0bc7c9fd391af7417a454a0_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:613ec029444a86d5510c67551d9b346379413f79064b4a406f8e4ad10b71f5a0_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:6ceaac04b5db279336bdefa462ae02a84e631151315cb6fc657709b72671babf_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:9f29e3a800b04a0d188957d8f9ca35c85c39107c29fdf97b5b9ba15bbec4cc29_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:d061e9013521b8b7fe281176926e8b4684fddded2bf166906d8fa5d15ac9da32_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:1294c67c44cd5ecde081e35432874b6cabdcd17252f9dfc773eb5158213550e7_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:1823cb53424d92094ff3b1a151501771c5886b25bba4bab79197ad6fd32304ef_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:c153b1c35cf9aa01c416e7d3dd90b89363715544544c09802039a7629f721c42_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:d85a0d45300376bd1ba2b272d13c65fa957bf0f78a9ae50dff27eb0d5ce95735_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:5f8f4618887f2176dc24bbf6419112f85a68e58d49ff47cb1bbd198f2e148d9d_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:93a516a33793b18899586982bbf5b3d741cd8fc6d3285972cc014f823ca75a0d_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:e3090d6f0a2ca71edf606ca49cafa063ac9ff3122f0d377ed9f25a37151d6fb0_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:eedb220436102065b61787715d917459d01e4494a15dffb90474882e8f3086b9_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-operator-bundle@sha256:39088cefc6419019cd9d83bf2f717634fcd01d9befd37b8342553956fae5dd5f_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:0d5f60990dd0863cb501bff5f7b94b979bea3f4ef05e07eb825228dfb3de3248_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:3a481555d5376183a2ee392c409739417d5778e2c0559472f9070ccfe2918e2c_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:4185f61ee8a0deb08e41e1c51753cdb6c6068c421c8e3dda7f1a86f67ab4fed3_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:5b5f6ffba68d27f81bb5c26e4fb83d80a4b72523110e622d764f9337d1cb4826_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:09eb5fdd7c085c63b62fb3eb222e6d03ef88d43e56a12440626a10d908086ff7_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:5ae8ef0d436d6e1d61d2b444a41639d5c98dfe468308d42710aa9a62e5f8fc2b_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:9068b8224f902247d20403d43f7bf66f4d6d202de2ac3f80a46d8211e42e5564_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:ff86bbf817bfc8450074d2ee2e8e55f6e500e7f23d12e3e1ef949cb49acb5e32_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "net/url: Incorrect parsing of IPv6 host literals in net/url"
},
{
"cve": "CVE-2026-26017",
"cwe": {
"id": "CWE-367",
"name": "Time-of-check Time-of-use (TOCTOU) Race Condition"
},
"discovery_date": "2026-03-06T16:01:45.971241+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:3a7d7ad6a28416cd4479b5cf1508067e10ce342f01c7bb4aa3676abbd9f43a4a_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:b54f4ec7c1e1f45077ad840b6ddbe3388b640f3acc8b29f68ff59547805ee64d_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:c9770153fe0b62c88b947de715ba5867af88c51ad65ec63d319be5a77dcc5c32_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:d3d6fc310945928456e59f5fc04d149af2729d13c27f7c980876d8709e2ce864_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:00b683c6d8a62a7057f64700526ef5f9eb10dec3809ee1c6d6abda6f76dd79fd_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:3780b6e2fa5c3c0328a161d6328ed828879c5bdb38cc2ab451366b60ffa5b043_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:6c394c6c6de11664040b84bbdbe2ae8222bece13e36460774ab3c41fc92f932e_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:a34e02a2aa68bdad0e1d2aba40bfc782b1b5b9d2b0bc7c9fd391af7417a454a0_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:613ec029444a86d5510c67551d9b346379413f79064b4a406f8e4ad10b71f5a0_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:6ceaac04b5db279336bdefa462ae02a84e631151315cb6fc657709b72671babf_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:9f29e3a800b04a0d188957d8f9ca35c85c39107c29fdf97b5b9ba15bbec4cc29_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:d061e9013521b8b7fe281176926e8b4684fddded2bf166906d8fa5d15ac9da32_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:1294c67c44cd5ecde081e35432874b6cabdcd17252f9dfc773eb5158213550e7_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:1823cb53424d92094ff3b1a151501771c5886b25bba4bab79197ad6fd32304ef_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:c153b1c35cf9aa01c416e7d3dd90b89363715544544c09802039a7629f721c42_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:d85a0d45300376bd1ba2b272d13c65fa957bf0f78a9ae50dff27eb0d5ce95735_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:5f8f4618887f2176dc24bbf6419112f85a68e58d49ff47cb1bbd198f2e148d9d_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:93a516a33793b18899586982bbf5b3d741cd8fc6d3285972cc014f823ca75a0d_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:e3090d6f0a2ca71edf606ca49cafa063ac9ff3122f0d377ed9f25a37151d6fb0_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:eedb220436102065b61787715d917459d01e4494a15dffb90474882e8f3086b9_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-operator-bundle@sha256:39088cefc6419019cd9d83bf2f717634fcd01d9befd37b8342553956fae5dd5f_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:0d5f60990dd0863cb501bff5f7b94b979bea3f4ef05e07eb825228dfb3de3248_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:3a481555d5376183a2ee392c409739417d5778e2c0559472f9070ccfe2918e2c_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:4185f61ee8a0deb08e41e1c51753cdb6c6068c421c8e3dda7f1a86f67ab4fed3_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:5b5f6ffba68d27f81bb5c26e4fb83d80a4b72523110e622d764f9337d1cb4826_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:09eb5fdd7c085c63b62fb3eb222e6d03ef88d43e56a12440626a10d908086ff7_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:5ae8ef0d436d6e1d61d2b444a41639d5c98dfe468308d42710aa9a62e5f8fc2b_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:9068b8224f902247d20403d43f7bf66f4d6d202de2ac3f80a46d8211e42e5564_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:ff86bbf817bfc8450074d2ee2e8e55f6e500e7f23d12e3e1ef949cb49acb5e32_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2445244"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in CoreDNS, a DNS server that uses a chain of plugins. This logical vulnerability allows an attacker to bypass DNS access controls. The issue occurs because security plugins, such as \u0027acl\u0027, are evaluated before the \u0027rewrite\u0027 plugin, creating a Time-of-Check Time-of-Use (TOCTOU) flaw. This flaw enables an attacker to circumvent intended access restrictions.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "github.com/coredns/coredns: CoreDNS: DNS access control bypass due to plugin execution order flaw",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:251df7bb1820fed1c75e7b5dd14ed2d12a9bf2f3b74c87f6a0027ebf0641d4e5_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:7ee76ee6dd4a832fccaca245b0f71def3736d90e37476281c273d081234747a2_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:8b17116d4d52c8ab22a72d9c3ff5e2b0820cc0be99ccc405c4d69a3f7ef933bf_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:db1083469ea0c8bf20c10252f4e5f500dd38daca85a996e834f866f9618c3e95_amd64"
],
"known_not_affected": [
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:3a7d7ad6a28416cd4479b5cf1508067e10ce342f01c7bb4aa3676abbd9f43a4a_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:b54f4ec7c1e1f45077ad840b6ddbe3388b640f3acc8b29f68ff59547805ee64d_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:c9770153fe0b62c88b947de715ba5867af88c51ad65ec63d319be5a77dcc5c32_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:d3d6fc310945928456e59f5fc04d149af2729d13c27f7c980876d8709e2ce864_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:00b683c6d8a62a7057f64700526ef5f9eb10dec3809ee1c6d6abda6f76dd79fd_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:3780b6e2fa5c3c0328a161d6328ed828879c5bdb38cc2ab451366b60ffa5b043_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:6c394c6c6de11664040b84bbdbe2ae8222bece13e36460774ab3c41fc92f932e_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:a34e02a2aa68bdad0e1d2aba40bfc782b1b5b9d2b0bc7c9fd391af7417a454a0_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:613ec029444a86d5510c67551d9b346379413f79064b4a406f8e4ad10b71f5a0_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:6ceaac04b5db279336bdefa462ae02a84e631151315cb6fc657709b72671babf_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:9f29e3a800b04a0d188957d8f9ca35c85c39107c29fdf97b5b9ba15bbec4cc29_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:d061e9013521b8b7fe281176926e8b4684fddded2bf166906d8fa5d15ac9da32_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:1294c67c44cd5ecde081e35432874b6cabdcd17252f9dfc773eb5158213550e7_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:1823cb53424d92094ff3b1a151501771c5886b25bba4bab79197ad6fd32304ef_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:c153b1c35cf9aa01c416e7d3dd90b89363715544544c09802039a7629f721c42_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:d85a0d45300376bd1ba2b272d13c65fa957bf0f78a9ae50dff27eb0d5ce95735_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:5f8f4618887f2176dc24bbf6419112f85a68e58d49ff47cb1bbd198f2e148d9d_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:93a516a33793b18899586982bbf5b3d741cd8fc6d3285972cc014f823ca75a0d_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:e3090d6f0a2ca71edf606ca49cafa063ac9ff3122f0d377ed9f25a37151d6fb0_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:eedb220436102065b61787715d917459d01e4494a15dffb90474882e8f3086b9_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-operator-bundle@sha256:39088cefc6419019cd9d83bf2f717634fcd01d9befd37b8342553956fae5dd5f_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:0d5f60990dd0863cb501bff5f7b94b979bea3f4ef05e07eb825228dfb3de3248_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:3a481555d5376183a2ee392c409739417d5778e2c0559472f9070ccfe2918e2c_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:4185f61ee8a0deb08e41e1c51753cdb6c6068c421c8e3dda7f1a86f67ab4fed3_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:5b5f6ffba68d27f81bb5c26e4fb83d80a4b72523110e622d764f9337d1cb4826_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:09eb5fdd7c085c63b62fb3eb222e6d03ef88d43e56a12440626a10d908086ff7_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:5ae8ef0d436d6e1d61d2b444a41639d5c98dfe468308d42710aa9a62e5f8fc2b_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:9068b8224f902247d20403d43f7bf66f4d6d202de2ac3f80a46d8211e42e5564_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:ff86bbf817bfc8450074d2ee2e8e55f6e500e7f23d12e3e1ef949cb49acb5e32_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-26017"
},
{
"category": "external",
"summary": "RHBZ#2445244",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2445244"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-26017",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26017"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-26017",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-26017"
},
{
"category": "external",
"summary": "https://github.com/coredns/coredns/releases/tag/v1.14.2",
"url": "https://github.com/coredns/coredns/releases/tag/v1.14.2"
},
{
"category": "external",
"summary": "https://github.com/coredns/coredns/security/advisories/GHSA-c9v3-4pv7-87pr",
"url": "https://github.com/coredns/coredns/security/advisories/GHSA-c9v3-4pv7-87pr"
}
],
"release_date": "2026-03-06T15:36:15.655000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-14T15:55:27+00:00",
"details": "For release note details, see the upstream Submariner release notes:\n\nhttps://submariner.io/community/releases/\n\nDownstream-specific issues resolved:\n* ACM-28330\n* ACM-28332\n* ACM-28334\n* ACM-28336\n* ACM-28338\n* ACM-28340\n* ACM-28343\n* ACM-29328\n* ACM-29512\n* ACM-29661\n* ACM-29662\n* ACM-29681\n* ACM-29682\n* ACM-29683\n* ACM-29684\n* ACM-29777\n* ACM-29801\n* ACM-30135\n* ACM-30730\n* ACM-30731\n* ACM-31135\n* ACM-31137\n* ACM-31861\n* ACM-31872\n* ACM-31874\n* ACM-23783\n* ACM-24731\n* ACM-24797\n* ACM-25518\n* ACM-26321\n* ACM-26965\n* ACM-27273\n* ACM-28917\n* ACM-30321\n* ACM-30640\n* ACM-30970\n* ACM-8640\n\nFor more details, see the Red Hat Advanced Cluster Management for Kubernetes documentation:\n\nhttps://docs.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.15/",
"product_ids": [
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:251df7bb1820fed1c75e7b5dd14ed2d12a9bf2f3b74c87f6a0027ebf0641d4e5_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:7ee76ee6dd4a832fccaca245b0f71def3736d90e37476281c273d081234747a2_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:8b17116d4d52c8ab22a72d9c3ff5e2b0820cc0be99ccc405c4d69a3f7ef933bf_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:db1083469ea0c8bf20c10252f4e5f500dd38daca85a996e834f866f9618c3e95_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8151"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:3a7d7ad6a28416cd4479b5cf1508067e10ce342f01c7bb4aa3676abbd9f43a4a_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:b54f4ec7c1e1f45077ad840b6ddbe3388b640f3acc8b29f68ff59547805ee64d_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:c9770153fe0b62c88b947de715ba5867af88c51ad65ec63d319be5a77dcc5c32_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:d3d6fc310945928456e59f5fc04d149af2729d13c27f7c980876d8709e2ce864_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:251df7bb1820fed1c75e7b5dd14ed2d12a9bf2f3b74c87f6a0027ebf0641d4e5_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:7ee76ee6dd4a832fccaca245b0f71def3736d90e37476281c273d081234747a2_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:8b17116d4d52c8ab22a72d9c3ff5e2b0820cc0be99ccc405c4d69a3f7ef933bf_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:db1083469ea0c8bf20c10252f4e5f500dd38daca85a996e834f866f9618c3e95_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:00b683c6d8a62a7057f64700526ef5f9eb10dec3809ee1c6d6abda6f76dd79fd_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:3780b6e2fa5c3c0328a161d6328ed828879c5bdb38cc2ab451366b60ffa5b043_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:6c394c6c6de11664040b84bbdbe2ae8222bece13e36460774ab3c41fc92f932e_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:a34e02a2aa68bdad0e1d2aba40bfc782b1b5b9d2b0bc7c9fd391af7417a454a0_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:613ec029444a86d5510c67551d9b346379413f79064b4a406f8e4ad10b71f5a0_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:6ceaac04b5db279336bdefa462ae02a84e631151315cb6fc657709b72671babf_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:9f29e3a800b04a0d188957d8f9ca35c85c39107c29fdf97b5b9ba15bbec4cc29_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:d061e9013521b8b7fe281176926e8b4684fddded2bf166906d8fa5d15ac9da32_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:1294c67c44cd5ecde081e35432874b6cabdcd17252f9dfc773eb5158213550e7_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:1823cb53424d92094ff3b1a151501771c5886b25bba4bab79197ad6fd32304ef_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:c153b1c35cf9aa01c416e7d3dd90b89363715544544c09802039a7629f721c42_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:d85a0d45300376bd1ba2b272d13c65fa957bf0f78a9ae50dff27eb0d5ce95735_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:5f8f4618887f2176dc24bbf6419112f85a68e58d49ff47cb1bbd198f2e148d9d_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:93a516a33793b18899586982bbf5b3d741cd8fc6d3285972cc014f823ca75a0d_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:e3090d6f0a2ca71edf606ca49cafa063ac9ff3122f0d377ed9f25a37151d6fb0_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:eedb220436102065b61787715d917459d01e4494a15dffb90474882e8f3086b9_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-operator-bundle@sha256:39088cefc6419019cd9d83bf2f717634fcd01d9befd37b8342553956fae5dd5f_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:0d5f60990dd0863cb501bff5f7b94b979bea3f4ef05e07eb825228dfb3de3248_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:3a481555d5376183a2ee392c409739417d5778e2c0559472f9070ccfe2918e2c_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:4185f61ee8a0deb08e41e1c51753cdb6c6068c421c8e3dda7f1a86f67ab4fed3_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:5b5f6ffba68d27f81bb5c26e4fb83d80a4b72523110e622d764f9337d1cb4826_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:09eb5fdd7c085c63b62fb3eb222e6d03ef88d43e56a12440626a10d908086ff7_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:5ae8ef0d436d6e1d61d2b444a41639d5c98dfe468308d42710aa9a62e5f8fc2b_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:9068b8224f902247d20403d43f7bf66f4d6d202de2ac3f80a46d8211e42e5564_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:ff86bbf817bfc8450074d2ee2e8e55f6e500e7f23d12e3e1ef949cb49acb5e32_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:3a7d7ad6a28416cd4479b5cf1508067e10ce342f01c7bb4aa3676abbd9f43a4a_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:b54f4ec7c1e1f45077ad840b6ddbe3388b640f3acc8b29f68ff59547805ee64d_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:c9770153fe0b62c88b947de715ba5867af88c51ad65ec63d319be5a77dcc5c32_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:d3d6fc310945928456e59f5fc04d149af2729d13c27f7c980876d8709e2ce864_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:251df7bb1820fed1c75e7b5dd14ed2d12a9bf2f3b74c87f6a0027ebf0641d4e5_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:7ee76ee6dd4a832fccaca245b0f71def3736d90e37476281c273d081234747a2_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:8b17116d4d52c8ab22a72d9c3ff5e2b0820cc0be99ccc405c4d69a3f7ef933bf_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:db1083469ea0c8bf20c10252f4e5f500dd38daca85a996e834f866f9618c3e95_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:00b683c6d8a62a7057f64700526ef5f9eb10dec3809ee1c6d6abda6f76dd79fd_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:3780b6e2fa5c3c0328a161d6328ed828879c5bdb38cc2ab451366b60ffa5b043_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:6c394c6c6de11664040b84bbdbe2ae8222bece13e36460774ab3c41fc92f932e_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:a34e02a2aa68bdad0e1d2aba40bfc782b1b5b9d2b0bc7c9fd391af7417a454a0_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:613ec029444a86d5510c67551d9b346379413f79064b4a406f8e4ad10b71f5a0_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:6ceaac04b5db279336bdefa462ae02a84e631151315cb6fc657709b72671babf_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:9f29e3a800b04a0d188957d8f9ca35c85c39107c29fdf97b5b9ba15bbec4cc29_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:d061e9013521b8b7fe281176926e8b4684fddded2bf166906d8fa5d15ac9da32_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:1294c67c44cd5ecde081e35432874b6cabdcd17252f9dfc773eb5158213550e7_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:1823cb53424d92094ff3b1a151501771c5886b25bba4bab79197ad6fd32304ef_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:c153b1c35cf9aa01c416e7d3dd90b89363715544544c09802039a7629f721c42_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:d85a0d45300376bd1ba2b272d13c65fa957bf0f78a9ae50dff27eb0d5ce95735_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:5f8f4618887f2176dc24bbf6419112f85a68e58d49ff47cb1bbd198f2e148d9d_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:93a516a33793b18899586982bbf5b3d741cd8fc6d3285972cc014f823ca75a0d_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:e3090d6f0a2ca71edf606ca49cafa063ac9ff3122f0d377ed9f25a37151d6fb0_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:eedb220436102065b61787715d917459d01e4494a15dffb90474882e8f3086b9_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-operator-bundle@sha256:39088cefc6419019cd9d83bf2f717634fcd01d9befd37b8342553956fae5dd5f_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:0d5f60990dd0863cb501bff5f7b94b979bea3f4ef05e07eb825228dfb3de3248_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:3a481555d5376183a2ee392c409739417d5778e2c0559472f9070ccfe2918e2c_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:4185f61ee8a0deb08e41e1c51753cdb6c6068c421c8e3dda7f1a86f67ab4fed3_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:5b5f6ffba68d27f81bb5c26e4fb83d80a4b72523110e622d764f9337d1cb4826_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:09eb5fdd7c085c63b62fb3eb222e6d03ef88d43e56a12440626a10d908086ff7_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:5ae8ef0d436d6e1d61d2b444a41639d5c98dfe468308d42710aa9a62e5f8fc2b_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:9068b8224f902247d20403d43f7bf66f4d6d202de2ac3f80a46d8211e42e5564_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:ff86bbf817bfc8450074d2ee2e8e55f6e500e7f23d12e3e1ef949cb49acb5e32_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "github.com/coredns/coredns: CoreDNS: DNS access control bypass due to plugin execution order flaw"
},
{
"cve": "CVE-2026-26018",
"cwe": {
"id": "CWE-1241",
"name": "Use of Predictable Algorithm in Random Number Generator"
},
"discovery_date": "2026-03-06T16:01:38.150099+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:3a7d7ad6a28416cd4479b5cf1508067e10ce342f01c7bb4aa3676abbd9f43a4a_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:b54f4ec7c1e1f45077ad840b6ddbe3388b640f3acc8b29f68ff59547805ee64d_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:c9770153fe0b62c88b947de715ba5867af88c51ad65ec63d319be5a77dcc5c32_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:d3d6fc310945928456e59f5fc04d149af2729d13c27f7c980876d8709e2ce864_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:00b683c6d8a62a7057f64700526ef5f9eb10dec3809ee1c6d6abda6f76dd79fd_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:3780b6e2fa5c3c0328a161d6328ed828879c5bdb38cc2ab451366b60ffa5b043_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:6c394c6c6de11664040b84bbdbe2ae8222bece13e36460774ab3c41fc92f932e_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:a34e02a2aa68bdad0e1d2aba40bfc782b1b5b9d2b0bc7c9fd391af7417a454a0_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:613ec029444a86d5510c67551d9b346379413f79064b4a406f8e4ad10b71f5a0_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:6ceaac04b5db279336bdefa462ae02a84e631151315cb6fc657709b72671babf_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:9f29e3a800b04a0d188957d8f9ca35c85c39107c29fdf97b5b9ba15bbec4cc29_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:d061e9013521b8b7fe281176926e8b4684fddded2bf166906d8fa5d15ac9da32_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:1294c67c44cd5ecde081e35432874b6cabdcd17252f9dfc773eb5158213550e7_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:1823cb53424d92094ff3b1a151501771c5886b25bba4bab79197ad6fd32304ef_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:c153b1c35cf9aa01c416e7d3dd90b89363715544544c09802039a7629f721c42_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:d85a0d45300376bd1ba2b272d13c65fa957bf0f78a9ae50dff27eb0d5ce95735_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:5f8f4618887f2176dc24bbf6419112f85a68e58d49ff47cb1bbd198f2e148d9d_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:93a516a33793b18899586982bbf5b3d741cd8fc6d3285972cc014f823ca75a0d_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:e3090d6f0a2ca71edf606ca49cafa063ac9ff3122f0d377ed9f25a37151d6fb0_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:eedb220436102065b61787715d917459d01e4494a15dffb90474882e8f3086b9_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-operator-bundle@sha256:39088cefc6419019cd9d83bf2f717634fcd01d9befd37b8342553956fae5dd5f_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:0d5f60990dd0863cb501bff5f7b94b979bea3f4ef05e07eb825228dfb3de3248_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:3a481555d5376183a2ee392c409739417d5778e2c0559472f9070ccfe2918e2c_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:4185f61ee8a0deb08e41e1c51753cdb6c6068c421c8e3dda7f1a86f67ab4fed3_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:5b5f6ffba68d27f81bb5c26e4fb83d80a4b72523110e622d764f9337d1cb4826_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:09eb5fdd7c085c63b62fb3eb222e6d03ef88d43e56a12440626a10d908086ff7_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:5ae8ef0d436d6e1d61d2b444a41639d5c98dfe468308d42710aa9a62e5f8fc2b_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:9068b8224f902247d20403d43f7bf66f4d6d202de2ac3f80a46d8211e42e5564_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:ff86bbf817bfc8450074d2ee2e8e55f6e500e7f23d12e3e1ef949cb49acb5e32_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2445242"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in CoreDNS, a DNS server that chains plugins. A remote attacker can exploit this flaw by sending specially crafted DNS queries. This vulnerability exists in CoreDNS\u0027s loop detection plugin due to the use of a predictable pseudo-random number generator (PRNG) for generating a secret query name. Successful exploitation can lead to a denial of service (DoS) by crashing the DNS server.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "github.com/coredns/coredns: CoreDNS: Denial of Service vulnerability due to predictable pseudo-random number generation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:251df7bb1820fed1c75e7b5dd14ed2d12a9bf2f3b74c87f6a0027ebf0641d4e5_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:7ee76ee6dd4a832fccaca245b0f71def3736d90e37476281c273d081234747a2_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:8b17116d4d52c8ab22a72d9c3ff5e2b0820cc0be99ccc405c4d69a3f7ef933bf_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:db1083469ea0c8bf20c10252f4e5f500dd38daca85a996e834f866f9618c3e95_amd64"
],
"known_not_affected": [
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:3a7d7ad6a28416cd4479b5cf1508067e10ce342f01c7bb4aa3676abbd9f43a4a_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:b54f4ec7c1e1f45077ad840b6ddbe3388b640f3acc8b29f68ff59547805ee64d_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:c9770153fe0b62c88b947de715ba5867af88c51ad65ec63d319be5a77dcc5c32_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:d3d6fc310945928456e59f5fc04d149af2729d13c27f7c980876d8709e2ce864_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:00b683c6d8a62a7057f64700526ef5f9eb10dec3809ee1c6d6abda6f76dd79fd_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:3780b6e2fa5c3c0328a161d6328ed828879c5bdb38cc2ab451366b60ffa5b043_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:6c394c6c6de11664040b84bbdbe2ae8222bece13e36460774ab3c41fc92f932e_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:a34e02a2aa68bdad0e1d2aba40bfc782b1b5b9d2b0bc7c9fd391af7417a454a0_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:613ec029444a86d5510c67551d9b346379413f79064b4a406f8e4ad10b71f5a0_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:6ceaac04b5db279336bdefa462ae02a84e631151315cb6fc657709b72671babf_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:9f29e3a800b04a0d188957d8f9ca35c85c39107c29fdf97b5b9ba15bbec4cc29_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:d061e9013521b8b7fe281176926e8b4684fddded2bf166906d8fa5d15ac9da32_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:1294c67c44cd5ecde081e35432874b6cabdcd17252f9dfc773eb5158213550e7_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:1823cb53424d92094ff3b1a151501771c5886b25bba4bab79197ad6fd32304ef_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:c153b1c35cf9aa01c416e7d3dd90b89363715544544c09802039a7629f721c42_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:d85a0d45300376bd1ba2b272d13c65fa957bf0f78a9ae50dff27eb0d5ce95735_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:5f8f4618887f2176dc24bbf6419112f85a68e58d49ff47cb1bbd198f2e148d9d_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:93a516a33793b18899586982bbf5b3d741cd8fc6d3285972cc014f823ca75a0d_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:e3090d6f0a2ca71edf606ca49cafa063ac9ff3122f0d377ed9f25a37151d6fb0_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:eedb220436102065b61787715d917459d01e4494a15dffb90474882e8f3086b9_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-operator-bundle@sha256:39088cefc6419019cd9d83bf2f717634fcd01d9befd37b8342553956fae5dd5f_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:0d5f60990dd0863cb501bff5f7b94b979bea3f4ef05e07eb825228dfb3de3248_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:3a481555d5376183a2ee392c409739417d5778e2c0559472f9070ccfe2918e2c_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:4185f61ee8a0deb08e41e1c51753cdb6c6068c421c8e3dda7f1a86f67ab4fed3_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:5b5f6ffba68d27f81bb5c26e4fb83d80a4b72523110e622d764f9337d1cb4826_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:09eb5fdd7c085c63b62fb3eb222e6d03ef88d43e56a12440626a10d908086ff7_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:5ae8ef0d436d6e1d61d2b444a41639d5c98dfe468308d42710aa9a62e5f8fc2b_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:9068b8224f902247d20403d43f7bf66f4d6d202de2ac3f80a46d8211e42e5564_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:ff86bbf817bfc8450074d2ee2e8e55f6e500e7f23d12e3e1ef949cb49acb5e32_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-26018"
},
{
"category": "external",
"summary": "RHBZ#2445242",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2445242"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-26018",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26018"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-26018",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-26018"
},
{
"category": "external",
"summary": "https://github.com/coredns/coredns/releases/tag/v1.14.2",
"url": "https://github.com/coredns/coredns/releases/tag/v1.14.2"
},
{
"category": "external",
"summary": "https://github.com/coredns/coredns/security/advisories/GHSA-h75p-j8xm-m278",
"url": "https://github.com/coredns/coredns/security/advisories/GHSA-h75p-j8xm-m278"
}
],
"release_date": "2026-03-06T15:35:50.801000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-14T15:55:27+00:00",
"details": "For release note details, see the upstream Submariner release notes:\n\nhttps://submariner.io/community/releases/\n\nDownstream-specific issues resolved:\n* ACM-28330\n* ACM-28332\n* ACM-28334\n* ACM-28336\n* ACM-28338\n* ACM-28340\n* ACM-28343\n* ACM-29328\n* ACM-29512\n* ACM-29661\n* ACM-29662\n* ACM-29681\n* ACM-29682\n* ACM-29683\n* ACM-29684\n* ACM-29777\n* ACM-29801\n* ACM-30135\n* ACM-30730\n* ACM-30731\n* ACM-31135\n* ACM-31137\n* ACM-31861\n* ACM-31872\n* ACM-31874\n* ACM-23783\n* ACM-24731\n* ACM-24797\n* ACM-25518\n* ACM-26321\n* ACM-26965\n* ACM-27273\n* ACM-28917\n* ACM-30321\n* ACM-30640\n* ACM-30970\n* ACM-8640\n\nFor more details, see the Red Hat Advanced Cluster Management for Kubernetes documentation:\n\nhttps://docs.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.15/",
"product_ids": [
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:251df7bb1820fed1c75e7b5dd14ed2d12a9bf2f3b74c87f6a0027ebf0641d4e5_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:7ee76ee6dd4a832fccaca245b0f71def3736d90e37476281c273d081234747a2_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:8b17116d4d52c8ab22a72d9c3ff5e2b0820cc0be99ccc405c4d69a3f7ef933bf_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:db1083469ea0c8bf20c10252f4e5f500dd38daca85a996e834f866f9618c3e95_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8151"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:3a7d7ad6a28416cd4479b5cf1508067e10ce342f01c7bb4aa3676abbd9f43a4a_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:b54f4ec7c1e1f45077ad840b6ddbe3388b640f3acc8b29f68ff59547805ee64d_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:c9770153fe0b62c88b947de715ba5867af88c51ad65ec63d319be5a77dcc5c32_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:d3d6fc310945928456e59f5fc04d149af2729d13c27f7c980876d8709e2ce864_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:251df7bb1820fed1c75e7b5dd14ed2d12a9bf2f3b74c87f6a0027ebf0641d4e5_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:7ee76ee6dd4a832fccaca245b0f71def3736d90e37476281c273d081234747a2_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:8b17116d4d52c8ab22a72d9c3ff5e2b0820cc0be99ccc405c4d69a3f7ef933bf_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:db1083469ea0c8bf20c10252f4e5f500dd38daca85a996e834f866f9618c3e95_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:00b683c6d8a62a7057f64700526ef5f9eb10dec3809ee1c6d6abda6f76dd79fd_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:3780b6e2fa5c3c0328a161d6328ed828879c5bdb38cc2ab451366b60ffa5b043_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:6c394c6c6de11664040b84bbdbe2ae8222bece13e36460774ab3c41fc92f932e_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:a34e02a2aa68bdad0e1d2aba40bfc782b1b5b9d2b0bc7c9fd391af7417a454a0_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:613ec029444a86d5510c67551d9b346379413f79064b4a406f8e4ad10b71f5a0_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:6ceaac04b5db279336bdefa462ae02a84e631151315cb6fc657709b72671babf_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:9f29e3a800b04a0d188957d8f9ca35c85c39107c29fdf97b5b9ba15bbec4cc29_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:d061e9013521b8b7fe281176926e8b4684fddded2bf166906d8fa5d15ac9da32_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:1294c67c44cd5ecde081e35432874b6cabdcd17252f9dfc773eb5158213550e7_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:1823cb53424d92094ff3b1a151501771c5886b25bba4bab79197ad6fd32304ef_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:c153b1c35cf9aa01c416e7d3dd90b89363715544544c09802039a7629f721c42_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:d85a0d45300376bd1ba2b272d13c65fa957bf0f78a9ae50dff27eb0d5ce95735_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:5f8f4618887f2176dc24bbf6419112f85a68e58d49ff47cb1bbd198f2e148d9d_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:93a516a33793b18899586982bbf5b3d741cd8fc6d3285972cc014f823ca75a0d_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:e3090d6f0a2ca71edf606ca49cafa063ac9ff3122f0d377ed9f25a37151d6fb0_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:eedb220436102065b61787715d917459d01e4494a15dffb90474882e8f3086b9_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-operator-bundle@sha256:39088cefc6419019cd9d83bf2f717634fcd01d9befd37b8342553956fae5dd5f_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:0d5f60990dd0863cb501bff5f7b94b979bea3f4ef05e07eb825228dfb3de3248_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:3a481555d5376183a2ee392c409739417d5778e2c0559472f9070ccfe2918e2c_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:4185f61ee8a0deb08e41e1c51753cdb6c6068c421c8e3dda7f1a86f67ab4fed3_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:5b5f6ffba68d27f81bb5c26e4fb83d80a4b72523110e622d764f9337d1cb4826_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:09eb5fdd7c085c63b62fb3eb222e6d03ef88d43e56a12440626a10d908086ff7_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:5ae8ef0d436d6e1d61d2b444a41639d5c98dfe468308d42710aa9a62e5f8fc2b_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:9068b8224f902247d20403d43f7bf66f4d6d202de2ac3f80a46d8211e42e5564_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:ff86bbf817bfc8450074d2ee2e8e55f6e500e7f23d12e3e1ef949cb49acb5e32_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:3a7d7ad6a28416cd4479b5cf1508067e10ce342f01c7bb4aa3676abbd9f43a4a_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:b54f4ec7c1e1f45077ad840b6ddbe3388b640f3acc8b29f68ff59547805ee64d_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:c9770153fe0b62c88b947de715ba5867af88c51ad65ec63d319be5a77dcc5c32_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:d3d6fc310945928456e59f5fc04d149af2729d13c27f7c980876d8709e2ce864_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:251df7bb1820fed1c75e7b5dd14ed2d12a9bf2f3b74c87f6a0027ebf0641d4e5_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:7ee76ee6dd4a832fccaca245b0f71def3736d90e37476281c273d081234747a2_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:8b17116d4d52c8ab22a72d9c3ff5e2b0820cc0be99ccc405c4d69a3f7ef933bf_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:db1083469ea0c8bf20c10252f4e5f500dd38daca85a996e834f866f9618c3e95_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:00b683c6d8a62a7057f64700526ef5f9eb10dec3809ee1c6d6abda6f76dd79fd_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:3780b6e2fa5c3c0328a161d6328ed828879c5bdb38cc2ab451366b60ffa5b043_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:6c394c6c6de11664040b84bbdbe2ae8222bece13e36460774ab3c41fc92f932e_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:a34e02a2aa68bdad0e1d2aba40bfc782b1b5b9d2b0bc7c9fd391af7417a454a0_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:613ec029444a86d5510c67551d9b346379413f79064b4a406f8e4ad10b71f5a0_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:6ceaac04b5db279336bdefa462ae02a84e631151315cb6fc657709b72671babf_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:9f29e3a800b04a0d188957d8f9ca35c85c39107c29fdf97b5b9ba15bbec4cc29_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:d061e9013521b8b7fe281176926e8b4684fddded2bf166906d8fa5d15ac9da32_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:1294c67c44cd5ecde081e35432874b6cabdcd17252f9dfc773eb5158213550e7_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:1823cb53424d92094ff3b1a151501771c5886b25bba4bab79197ad6fd32304ef_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:c153b1c35cf9aa01c416e7d3dd90b89363715544544c09802039a7629f721c42_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:d85a0d45300376bd1ba2b272d13c65fa957bf0f78a9ae50dff27eb0d5ce95735_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:5f8f4618887f2176dc24bbf6419112f85a68e58d49ff47cb1bbd198f2e148d9d_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:93a516a33793b18899586982bbf5b3d741cd8fc6d3285972cc014f823ca75a0d_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:e3090d6f0a2ca71edf606ca49cafa063ac9ff3122f0d377ed9f25a37151d6fb0_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:eedb220436102065b61787715d917459d01e4494a15dffb90474882e8f3086b9_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-operator-bundle@sha256:39088cefc6419019cd9d83bf2f717634fcd01d9befd37b8342553956fae5dd5f_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:0d5f60990dd0863cb501bff5f7b94b979bea3f4ef05e07eb825228dfb3de3248_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:3a481555d5376183a2ee392c409739417d5778e2c0559472f9070ccfe2918e2c_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:4185f61ee8a0deb08e41e1c51753cdb6c6068c421c8e3dda7f1a86f67ab4fed3_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:5b5f6ffba68d27f81bb5c26e4fb83d80a4b72523110e622d764f9337d1cb4826_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:09eb5fdd7c085c63b62fb3eb222e6d03ef88d43e56a12440626a10d908086ff7_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:5ae8ef0d436d6e1d61d2b444a41639d5c98dfe468308d42710aa9a62e5f8fc2b_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:9068b8224f902247d20403d43f7bf66f4d6d202de2ac3f80a46d8211e42e5564_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:ff86bbf817bfc8450074d2ee2e8e55f6e500e7f23d12e3e1ef949cb49acb5e32_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "github.com/coredns/coredns: CoreDNS: Denial of Service vulnerability due to predictable pseudo-random number generation"
},
{
"cve": "CVE-2026-27137",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"discovery_date": "2026-03-06T22:01:38.859733+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:3a7d7ad6a28416cd4479b5cf1508067e10ce342f01c7bb4aa3676abbd9f43a4a_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:b54f4ec7c1e1f45077ad840b6ddbe3388b640f3acc8b29f68ff59547805ee64d_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:c9770153fe0b62c88b947de715ba5867af88c51ad65ec63d319be5a77dcc5c32_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:d3d6fc310945928456e59f5fc04d149af2729d13c27f7c980876d8709e2ce864_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:251df7bb1820fed1c75e7b5dd14ed2d12a9bf2f3b74c87f6a0027ebf0641d4e5_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:7ee76ee6dd4a832fccaca245b0f71def3736d90e37476281c273d081234747a2_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:8b17116d4d52c8ab22a72d9c3ff5e2b0820cc0be99ccc405c4d69a3f7ef933bf_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:db1083469ea0c8bf20c10252f4e5f500dd38daca85a996e834f866f9618c3e95_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:00b683c6d8a62a7057f64700526ef5f9eb10dec3809ee1c6d6abda6f76dd79fd_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:3780b6e2fa5c3c0328a161d6328ed828879c5bdb38cc2ab451366b60ffa5b043_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:6c394c6c6de11664040b84bbdbe2ae8222bece13e36460774ab3c41fc92f932e_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:a34e02a2aa68bdad0e1d2aba40bfc782b1b5b9d2b0bc7c9fd391af7417a454a0_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:1294c67c44cd5ecde081e35432874b6cabdcd17252f9dfc773eb5158213550e7_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:1823cb53424d92094ff3b1a151501771c5886b25bba4bab79197ad6fd32304ef_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:c153b1c35cf9aa01c416e7d3dd90b89363715544544c09802039a7629f721c42_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:d85a0d45300376bd1ba2b272d13c65fa957bf0f78a9ae50dff27eb0d5ce95735_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:5f8f4618887f2176dc24bbf6419112f85a68e58d49ff47cb1bbd198f2e148d9d_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:93a516a33793b18899586982bbf5b3d741cd8fc6d3285972cc014f823ca75a0d_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:e3090d6f0a2ca71edf606ca49cafa063ac9ff3122f0d377ed9f25a37151d6fb0_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:eedb220436102065b61787715d917459d01e4494a15dffb90474882e8f3086b9_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-operator-bundle@sha256:39088cefc6419019cd9d83bf2f717634fcd01d9befd37b8342553956fae5dd5f_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:0d5f60990dd0863cb501bff5f7b94b979bea3f4ef05e07eb825228dfb3de3248_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:3a481555d5376183a2ee392c409739417d5778e2c0559472f9070ccfe2918e2c_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:4185f61ee8a0deb08e41e1c51753cdb6c6068c421c8e3dda7f1a86f67ab4fed3_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:5b5f6ffba68d27f81bb5c26e4fb83d80a4b72523110e622d764f9337d1cb4826_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:09eb5fdd7c085c63b62fb3eb222e6d03ef88d43e56a12440626a10d908086ff7_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:5ae8ef0d436d6e1d61d2b444a41639d5c98dfe468308d42710aa9a62e5f8fc2b_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:9068b8224f902247d20403d43f7bf66f4d6d202de2ac3f80a46d8211e42e5564_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:ff86bbf817bfc8450074d2ee2e8e55f6e500e7f23d12e3e1ef949cb49acb5e32_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2445345"
}
],
"notes": [
{
"category": "description",
"text": "A certificate validation flaw has been discovered in the golang crypto/x509 module. When verifying a certificate chain which contains a certificate containing multiple email address constraints which share common local portions but different domain portions, these constraints will not be properly applied, and only the last constraint will be considered.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: Incorrect enforcement of email constraints in crypto/x509",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:613ec029444a86d5510c67551d9b346379413f79064b4a406f8e4ad10b71f5a0_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:6ceaac04b5db279336bdefa462ae02a84e631151315cb6fc657709b72671babf_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:9f29e3a800b04a0d188957d8f9ca35c85c39107c29fdf97b5b9ba15bbec4cc29_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:d061e9013521b8b7fe281176926e8b4684fddded2bf166906d8fa5d15ac9da32_ppc64le"
],
"known_not_affected": [
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:3a7d7ad6a28416cd4479b5cf1508067e10ce342f01c7bb4aa3676abbd9f43a4a_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:b54f4ec7c1e1f45077ad840b6ddbe3388b640f3acc8b29f68ff59547805ee64d_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:c9770153fe0b62c88b947de715ba5867af88c51ad65ec63d319be5a77dcc5c32_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:d3d6fc310945928456e59f5fc04d149af2729d13c27f7c980876d8709e2ce864_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:251df7bb1820fed1c75e7b5dd14ed2d12a9bf2f3b74c87f6a0027ebf0641d4e5_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:7ee76ee6dd4a832fccaca245b0f71def3736d90e37476281c273d081234747a2_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:8b17116d4d52c8ab22a72d9c3ff5e2b0820cc0be99ccc405c4d69a3f7ef933bf_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:db1083469ea0c8bf20c10252f4e5f500dd38daca85a996e834f866f9618c3e95_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:00b683c6d8a62a7057f64700526ef5f9eb10dec3809ee1c6d6abda6f76dd79fd_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:3780b6e2fa5c3c0328a161d6328ed828879c5bdb38cc2ab451366b60ffa5b043_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:6c394c6c6de11664040b84bbdbe2ae8222bece13e36460774ab3c41fc92f932e_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:a34e02a2aa68bdad0e1d2aba40bfc782b1b5b9d2b0bc7c9fd391af7417a454a0_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:1294c67c44cd5ecde081e35432874b6cabdcd17252f9dfc773eb5158213550e7_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:1823cb53424d92094ff3b1a151501771c5886b25bba4bab79197ad6fd32304ef_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:c153b1c35cf9aa01c416e7d3dd90b89363715544544c09802039a7629f721c42_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:d85a0d45300376bd1ba2b272d13c65fa957bf0f78a9ae50dff27eb0d5ce95735_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:5f8f4618887f2176dc24bbf6419112f85a68e58d49ff47cb1bbd198f2e148d9d_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:93a516a33793b18899586982bbf5b3d741cd8fc6d3285972cc014f823ca75a0d_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:e3090d6f0a2ca71edf606ca49cafa063ac9ff3122f0d377ed9f25a37151d6fb0_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:eedb220436102065b61787715d917459d01e4494a15dffb90474882e8f3086b9_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-operator-bundle@sha256:39088cefc6419019cd9d83bf2f717634fcd01d9befd37b8342553956fae5dd5f_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:0d5f60990dd0863cb501bff5f7b94b979bea3f4ef05e07eb825228dfb3de3248_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:3a481555d5376183a2ee392c409739417d5778e2c0559472f9070ccfe2918e2c_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:4185f61ee8a0deb08e41e1c51753cdb6c6068c421c8e3dda7f1a86f67ab4fed3_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:5b5f6ffba68d27f81bb5c26e4fb83d80a4b72523110e622d764f9337d1cb4826_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:09eb5fdd7c085c63b62fb3eb222e6d03ef88d43e56a12440626a10d908086ff7_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:5ae8ef0d436d6e1d61d2b444a41639d5c98dfe468308d42710aa9a62e5f8fc2b_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:9068b8224f902247d20403d43f7bf66f4d6d202de2ac3f80a46d8211e42e5564_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:ff86bbf817bfc8450074d2ee2e8e55f6e500e7f23d12e3e1ef949cb49acb5e32_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-27137"
},
{
"category": "external",
"summary": "RHBZ#2445345",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2445345"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-27137",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27137"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-27137",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27137"
},
{
"category": "external",
"summary": "https://go.dev/cl/752182",
"url": "https://go.dev/cl/752182"
},
{
"category": "external",
"summary": "https://go.dev/issue/77952",
"url": "https://go.dev/issue/77952"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk",
"url": "https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4599",
"url": "https://pkg.go.dev/vuln/GO-2026-4599"
}
],
"release_date": "2026-03-06T21:28:13.748000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-14T15:55:27+00:00",
"details": "For release note details, see the upstream Submariner release notes:\n\nhttps://submariner.io/community/releases/\n\nDownstream-specific issues resolved:\n* ACM-28330\n* ACM-28332\n* ACM-28334\n* ACM-28336\n* ACM-28338\n* ACM-28340\n* ACM-28343\n* ACM-29328\n* ACM-29512\n* ACM-29661\n* ACM-29662\n* ACM-29681\n* ACM-29682\n* ACM-29683\n* ACM-29684\n* ACM-29777\n* ACM-29801\n* ACM-30135\n* ACM-30730\n* ACM-30731\n* ACM-31135\n* ACM-31137\n* ACM-31861\n* ACM-31872\n* ACM-31874\n* ACM-23783\n* ACM-24731\n* ACM-24797\n* ACM-25518\n* ACM-26321\n* ACM-26965\n* ACM-27273\n* ACM-28917\n* ACM-30321\n* ACM-30640\n* ACM-30970\n* ACM-8640\n\nFor more details, see the Red Hat Advanced Cluster Management for Kubernetes documentation:\n\nhttps://docs.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.15/",
"product_ids": [
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:613ec029444a86d5510c67551d9b346379413f79064b4a406f8e4ad10b71f5a0_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:6ceaac04b5db279336bdefa462ae02a84e631151315cb6fc657709b72671babf_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:9f29e3a800b04a0d188957d8f9ca35c85c39107c29fdf97b5b9ba15bbec4cc29_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:d061e9013521b8b7fe281176926e8b4684fddded2bf166906d8fa5d15ac9da32_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8151"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:3a7d7ad6a28416cd4479b5cf1508067e10ce342f01c7bb4aa3676abbd9f43a4a_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:b54f4ec7c1e1f45077ad840b6ddbe3388b640f3acc8b29f68ff59547805ee64d_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:c9770153fe0b62c88b947de715ba5867af88c51ad65ec63d319be5a77dcc5c32_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:d3d6fc310945928456e59f5fc04d149af2729d13c27f7c980876d8709e2ce864_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:251df7bb1820fed1c75e7b5dd14ed2d12a9bf2f3b74c87f6a0027ebf0641d4e5_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:7ee76ee6dd4a832fccaca245b0f71def3736d90e37476281c273d081234747a2_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:8b17116d4d52c8ab22a72d9c3ff5e2b0820cc0be99ccc405c4d69a3f7ef933bf_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:db1083469ea0c8bf20c10252f4e5f500dd38daca85a996e834f866f9618c3e95_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:00b683c6d8a62a7057f64700526ef5f9eb10dec3809ee1c6d6abda6f76dd79fd_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:3780b6e2fa5c3c0328a161d6328ed828879c5bdb38cc2ab451366b60ffa5b043_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:6c394c6c6de11664040b84bbdbe2ae8222bece13e36460774ab3c41fc92f932e_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:a34e02a2aa68bdad0e1d2aba40bfc782b1b5b9d2b0bc7c9fd391af7417a454a0_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:613ec029444a86d5510c67551d9b346379413f79064b4a406f8e4ad10b71f5a0_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:6ceaac04b5db279336bdefa462ae02a84e631151315cb6fc657709b72671babf_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:9f29e3a800b04a0d188957d8f9ca35c85c39107c29fdf97b5b9ba15bbec4cc29_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:d061e9013521b8b7fe281176926e8b4684fddded2bf166906d8fa5d15ac9da32_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:1294c67c44cd5ecde081e35432874b6cabdcd17252f9dfc773eb5158213550e7_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:1823cb53424d92094ff3b1a151501771c5886b25bba4bab79197ad6fd32304ef_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:c153b1c35cf9aa01c416e7d3dd90b89363715544544c09802039a7629f721c42_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:d85a0d45300376bd1ba2b272d13c65fa957bf0f78a9ae50dff27eb0d5ce95735_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:5f8f4618887f2176dc24bbf6419112f85a68e58d49ff47cb1bbd198f2e148d9d_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:93a516a33793b18899586982bbf5b3d741cd8fc6d3285972cc014f823ca75a0d_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:e3090d6f0a2ca71edf606ca49cafa063ac9ff3122f0d377ed9f25a37151d6fb0_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:eedb220436102065b61787715d917459d01e4494a15dffb90474882e8f3086b9_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-operator-bundle@sha256:39088cefc6419019cd9d83bf2f717634fcd01d9befd37b8342553956fae5dd5f_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:0d5f60990dd0863cb501bff5f7b94b979bea3f4ef05e07eb825228dfb3de3248_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:3a481555d5376183a2ee392c409739417d5778e2c0559472f9070ccfe2918e2c_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:4185f61ee8a0deb08e41e1c51753cdb6c6068c421c8e3dda7f1a86f67ab4fed3_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:5b5f6ffba68d27f81bb5c26e4fb83d80a4b72523110e622d764f9337d1cb4826_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:09eb5fdd7c085c63b62fb3eb222e6d03ef88d43e56a12440626a10d908086ff7_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:5ae8ef0d436d6e1d61d2b444a41639d5c98dfe468308d42710aa9a62e5f8fc2b_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:9068b8224f902247d20403d43f7bf66f4d6d202de2ac3f80a46d8211e42e5564_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:ff86bbf817bfc8450074d2ee2e8e55f6e500e7f23d12e3e1ef949cb49acb5e32_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:3a7d7ad6a28416cd4479b5cf1508067e10ce342f01c7bb4aa3676abbd9f43a4a_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:b54f4ec7c1e1f45077ad840b6ddbe3388b640f3acc8b29f68ff59547805ee64d_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:c9770153fe0b62c88b947de715ba5867af88c51ad65ec63d319be5a77dcc5c32_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:d3d6fc310945928456e59f5fc04d149af2729d13c27f7c980876d8709e2ce864_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:251df7bb1820fed1c75e7b5dd14ed2d12a9bf2f3b74c87f6a0027ebf0641d4e5_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:7ee76ee6dd4a832fccaca245b0f71def3736d90e37476281c273d081234747a2_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:8b17116d4d52c8ab22a72d9c3ff5e2b0820cc0be99ccc405c4d69a3f7ef933bf_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:db1083469ea0c8bf20c10252f4e5f500dd38daca85a996e834f866f9618c3e95_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:00b683c6d8a62a7057f64700526ef5f9eb10dec3809ee1c6d6abda6f76dd79fd_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:3780b6e2fa5c3c0328a161d6328ed828879c5bdb38cc2ab451366b60ffa5b043_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:6c394c6c6de11664040b84bbdbe2ae8222bece13e36460774ab3c41fc92f932e_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:a34e02a2aa68bdad0e1d2aba40bfc782b1b5b9d2b0bc7c9fd391af7417a454a0_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:613ec029444a86d5510c67551d9b346379413f79064b4a406f8e4ad10b71f5a0_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:6ceaac04b5db279336bdefa462ae02a84e631151315cb6fc657709b72671babf_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:9f29e3a800b04a0d188957d8f9ca35c85c39107c29fdf97b5b9ba15bbec4cc29_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:d061e9013521b8b7fe281176926e8b4684fddded2bf166906d8fa5d15ac9da32_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:1294c67c44cd5ecde081e35432874b6cabdcd17252f9dfc773eb5158213550e7_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:1823cb53424d92094ff3b1a151501771c5886b25bba4bab79197ad6fd32304ef_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:c153b1c35cf9aa01c416e7d3dd90b89363715544544c09802039a7629f721c42_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:d85a0d45300376bd1ba2b272d13c65fa957bf0f78a9ae50dff27eb0d5ce95735_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:5f8f4618887f2176dc24bbf6419112f85a68e58d49ff47cb1bbd198f2e148d9d_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:93a516a33793b18899586982bbf5b3d741cd8fc6d3285972cc014f823ca75a0d_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:e3090d6f0a2ca71edf606ca49cafa063ac9ff3122f0d377ed9f25a37151d6fb0_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:eedb220436102065b61787715d917459d01e4494a15dffb90474882e8f3086b9_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-operator-bundle@sha256:39088cefc6419019cd9d83bf2f717634fcd01d9befd37b8342553956fae5dd5f_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:0d5f60990dd0863cb501bff5f7b94b979bea3f4ef05e07eb825228dfb3de3248_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:3a481555d5376183a2ee392c409739417d5778e2c0559472f9070ccfe2918e2c_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:4185f61ee8a0deb08e41e1c51753cdb6c6068c421c8e3dda7f1a86f67ab4fed3_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:5b5f6ffba68d27f81bb5c26e4fb83d80a4b72523110e622d764f9337d1cb4826_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:09eb5fdd7c085c63b62fb3eb222e6d03ef88d43e56a12440626a10d908086ff7_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:5ae8ef0d436d6e1d61d2b444a41639d5c98dfe468308d42710aa9a62e5f8fc2b_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:9068b8224f902247d20403d43f7bf66f4d6d202de2ac3f80a46d8211e42e5564_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:ff86bbf817bfc8450074d2ee2e8e55f6e500e7f23d12e3e1ef949cb49acb5e32_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: Incorrect enforcement of email constraints in crypto/x509"
},
{
"cve": "CVE-2026-33186",
"cwe": {
"id": "CWE-551",
"name": "Incorrect Behavior Order: Authorization Before Parsing and Canonicalization"
},
"discovery_date": "2026-03-20T23:02:27.802640+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:3a7d7ad6a28416cd4479b5cf1508067e10ce342f01c7bb4aa3676abbd9f43a4a_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:b54f4ec7c1e1f45077ad840b6ddbe3388b640f3acc8b29f68ff59547805ee64d_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:c9770153fe0b62c88b947de715ba5867af88c51ad65ec63d319be5a77dcc5c32_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:d3d6fc310945928456e59f5fc04d149af2729d13c27f7c980876d8709e2ce864_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:00b683c6d8a62a7057f64700526ef5f9eb10dec3809ee1c6d6abda6f76dd79fd_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:3780b6e2fa5c3c0328a161d6328ed828879c5bdb38cc2ab451366b60ffa5b043_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:6c394c6c6de11664040b84bbdbe2ae8222bece13e36460774ab3c41fc92f932e_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:a34e02a2aa68bdad0e1d2aba40bfc782b1b5b9d2b0bc7c9fd391af7417a454a0_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:1294c67c44cd5ecde081e35432874b6cabdcd17252f9dfc773eb5158213550e7_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:1823cb53424d92094ff3b1a151501771c5886b25bba4bab79197ad6fd32304ef_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:c153b1c35cf9aa01c416e7d3dd90b89363715544544c09802039a7629f721c42_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:d85a0d45300376bd1ba2b272d13c65fa957bf0f78a9ae50dff27eb0d5ce95735_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:5f8f4618887f2176dc24bbf6419112f85a68e58d49ff47cb1bbd198f2e148d9d_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:93a516a33793b18899586982bbf5b3d741cd8fc6d3285972cc014f823ca75a0d_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:e3090d6f0a2ca71edf606ca49cafa063ac9ff3122f0d377ed9f25a37151d6fb0_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:eedb220436102065b61787715d917459d01e4494a15dffb90474882e8f3086b9_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-operator-bundle@sha256:39088cefc6419019cd9d83bf2f717634fcd01d9befd37b8342553956fae5dd5f_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:09eb5fdd7c085c63b62fb3eb222e6d03ef88d43e56a12440626a10d908086ff7_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:5ae8ef0d436d6e1d61d2b444a41639d5c98dfe468308d42710aa9a62e5f8fc2b_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:9068b8224f902247d20403d43f7bf66f4d6d202de2ac3f80a46d8211e42e5564_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:ff86bbf817bfc8450074d2ee2e8e55f6e500e7f23d12e3e1ef949cb49acb5e32_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2449833"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in gRPC-Go, the Go language implementation of gRPC. This vulnerability, an authorization bypass, is caused by improper input validation of the HTTP/2 `:path` pseudo-header. A remote attacker can exploit this by sending raw HTTP/2 frames with a malformed `:path` that omits the mandatory leading slash. This allows the attacker to bypass defined security policies, potentially leading to unauthorized access to services or information disclosure.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "google.golang.org/grpc/grpc-go: google.golang.org/grpc/authz: gRPC-Go: Authorization bypass due to improper HTTP/2 path validation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:251df7bb1820fed1c75e7b5dd14ed2d12a9bf2f3b74c87f6a0027ebf0641d4e5_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:7ee76ee6dd4a832fccaca245b0f71def3736d90e37476281c273d081234747a2_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:8b17116d4d52c8ab22a72d9c3ff5e2b0820cc0be99ccc405c4d69a3f7ef933bf_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:db1083469ea0c8bf20c10252f4e5f500dd38daca85a996e834f866f9618c3e95_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:613ec029444a86d5510c67551d9b346379413f79064b4a406f8e4ad10b71f5a0_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:6ceaac04b5db279336bdefa462ae02a84e631151315cb6fc657709b72671babf_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:9f29e3a800b04a0d188957d8f9ca35c85c39107c29fdf97b5b9ba15bbec4cc29_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:d061e9013521b8b7fe281176926e8b4684fddded2bf166906d8fa5d15ac9da32_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:0d5f60990dd0863cb501bff5f7b94b979bea3f4ef05e07eb825228dfb3de3248_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:3a481555d5376183a2ee392c409739417d5778e2c0559472f9070ccfe2918e2c_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:4185f61ee8a0deb08e41e1c51753cdb6c6068c421c8e3dda7f1a86f67ab4fed3_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:5b5f6ffba68d27f81bb5c26e4fb83d80a4b72523110e622d764f9337d1cb4826_ppc64le"
],
"known_not_affected": [
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:3a7d7ad6a28416cd4479b5cf1508067e10ce342f01c7bb4aa3676abbd9f43a4a_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:b54f4ec7c1e1f45077ad840b6ddbe3388b640f3acc8b29f68ff59547805ee64d_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:c9770153fe0b62c88b947de715ba5867af88c51ad65ec63d319be5a77dcc5c32_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:d3d6fc310945928456e59f5fc04d149af2729d13c27f7c980876d8709e2ce864_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:00b683c6d8a62a7057f64700526ef5f9eb10dec3809ee1c6d6abda6f76dd79fd_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:3780b6e2fa5c3c0328a161d6328ed828879c5bdb38cc2ab451366b60ffa5b043_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:6c394c6c6de11664040b84bbdbe2ae8222bece13e36460774ab3c41fc92f932e_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:a34e02a2aa68bdad0e1d2aba40bfc782b1b5b9d2b0bc7c9fd391af7417a454a0_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:1294c67c44cd5ecde081e35432874b6cabdcd17252f9dfc773eb5158213550e7_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:1823cb53424d92094ff3b1a151501771c5886b25bba4bab79197ad6fd32304ef_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:c153b1c35cf9aa01c416e7d3dd90b89363715544544c09802039a7629f721c42_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:d85a0d45300376bd1ba2b272d13c65fa957bf0f78a9ae50dff27eb0d5ce95735_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:5f8f4618887f2176dc24bbf6419112f85a68e58d49ff47cb1bbd198f2e148d9d_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:93a516a33793b18899586982bbf5b3d741cd8fc6d3285972cc014f823ca75a0d_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:e3090d6f0a2ca71edf606ca49cafa063ac9ff3122f0d377ed9f25a37151d6fb0_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:eedb220436102065b61787715d917459d01e4494a15dffb90474882e8f3086b9_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-operator-bundle@sha256:39088cefc6419019cd9d83bf2f717634fcd01d9befd37b8342553956fae5dd5f_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:09eb5fdd7c085c63b62fb3eb222e6d03ef88d43e56a12440626a10d908086ff7_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:5ae8ef0d436d6e1d61d2b444a41639d5c98dfe468308d42710aa9a62e5f8fc2b_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:9068b8224f902247d20403d43f7bf66f4d6d202de2ac3f80a46d8211e42e5564_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:ff86bbf817bfc8450074d2ee2e8e55f6e500e7f23d12e3e1ef949cb49acb5e32_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-33186"
},
{
"category": "external",
"summary": "RHBZ#2449833",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2449833"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-33186",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33186"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186"
},
{
"category": "external",
"summary": "https://github.com/grpc/grpc-go/security/advisories/GHSA-p77j-4mvh-x3m3",
"url": "https://github.com/grpc/grpc-go/security/advisories/GHSA-p77j-4mvh-x3m3"
}
],
"release_date": "2026-03-20T22:23:32.147000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-14T15:55:27+00:00",
"details": "For release note details, see the upstream Submariner release notes:\n\nhttps://submariner.io/community/releases/\n\nDownstream-specific issues resolved:\n* ACM-28330\n* ACM-28332\n* ACM-28334\n* ACM-28336\n* ACM-28338\n* ACM-28340\n* ACM-28343\n* ACM-29328\n* ACM-29512\n* ACM-29661\n* ACM-29662\n* ACM-29681\n* ACM-29682\n* ACM-29683\n* ACM-29684\n* ACM-29777\n* ACM-29801\n* ACM-30135\n* ACM-30730\n* ACM-30731\n* ACM-31135\n* ACM-31137\n* ACM-31861\n* ACM-31872\n* ACM-31874\n* ACM-23783\n* ACM-24731\n* ACM-24797\n* ACM-25518\n* ACM-26321\n* ACM-26965\n* ACM-27273\n* ACM-28917\n* ACM-30321\n* ACM-30640\n* ACM-30970\n* ACM-8640\n\nFor more details, see the Red Hat Advanced Cluster Management for Kubernetes documentation:\n\nhttps://docs.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.15/",
"product_ids": [
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:251df7bb1820fed1c75e7b5dd14ed2d12a9bf2f3b74c87f6a0027ebf0641d4e5_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:7ee76ee6dd4a832fccaca245b0f71def3736d90e37476281c273d081234747a2_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:8b17116d4d52c8ab22a72d9c3ff5e2b0820cc0be99ccc405c4d69a3f7ef933bf_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:db1083469ea0c8bf20c10252f4e5f500dd38daca85a996e834f866f9618c3e95_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:613ec029444a86d5510c67551d9b346379413f79064b4a406f8e4ad10b71f5a0_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:6ceaac04b5db279336bdefa462ae02a84e631151315cb6fc657709b72671babf_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:9f29e3a800b04a0d188957d8f9ca35c85c39107c29fdf97b5b9ba15bbec4cc29_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:d061e9013521b8b7fe281176926e8b4684fddded2bf166906d8fa5d15ac9da32_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:0d5f60990dd0863cb501bff5f7b94b979bea3f4ef05e07eb825228dfb3de3248_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:3a481555d5376183a2ee392c409739417d5778e2c0559472f9070ccfe2918e2c_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:4185f61ee8a0deb08e41e1c51753cdb6c6068c421c8e3dda7f1a86f67ab4fed3_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:5b5f6ffba68d27f81bb5c26e4fb83d80a4b72523110e622d764f9337d1cb4826_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8151"
},
{
"category": "workaround",
"details": "To mitigate this issue, implement infrastructure-level normalization to ensure all incoming HTTP/2 `:path` headers are properly formatted with a leading slash before reaching the gRPC-Go server. This can be achieved by configuring a reverse proxy or API gateway to validate and normalize the `:path` header. Ensure that any such intermediary is properly configured and restarted to apply the changes, which may temporarily impact service availability.",
"product_ids": [
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:3a7d7ad6a28416cd4479b5cf1508067e10ce342f01c7bb4aa3676abbd9f43a4a_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:b54f4ec7c1e1f45077ad840b6ddbe3388b640f3acc8b29f68ff59547805ee64d_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:c9770153fe0b62c88b947de715ba5867af88c51ad65ec63d319be5a77dcc5c32_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:d3d6fc310945928456e59f5fc04d149af2729d13c27f7c980876d8709e2ce864_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:251df7bb1820fed1c75e7b5dd14ed2d12a9bf2f3b74c87f6a0027ebf0641d4e5_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:7ee76ee6dd4a832fccaca245b0f71def3736d90e37476281c273d081234747a2_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:8b17116d4d52c8ab22a72d9c3ff5e2b0820cc0be99ccc405c4d69a3f7ef933bf_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:db1083469ea0c8bf20c10252f4e5f500dd38daca85a996e834f866f9618c3e95_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:00b683c6d8a62a7057f64700526ef5f9eb10dec3809ee1c6d6abda6f76dd79fd_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:3780b6e2fa5c3c0328a161d6328ed828879c5bdb38cc2ab451366b60ffa5b043_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:6c394c6c6de11664040b84bbdbe2ae8222bece13e36460774ab3c41fc92f932e_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:a34e02a2aa68bdad0e1d2aba40bfc782b1b5b9d2b0bc7c9fd391af7417a454a0_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:613ec029444a86d5510c67551d9b346379413f79064b4a406f8e4ad10b71f5a0_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:6ceaac04b5db279336bdefa462ae02a84e631151315cb6fc657709b72671babf_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:9f29e3a800b04a0d188957d8f9ca35c85c39107c29fdf97b5b9ba15bbec4cc29_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:d061e9013521b8b7fe281176926e8b4684fddded2bf166906d8fa5d15ac9da32_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:1294c67c44cd5ecde081e35432874b6cabdcd17252f9dfc773eb5158213550e7_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:1823cb53424d92094ff3b1a151501771c5886b25bba4bab79197ad6fd32304ef_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:c153b1c35cf9aa01c416e7d3dd90b89363715544544c09802039a7629f721c42_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:d85a0d45300376bd1ba2b272d13c65fa957bf0f78a9ae50dff27eb0d5ce95735_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:5f8f4618887f2176dc24bbf6419112f85a68e58d49ff47cb1bbd198f2e148d9d_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:93a516a33793b18899586982bbf5b3d741cd8fc6d3285972cc014f823ca75a0d_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:e3090d6f0a2ca71edf606ca49cafa063ac9ff3122f0d377ed9f25a37151d6fb0_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:eedb220436102065b61787715d917459d01e4494a15dffb90474882e8f3086b9_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-operator-bundle@sha256:39088cefc6419019cd9d83bf2f717634fcd01d9befd37b8342553956fae5dd5f_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:0d5f60990dd0863cb501bff5f7b94b979bea3f4ef05e07eb825228dfb3de3248_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:3a481555d5376183a2ee392c409739417d5778e2c0559472f9070ccfe2918e2c_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:4185f61ee8a0deb08e41e1c51753cdb6c6068c421c8e3dda7f1a86f67ab4fed3_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:5b5f6ffba68d27f81bb5c26e4fb83d80a4b72523110e622d764f9337d1cb4826_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:09eb5fdd7c085c63b62fb3eb222e6d03ef88d43e56a12440626a10d908086ff7_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:5ae8ef0d436d6e1d61d2b444a41639d5c98dfe468308d42710aa9a62e5f8fc2b_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:9068b8224f902247d20403d43f7bf66f4d6d202de2ac3f80a46d8211e42e5564_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:ff86bbf817bfc8450074d2ee2e8e55f6e500e7f23d12e3e1ef949cb49acb5e32_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:3a7d7ad6a28416cd4479b5cf1508067e10ce342f01c7bb4aa3676abbd9f43a4a_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:b54f4ec7c1e1f45077ad840b6ddbe3388b640f3acc8b29f68ff59547805ee64d_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:c9770153fe0b62c88b947de715ba5867af88c51ad65ec63d319be5a77dcc5c32_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-agent-rhel9@sha256:d3d6fc310945928456e59f5fc04d149af2729d13c27f7c980876d8709e2ce864_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:251df7bb1820fed1c75e7b5dd14ed2d12a9bf2f3b74c87f6a0027ebf0641d4e5_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:7ee76ee6dd4a832fccaca245b0f71def3736d90e37476281c273d081234747a2_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:8b17116d4d52c8ab22a72d9c3ff5e2b0820cc0be99ccc405c4d69a3f7ef933bf_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/lighthouse-coredns-rhel9@sha256:db1083469ea0c8bf20c10252f4e5f500dd38daca85a996e834f866f9618c3e95_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:00b683c6d8a62a7057f64700526ef5f9eb10dec3809ee1c6d6abda6f76dd79fd_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:3780b6e2fa5c3c0328a161d6328ed828879c5bdb38cc2ab451366b60ffa5b043_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:6c394c6c6de11664040b84bbdbe2ae8222bece13e36460774ab3c41fc92f932e_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/nettest-rhel9@sha256:a34e02a2aa68bdad0e1d2aba40bfc782b1b5b9d2b0bc7c9fd391af7417a454a0_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:613ec029444a86d5510c67551d9b346379413f79064b4a406f8e4ad10b71f5a0_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:6ceaac04b5db279336bdefa462ae02a84e631151315cb6fc657709b72671babf_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:9f29e3a800b04a0d188957d8f9ca35c85c39107c29fdf97b5b9ba15bbec4cc29_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/subctl-rhel9@sha256:d061e9013521b8b7fe281176926e8b4684fddded2bf166906d8fa5d15ac9da32_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:1294c67c44cd5ecde081e35432874b6cabdcd17252f9dfc773eb5158213550e7_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:1823cb53424d92094ff3b1a151501771c5886b25bba4bab79197ad6fd32304ef_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:c153b1c35cf9aa01c416e7d3dd90b89363715544544c09802039a7629f721c42_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-gateway-rhel9@sha256:d85a0d45300376bd1ba2b272d13c65fa957bf0f78a9ae50dff27eb0d5ce95735_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:5f8f4618887f2176dc24bbf6419112f85a68e58d49ff47cb1bbd198f2e148d9d_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:93a516a33793b18899586982bbf5b3d741cd8fc6d3285972cc014f823ca75a0d_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:e3090d6f0a2ca71edf606ca49cafa063ac9ff3122f0d377ed9f25a37151d6fb0_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-globalnet-rhel9@sha256:eedb220436102065b61787715d917459d01e4494a15dffb90474882e8f3086b9_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-operator-bundle@sha256:39088cefc6419019cd9d83bf2f717634fcd01d9befd37b8342553956fae5dd5f_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:0d5f60990dd0863cb501bff5f7b94b979bea3f4ef05e07eb825228dfb3de3248_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:3a481555d5376183a2ee392c409739417d5778e2c0559472f9070ccfe2918e2c_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:4185f61ee8a0deb08e41e1c51753cdb6c6068c421c8e3dda7f1a86f67ab4fed3_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-rhel9-operator@sha256:5b5f6ffba68d27f81bb5c26e4fb83d80a4b72523110e622d764f9337d1cb4826_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:09eb5fdd7c085c63b62fb3eb222e6d03ef88d43e56a12440626a10d908086ff7_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:5ae8ef0d436d6e1d61d2b444a41639d5c98dfe468308d42710aa9a62e5f8fc2b_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:9068b8224f902247d20403d43f7bf66f4d6d202de2ac3f80a46d8211e42e5564_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/submariner-route-agent-rhel9@sha256:ff86bbf817bfc8450074d2ee2e8e55f6e500e7f23d12e3e1ef949cb49acb5e32_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "google.golang.org/grpc/grpc-go: google.golang.org/grpc/authz: gRPC-Go: Authorization bypass due to improper HTTP/2 path validation"
}
]
}
RHSA-2026:9385
Vulnerability from csaf_redhat - Published: 2026-04-21 15:08 - Updated: 2026-04-23 06:09A flaw was found in the crypto/tls component. This vulnerability occurs during Transport Layer Security (TLS) session resumption when certificate authority (CA) settings are modified between the initial and resumed handshakes. An attacker could exploit this to bypass certificate validation, allowing a client or server to establish a connection that should have been rejected. This could lead to an authentication bypass under specific conditions.
A flaw was found in the `github.com/antchfx/xpath` component. A remote attacker could exploit this vulnerability by submitting crafted Boolean XPath expressions that evaluate to true. This can cause an infinite loop in the `logicalQuery.Select` function, leading to 100% CPU utilization and a Denial of Service (DoS) condition for the affected system.
A flaw was found in lodash. The fix for CVE-2021-23337 added validation for the variable option in _.template but did not apply the same validation to options.imports key names. Both paths flow into the same Function() constructor sink. Additionally, _.template uses assignInWith to merge imports, which enumerates inherited properties via for..in. If Object.prototype has been polluted by any other vector, the polluted keys are copied into the imports object and passed to Function().
A flaw was found in path-to-regexp. A remote attacker could exploit this vulnerability by providing specially crafted input that generates a regular expression with multiple sequential optional groups. This leads to an exponential growth in the generated regular expression, causing a Denial of Service (DoS) due to excessive resource consumption.
The Go standard library function net/url.Parse insufficiently validated the host/authority component and accepted some invalid URLs by effectively treating garbage before an IP-literal as ignorable. The function should have rejected this as invalid.
A certificate validation flaw has been discovered in the golang crypto/x509 module. When verifying a certificate chain which contains a certificate containing multiple email address constraints which share common local portions but different domain portions, these constraints will not be properly applied, and only the last constraint will be considered.
A flaw was found in the Go standard library packages `crypto/x509` and `crypto/tls`. During the process of building a certificate chain, an attacker can provide a large number of intermediate certificates. This excessive input is not properly limited, leading to an uncontrolled amount of work being performed. This can result in a denial of service (DoS) condition, making the affected system or application unavailable to legitimate users.
A flaw was found in the internal/syscall/unix package in the Go standard library. If the target of the `Root.Chmod` function is replaced with a symbolic link during execution, specifically after `Root.Chmod` checks the target but before acting, the `chmod` operation will be performed on the file the symbolic link points to. This issue can bypass directory restrictions and lead to unauthorized permission changes on the filesystem.
A flaw was found in github.com/buger/jsonparser. The Delete function, when processing malformed JSON input, fails to properly validate offsets. This vulnerability can lead to a negative slice index and a runtime panic, allowing a remote attacker to cause a denial of service (DoS) by providing specially crafted JSON data.
A flaw was found in gRPC-Go, the Go language implementation of gRPC. This vulnerability, an authorization bypass, is caused by improper input validation of the HTTP/2 `:path` pseudo-header. A remote attacker can exploit this by sending raw HTTP/2 frames with a malformed `:path` that omits the mandatory leading slash. This allows the attacker to bypass defined security policies, potentially leading to unauthorized access to services or information disclosure.
A flaw was found in the `crypto/x509` package within Go (golang). When verifying a certificate chain, excluded DNS (Domain Name System) constraints are not correctly applied to wildcard DNS Subject Alternative Names (SANs) if the case of the SAN differs from the constraint. This oversight could allow an attacker to bypass certificate validation, potentially leading to the acceptance of a malicious certificate that should have been rejected. This issue specifically impacts the validation of trusted certificate chains.
A flaw was found in Go JOSE, a library for handling JSON Web Encryption (JWE) objects. A remote attacker could exploit this vulnerability by providing a specially crafted JWE object. When decrypting such an object, if a key wrapping algorithm is specified but the encrypted key field is empty, the application can crash. This leads to a denial of service (DoS), making the affected service unavailable to legitimate users.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift distributed tracing platform (Tempo) 3.9.2 has been released",
"title": "Topic"
},
{
"category": "general",
"text": "This release of the Red Hat OpenShift distributed tracing platform (Tempo) provides security improvements and bug fixes.\n\n\nBreaking changes:\n\n* None.\n\n\nDeprecations:\n\n* None.\n\n\nTechnology Preview features:\n\n* None.\n\n\nEnhancements:\n\n* None.\n\n\nBug fixes:\n\n* gRPC-Go authorization bypass vulnerability fix: Previously, gRPC-Go was vulnerable to an authorization bypass attack. This issue occurred because the HTTP/2 :path pseudo-header was not properly validated. Remote attackers could send raw HTTP/2 frames with a malformed :path that omitted the mandatory leading slash to bypass defined security policies. With this update, gRPC-Go properly validates the :path pseudo-header and rejects malformed requests. As a result, attackers can no longer bypass security policies to gain unauthorized access to services or disclose information. For more information, see https://access.redhat.com/security/cve/cve-2026-33186.\n\n* XPath component fix: Previously, the github.com/antchfx/xpath component did not properly handle certain Boolean XPath expressions. A remote attacker could submit a crafted expression that caused an infinite loop, resulting in 100% CPU utilization and a denial-of-service condition. With this update, the XPath component correctly processes Boolean expressions that evaluate to true. The system no longer enters an infinite loop when handling these expressions. For more information, see https://access.redhat.com/security/cve/cve-2026-4645.\n\n* Go JOSE denial-of-service vulnerability fix: Previously, the Go JOSE library for handling JSON Web Encryption (JWE) objects was vulnerable to a denial-of-service (DoS) attack. This issue occurred because the application failed when decrypting a specially crafted JWE object that specified a key wrapping algorithm but contained an empty encrypted key field. With this update, Go JOSE properly validates the encrypted key field before decryption. As a result, the application no longer crashes when processing malformed JWE objects, and the service remains available to legitimate users. For more information, see https://access.redhat.com/security/cve/cve-2026-34986.\n\n* Lodash _.template function fix: Previously, the lodash _.template function validated the variable option but did not validate options.imports key names. Both options passed values to the same code execution path. An attacker with the ability to control options.imports key names or pollute Object.prototype could exploit this gap to execute arbitrary code. With this update, lodash validates options.imports key names by using the same rules applied to the variable option. The _.template function rejects invalid key names and prevents code injection through this path. For more information, see https://access.redhat.com/security/cve/cve-2026-4800.\n\n* Go crypto/x509 and crypto/tls packages fix: Previously, the Go standard library crypto/x509 and crypto/tls packages did not limit the number of intermediate certificates processed during certificate chain building. An attacker could provide an excessive number of intermediate certificates, causing the system to perform an uncontrolled amount of work and resulting in a denial-of-service condition. With this update, the packages limit the number of intermediate certificates accepted during certificate chain validation. The system rejects certificate chains that exceed this limit. For more information, see https://access.redhat.com/security/cve/cve-2026-32280.\n\n* Go Root.Chmod function fix: Previously, the Root.Chmod function in the Go standard library internal/syscall/unix package had a race condition between checking and modifying a target file. An attacker could replace the target with a symbolic link after the check but before the operation completed, causing the permission change to apply to the linked file instead. This allowed an attacker to bypass directory restrictions and change permissions on unintended files. With this update, the Root.Chmod function prevents this race condition. The function no longer follows symbolic links that replace the target during execution. For more information, see https://access.redhat.com/security/cve/cve-2026-32282.\n\n* Go crypto/x509 package fix: Previously, the Go crypto/x509 package applied excluded DNS constraints to wildcard Subject Alternative Names (SANs) in a case-sensitive manner. An attacker could bypass certificate validation by using a different case in the wildcard SAN than the excluded DNS constraint specified. This allowed the system to accept a malicious certificate that should have been rejected. With this update, the package applies DNS constraints case-insensitively when validating wildcard SANs. Certificate chain verification correctly rejects certificates that match excluded DNS constraints regardless of case. For more information, see https://access.redhat.com/security/cve/cve-2026-33810.\n\n* Go crypto/tls component fix: Previously, the Go crypto/tls component did not re-validate certificates against updated certificate authority (CA) settings during TLS session resumption. If CA settings changed between the initial handshake and a resumed session, the component used the original CA settings. An attacker could exploit this to bypass certificate validation and establish a connection that should have been rejected. With this update, the component validates certificates against the current CA settings during session resumption. Resumed sessions that no longer meet CA requirements are rejected. For more information, see https://access.redhat.com/security/cve/cve-2025-68121.\n\n* jsonparser Delete function fix: Previously, the Delete function in the github.com/buger/jsonparser component did not validate offsets when processing malformed JSON input. A remote attacker could provide crafted JSON data that caused a runtime panic, resulting in a denial-of-service condition. With this update, the Delete function validates offsets before processing. The function handles malformed JSON input as expected. For more information, see https://access.redhat.com/security/cve/cve-2026-32285.\n\n* path-to-regexp component fix: Previously, the path-to-regexp component did not limit the complexity of generated regular expressions. A remote attacker could provide input containing multiple sequential optional groups, causing exponential growth in the generated expression and excessive resource consumption. This resulted in a denial-of-service condition. With this update, the component limits regular expression complexity. Input patterns with sequential optional groups no longer cause excessive resource consumption. For more information, see https://access.redhat.com/security/cve/cve-2026-4926.\n\n* Go net/url.Parse function fix: Previously, the Go net/url.Parse function did not properly validate the host component of URLs containing IP-literals. The function ignored invalid characters preceding IP-literals and accepted URLs that should have been rejected. With this update, the function validates the entire host component. URLs with invalid characters before IP-literals are rejected as malformed. For more information, see https://access.redhat.com/security/cve/cve-2026-25679.\n\n* Go crypto/x509 module fix: Previously, the Go crypto/x509 module did not apply all email address constraints when validating certificates. If a certificate contained multiple email constraints with the same local portion but different domain portions, the module only enforced the last constraint and ignored the others. With this update, the module applies all email address constraints during certificate chain validation. Certificates are validated against every specified email constraint. For more information, see https://access.redhat.com/security/cve/cve-2026-27137.\n\n\nKnown issues:\n\n* Gateway fails to forward OTLP HTTP traffic when receiver TLS is enabled. When Tempo Monolithic is configured with `multitenancy.enabled: true` and `ingestion.otlp.http.tls.enabled: true`, the gateway forwards OTLP HTTP traffic to the Tempo receiver using plain HTTP instead of HTTPS. As a consequence, the connection fails with a `connection reset by peer` error because the receiver expects TLS connections. OTLP gRPC ingestion through the gateway is not affected. Jira issue: https://issues.redhat.com/browse/TRACING-5973.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:9385",
"url": "https://access.redhat.com/errata/RHSA-2026:9385"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-68121",
"url": "https://access.redhat.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-25679",
"url": "https://access.redhat.com/security/cve/CVE-2026-25679"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-27137",
"url": "https://access.redhat.com/security/cve/CVE-2026-27137"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-32280",
"url": "https://access.redhat.com/security/cve/CVE-2026-32280"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-32282",
"url": "https://access.redhat.com/security/cve/CVE-2026-32282"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-32285",
"url": "https://access.redhat.com/security/cve/CVE-2026-32285"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-33186",
"url": "https://access.redhat.com/security/cve/CVE-2026-33186"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-33810",
"url": "https://access.redhat.com/security/cve/CVE-2026-33810"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-34986",
"url": "https://access.redhat.com/security/cve/CVE-2026-34986"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-4645",
"url": "https://access.redhat.com/security/cve/CVE-2026-4645"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-4800",
"url": "https://access.redhat.com/security/cve/CVE-2026-4800"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-4926",
"url": "https://access.redhat.com/security/cve/CVE-2026-4926"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/openshift_container_platform/latest/html/distributed_tracing/distributed-tracing-platform-tempo",
"url": "https://docs.redhat.com/en/documentation/openshift_container_platform/latest/html/distributed_tracing/distributed-tracing-platform-tempo"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_9385.json"
}
],
"title": "Red Hat Security Advisory: Red Hat OpenShift distributed tracing platform (Tempo) 3.9.2 release",
"tracking": {
"current_release_date": "2026-04-23T06:09:27+00:00",
"generator": {
"date": "2026-04-23T06:09:27+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.5"
}
},
"id": "RHSA-2026:9385",
"initial_release_date": "2026-04-21T15:08:38+00:00",
"revision_history": [
{
"date": "2026-04-21T15:08:38+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-04-21T15:08:49+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-23T06:09:27+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift distributed tracing 3.9.2",
"product": {
"name": "Red Hat OpenShift distributed tracing 3.9.2",
"product_id": "Red Hat OpenShift distributed tracing 3.9.2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift_distributed_tracing:3.9::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift distributed tracing"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"product_id": "registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-operator-bundle@sha256%3Ad180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1776674955"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"product_id": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-gateway-rhel9@sha256%3A61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1776435643"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"product_id": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-jaeger-query-rhel9@sha256%3A0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1776435608"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"product_id": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-gateway-opa-rhel9@sha256%3A034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1776435631"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"product_id": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-rhel9-operator@sha256%3Aa5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1776435565"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"product_id": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-query-rhel9@sha256%3A1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1776435613"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64",
"product_id": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-rhel9@sha256%3A9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1776435680"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"product_id": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-gateway-rhel9@sha256%3Ac939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1776435643"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"product_id": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-jaeger-query-rhel9@sha256%3A81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1776435608"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"product_id": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-gateway-opa-rhel9@sha256%3Aa66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1776435631"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"product_id": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-rhel9-operator@sha256%3A0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1776435565"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"product_id": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-query-rhel9@sha256%3A3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1776435613"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"product_id": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-rhel9@sha256%3A53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1776435680"
}
}
}
],
"category": "architecture",
"name": "arm64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"product_id": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/tempo-gateway-rhel9@sha256%3A9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1776435643"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"product_id": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/tempo-jaeger-query-rhel9@sha256%3A15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1776435608"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"product_id": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/tempo-gateway-opa-rhel9@sha256%3A9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1776435631"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"product_id": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/tempo-rhel9-operator@sha256%3A1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1776435565"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"product_id": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/tempo-query-rhel9@sha256%3A820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1776435613"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"product_id": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/tempo-rhel9@sha256%3A55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1776435680"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"product_id": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"product_identification_helper": {
"purl": "pkg:oci/tempo-gateway-rhel9@sha256%3A59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1776435643"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"product_id": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"product_identification_helper": {
"purl": "pkg:oci/tempo-jaeger-query-rhel9@sha256%3A63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1776435608"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"product_id": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"product_identification_helper": {
"purl": "pkg:oci/tempo-gateway-opa-rhel9@sha256%3Ab68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1776435631"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x",
"product_id": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x",
"product_identification_helper": {
"purl": "pkg:oci/tempo-rhel9-operator@sha256%3Ac7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1776435565"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"product_id": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"product_identification_helper": {
"purl": "pkg:oci/tempo-query-rhel9@sha256%3Aee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1776435613"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"product_id": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"product_identification_helper": {
"purl": "pkg:oci/tempo-rhel9@sha256%3A0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1776435680"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64 as a component of Red Hat OpenShift distributed tracing 3.9.2",
"product_id": "Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le as a component of Red Hat OpenShift distributed tracing 3.9.2",
"product_id": "Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64 as a component of Red Hat OpenShift distributed tracing 3.9.2",
"product_id": "Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x as a component of Red Hat OpenShift distributed tracing 3.9.2",
"product_id": "Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x as a component of Red Hat OpenShift distributed tracing 3.9.2",
"product_id": "Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64 as a component of Red Hat OpenShift distributed tracing 3.9.2",
"product_id": "Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le as a component of Red Hat OpenShift distributed tracing 3.9.2",
"product_id": "Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64 as a component of Red Hat OpenShift distributed tracing 3.9.2",
"product_id": "Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64 as a component of Red Hat OpenShift distributed tracing 3.9.2",
"product_id": "Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le as a component of Red Hat OpenShift distributed tracing 3.9.2",
"product_id": "Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x as a component of Red Hat OpenShift distributed tracing 3.9.2",
"product_id": "Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64 as a component of Red Hat OpenShift distributed tracing 3.9.2",
"product_id": "Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64 as a component of Red Hat OpenShift distributed tracing 3.9.2",
"product_id": "Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64 as a component of Red Hat OpenShift distributed tracing 3.9.2",
"product_id": "Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64 as a component of Red Hat OpenShift distributed tracing 3.9.2",
"product_id": "Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le as a component of Red Hat OpenShift distributed tracing 3.9.2",
"product_id": "Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x as a component of Red Hat OpenShift distributed tracing 3.9.2",
"product_id": "Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64 as a component of Red Hat OpenShift distributed tracing 3.9.2",
"product_id": "Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le as a component of Red Hat OpenShift distributed tracing 3.9.2",
"product_id": "Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64 as a component of Red Hat OpenShift distributed tracing 3.9.2",
"product_id": "Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x as a component of Red Hat OpenShift distributed tracing 3.9.2",
"product_id": "Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x as a component of Red Hat OpenShift distributed tracing 3.9.2",
"product_id": "Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64 as a component of Red Hat OpenShift distributed tracing 3.9.2",
"product_id": "Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le as a component of Red Hat OpenShift distributed tracing 3.9.2",
"product_id": "Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64 as a component of Red Hat OpenShift distributed tracing 3.9.2",
"product_id": "Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-68121",
"discovery_date": "2026-02-05T18:01:30.086058+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2437111"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the crypto/tls component. This vulnerability occurs during Transport Layer Security (TLS) session resumption when certificate authority (CA) settings are modified between the initial and resumed handshakes. An attacker could exploit this to bypass certificate validation, allowing a client or server to establish a connection that should have been rejected. This could lead to an authentication bypass under specific conditions.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/tls: crypto/tls: Incorrect certificate validation during TLS session resumption",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This is a moderate flaw because it only occurs under specific conditions, such as TLS session resumption with runtime changes to certificate authority settings. Exploitation is not straightforward and requires a controlled setup. The impact is limited to certificate validation within the same component and does not affect system availability.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
],
"known_not_affected": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "RHBZ#2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"category": "external",
"summary": "https://go.dev/cl/737700",
"url": "https://go.dev/cl/737700"
},
{
"category": "external",
"summary": "https://go.dev/issue/77217",
"url": "https://go.dev/issue/77217"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk",
"url": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4337",
"url": "https://pkg.go.dev/vuln/GO-2026-4337"
}
],
"release_date": "2026-02-05T17:48:44.141000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-21T15:08:38+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/latest/html/operators/administrator-tasks#olm-upgrading-operators",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:9385"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "crypto/tls: crypto/tls: Incorrect certificate validation during TLS session resumption"
},
{
"cve": "CVE-2026-4645",
"discovery_date": "2026-03-23T06:02:52.120840+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x"
]
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the `github.com/antchfx/xpath` component. A remote attacker could exploit this vulnerability by submitting crafted Boolean XPath expressions that evaluate to true. This can cause an infinite loop in the `logicalQuery.Select` function, leading to 100% CPU utilization and a Denial of Service (DoS) condition for the affected system.",
"title": "Vulnerability description"
},
{
"category": "other",
"text": "A denial of service vulnerability was discovered in `github.com/antchfx/xpath`, with Important severity. Systems processing untrusted XPath expressions are vulnerable to an infinite loop, leading to 100% CPU utilization which would impact normal operations of the system.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
],
"known_not_affected": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-4645"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-4645",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-4645"
}
],
"release_date": "2026-03-17T20:58:59+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-21T15:08:38+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/latest/html/operators/administrator-tasks#olm-upgrading-operators",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:9385"
},
{
"category": "workaround",
"details": "To mitigate this issue, restrict the processing of untrusted or unvalidated XPath expressions by applications which utilize the `github.com/antchfx/xpath` component. Implement input validation and sanitization for all XPath expressions originating from external or untrusted sources. If possible, configure applications to only process XPath expressions from trusted sources or disable features that allow arbitrary XPath expression evaluation.",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "github.com/antchfx/xpath: xpath: Denial of Service via crafted Boolean XPath expressions"
},
{
"cve": "CVE-2026-4800",
"cwe": {
"id": "CWE-94",
"name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
},
"discovery_date": "2026-03-31T20:01:21.918257+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2453496"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in lodash. The fix for CVE-2021-23337 added validation for the variable option in _.template but did not apply the same validation to options.imports key names. Both paths flow into the same Function() constructor sink. Additionally, _.template uses assignInWith to merge imports, which enumerates inherited properties via for..in. If Object.prototype has been polluted by any other vector, the polluted keys are copied into the imports object and passed to Function().",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "lodash: lodash: Arbitrary code execution via untrusted input in template imports",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "In the context of Red Hat Enterprise Linux, the grafana and grafana-pcp packages execute the affected JavaScript entirely client-side within the user\u0027s browser. Consequently, the attack surface is strictly restricted to the local browser environment.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64"
],
"known_not_affected": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-4800"
},
{
"category": "external",
"summary": "RHBZ#2453496",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453496"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-4800",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-4800"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-4800",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4800"
},
{
"category": "external",
"summary": "https://cna.openjsf.org/security-advisories.html",
"url": "https://cna.openjsf.org/security-advisories.html"
},
{
"category": "external",
"summary": "https://github.com/advisories/GHSA-35jh-r3h4-6jhm",
"url": "https://github.com/advisories/GHSA-35jh-r3h4-6jhm"
},
{
"category": "external",
"summary": "https://github.com/lodash/lodash/commit/3469357cff396a26c363f8c1b5a91dde28ba4b1c",
"url": "https://github.com/lodash/lodash/commit/3469357cff396a26c363f8c1b5a91dde28ba4b1c"
}
],
"release_date": "2026-03-31T19:25:55.987000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-21T15:08:38+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/latest/html/operators/administrator-tasks#olm-upgrading-operators",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:9385"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "lodash: lodash: Arbitrary code execution via untrusted input in template imports"
},
{
"cve": "CVE-2026-4926",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"discovery_date": "2026-03-26T20:03:28.427630+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2451867"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in path-to-regexp. A remote attacker could exploit this vulnerability by providing specially crafted input that generates a regular expression with multiple sequential optional groups. This leads to an exponential growth in the generated regular expression, causing a Denial of Service (DoS) due to excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "path-to-regexp: path-to-regexp: Denial of Service via crafted regular expressions",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This is an Important flaw in `path-to-regexp` that can lead to a Denial of Service. The vulnerability occurs when specially crafted input containing multiple sequential optional groups is used to generate regular expressions, causing exponential resource consumption.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64"
],
"known_not_affected": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-4926"
},
{
"category": "external",
"summary": "RHBZ#2451867",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2451867"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-4926",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-4926"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-4926",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4926"
},
{
"category": "external",
"summary": "https://cna.openjsf.org/security-advisories.html",
"url": "https://cna.openjsf.org/security-advisories.html"
}
],
"release_date": "2026-03-26T18:59:38+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-21T15:08:38+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/latest/html/operators/administrator-tasks#olm-upgrading-operators",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:9385"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, limit the use of multiple sequential optional groups in route patterns within applications that use `path-to-regexp`. Additionally, avoid directly passing user-controlled input as route patterns to prevent the generation of maliciously crafted regular expressions.",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "path-to-regexp: path-to-regexp: Denial of Service via crafted regular expressions"
},
{
"cve": "CVE-2026-25679",
"cwe": {
"id": "CWE-1286",
"name": "Improper Validation of Syntactic Correctness of Input"
},
"discovery_date": "2026-03-06T22:02:11.567841+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2445356"
}
],
"notes": [
{
"category": "description",
"text": "The Go standard library function net/url.Parse insufficiently validated the host/authority component and accepted some invalid URLs by effectively treating garbage before an IP-literal as ignorable. The function should have rejected this as invalid.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "net/url: Incorrect parsing of IPv6 host literals in net/url",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
],
"known_not_affected": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-25679"
},
{
"category": "external",
"summary": "RHBZ#2445356",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2445356"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-25679",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25679"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-25679",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25679"
},
{
"category": "external",
"summary": "https://go.dev/cl/752180",
"url": "https://go.dev/cl/752180"
},
{
"category": "external",
"summary": "https://go.dev/issue/77578",
"url": "https://go.dev/issue/77578"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk",
"url": "https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4601",
"url": "https://pkg.go.dev/vuln/GO-2026-4601"
}
],
"release_date": "2026-03-06T21:28:14.211000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-21T15:08:38+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/latest/html/operators/administrator-tasks#olm-upgrading-operators",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:9385"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "net/url: Incorrect parsing of IPv6 host literals in net/url"
},
{
"cve": "CVE-2026-27137",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"discovery_date": "2026-03-06T22:01:38.859733+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2445345"
}
],
"notes": [
{
"category": "description",
"text": "A certificate validation flaw has been discovered in the golang crypto/x509 module. When verifying a certificate chain which contains a certificate containing multiple email address constraints which share common local portions but different domain portions, these constraints will not be properly applied, and only the last constraint will be considered.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: Incorrect enforcement of email constraints in crypto/x509",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
],
"known_not_affected": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-27137"
},
{
"category": "external",
"summary": "RHBZ#2445345",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2445345"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-27137",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27137"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-27137",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27137"
},
{
"category": "external",
"summary": "https://go.dev/cl/752182",
"url": "https://go.dev/cl/752182"
},
{
"category": "external",
"summary": "https://go.dev/issue/77952",
"url": "https://go.dev/issue/77952"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk",
"url": "https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4599",
"url": "https://pkg.go.dev/vuln/GO-2026-4599"
}
],
"release_date": "2026-03-06T21:28:13.748000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-21T15:08:38+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/latest/html/operators/administrator-tasks#olm-upgrading-operators",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:9385"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: Incorrect enforcement of email constraints in crypto/x509"
},
{
"cve": "CVE-2026-32280",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-04-08T02:01:19.572351+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2456339"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Go standard library packages `crypto/x509` and `crypto/tls`. During the process of building a certificate chain, an attacker can provide a large number of intermediate certificates. This excessive input is not properly limited, leading to an uncontrolled amount of work being performed. This can result in a denial of service (DoS) condition, making the affected system or application unavailable to legitimate users.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: crypto/tls: golang: Go: Denial of Service vulnerability in certificate chain building",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
],
"known_not_affected": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-32280"
},
{
"category": "external",
"summary": "RHBZ#2456339",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2456339"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-32280",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32280"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-32280",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32280"
},
{
"category": "external",
"summary": "https://go.dev/cl/758320",
"url": "https://go.dev/cl/758320"
},
{
"category": "external",
"summary": "https://go.dev/issue/78282",
"url": "https://go.dev/issue/78282"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU",
"url": "https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4947",
"url": "https://pkg.go.dev/vuln/GO-2026-4947"
}
],
"release_date": "2026-04-08T01:06:58.595000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-21T15:08:38+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/latest/html/operators/administrator-tasks#olm-upgrading-operators",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:9385"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: crypto/tls: golang: Go: Denial of Service vulnerability in certificate chain building"
},
{
"cve": "CVE-2026-32282",
"cwe": {
"id": "CWE-367",
"name": "Time-of-check Time-of-use (TOCTOU) Race Condition"
},
"discovery_date": "2026-04-08T02:01:12.683211+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2456336"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the internal/syscall/unix package in the Go standard library. If the target of the `Root.Chmod` function is replaced with a symbolic link during execution, specifically after `Root.Chmod` checks the target but before acting, the `chmod` operation will be performed on the file the symbolic link points to. This issue can bypass directory restrictions and lead to unauthorized permission changes on the filesystem.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: internal/syscall/unix: Root.Chmod can follow symlinks out of the root",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this issue, an attacker needs access to the system and the required permissions to create a symbolic link. Additionally, the attacker must swap the target file with a symbolic link in the exact window after the `Root.Chmod` function checks its target but before acting. Due to these conditions, this flaw has been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
],
"known_not_affected": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-32282"
},
{
"category": "external",
"summary": "RHBZ#2456336",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2456336"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-32282",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32282"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-32282",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32282"
},
{
"category": "external",
"summary": "https://go.dev/cl/763761",
"url": "https://go.dev/cl/763761"
},
{
"category": "external",
"summary": "https://go.dev/issue/78293",
"url": "https://go.dev/issue/78293"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU",
"url": "https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4864",
"url": "https://pkg.go.dev/vuln/GO-2026-4864"
}
],
"release_date": "2026-04-08T01:06:55.953000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-21T15:08:38+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/latest/html/operators/administrator-tasks#olm-upgrading-operators",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:9385"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: internal/syscall/unix: Root.Chmod can follow symlinks out of the root"
},
{
"cve": "CVE-2026-32285",
"cwe": {
"id": "CWE-1285",
"name": "Improper Validation of Specified Index, Position, or Offset in Input"
},
"discovery_date": "2026-03-26T20:01:54.925687+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2451846"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in github.com/buger/jsonparser. The Delete function, when processing malformed JSON input, fails to properly validate offsets. This vulnerability can lead to a negative slice index and a runtime panic, allowing a remote attacker to cause a denial of service (DoS) by providing specially crafted JSON data.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "github.com/buger/jsonparser: github.com/buger/jsonparser: Denial of Service via malformed JSON input",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
],
"known_not_affected": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-32285"
},
{
"category": "external",
"summary": "RHBZ#2451846",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2451846"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-32285",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32285"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-32285",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32285"
},
{
"category": "external",
"summary": "https://github.com/buger/jsonparser/issues/275",
"url": "https://github.com/buger/jsonparser/issues/275"
},
{
"category": "external",
"summary": "https://github.com/golang/vulndb/issues/4514",
"url": "https://github.com/golang/vulndb/issues/4514"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4514",
"url": "https://pkg.go.dev/vuln/GO-2026-4514"
}
],
"release_date": "2026-03-26T19:40:51.837000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-21T15:08:38+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/latest/html/operators/administrator-tasks#olm-upgrading-operators",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:9385"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "github.com/buger/jsonparser: github.com/buger/jsonparser: Denial of Service via malformed JSON input"
},
{
"cve": "CVE-2026-33186",
"cwe": {
"id": "CWE-551",
"name": "Incorrect Behavior Order: Authorization Before Parsing and Canonicalization"
},
"discovery_date": "2026-03-20T23:02:27.802640+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2449833"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in gRPC-Go, the Go language implementation of gRPC. This vulnerability, an authorization bypass, is caused by improper input validation of the HTTP/2 `:path` pseudo-header. A remote attacker can exploit this by sending raw HTTP/2 frames with a malformed `:path` that omits the mandatory leading slash. This allows the attacker to bypass defined security policies, potentially leading to unauthorized access to services or information disclosure.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "google.golang.org/grpc/grpc-go: google.golang.org/grpc/authz: gRPC-Go: Authorization bypass due to improper HTTP/2 path validation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
],
"known_not_affected": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-33186"
},
{
"category": "external",
"summary": "RHBZ#2449833",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2449833"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-33186",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33186"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186"
},
{
"category": "external",
"summary": "https://github.com/grpc/grpc-go/security/advisories/GHSA-p77j-4mvh-x3m3",
"url": "https://github.com/grpc/grpc-go/security/advisories/GHSA-p77j-4mvh-x3m3"
}
],
"release_date": "2026-03-20T22:23:32.147000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-21T15:08:38+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/latest/html/operators/administrator-tasks#olm-upgrading-operators",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:9385"
},
{
"category": "workaround",
"details": "To mitigate this issue, implement infrastructure-level normalization to ensure all incoming HTTP/2 `:path` headers are properly formatted with a leading slash before reaching the gRPC-Go server. This can be achieved by configuring a reverse proxy or API gateway to validate and normalize the `:path` header. Ensure that any such intermediary is properly configured and restarted to apply the changes, which may temporarily impact service availability.",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "google.golang.org/grpc/grpc-go: google.golang.org/grpc/authz: gRPC-Go: Authorization bypass due to improper HTTP/2 path validation"
},
{
"cve": "CVE-2026-33810",
"cwe": {
"id": "CWE-1289",
"name": "Improper Validation of Unsafe Equivalence in Input"
},
"discovery_date": "2026-04-08T02:01:09.100830+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2456335"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the `crypto/x509` package within Go (golang). When verifying a certificate chain, excluded DNS (Domain Name System) constraints are not correctly applied to wildcard DNS Subject Alternative Names (SANs) if the case of the SAN differs from the constraint. This oversight could allow an attacker to bypass certificate validation, potentially leading to the acceptance of a malicious certificate that should have been rejected. This issue specifically impacts the validation of trusted certificate chains.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Go crypto/x509: Certificate validation bypass due to incorrect DNS constraint application",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
],
"known_not_affected": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-33810"
},
{
"category": "external",
"summary": "RHBZ#2456335",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2456335"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-33810",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33810"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-33810",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33810"
},
{
"category": "external",
"summary": "https://go.dev/cl/763763",
"url": "https://go.dev/cl/763763"
},
{
"category": "external",
"summary": "https://go.dev/issue/78332",
"url": "https://go.dev/issue/78332"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU",
"url": "https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4866",
"url": "https://pkg.go.dev/vuln/GO-2026-4866"
}
],
"release_date": "2026-04-08T01:06:56.546000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-21T15:08:38+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/latest/html/operators/administrator-tasks#olm-upgrading-operators",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:9385"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Go crypto/x509: Certificate validation bypass due to incorrect DNS constraint application"
},
{
"cve": "CVE-2026-34986",
"cwe": {
"id": "CWE-131",
"name": "Incorrect Calculation of Buffer Size"
},
"discovery_date": "2026-04-06T17:01:34.639203+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2455470"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Go JOSE, a library for handling JSON Web Encryption (JWE) objects. A remote attacker could exploit this vulnerability by providing a specially crafted JWE object. When decrypting such an object, if a key wrapping algorithm is specified but the encrypted key field is empty, the application can crash. This leads to a denial of service (DoS), making the affected service unavailable to legitimate users.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "github.com/go-jose/go-jose/v3: github.com/go-jose/go-jose/v4: Go JOSE: Denial of Service via crafted JSON Web Encryption (JWE) object",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
],
"known_not_affected": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-34986"
},
{
"category": "external",
"summary": "RHBZ#2455470",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2455470"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-34986",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34986"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-34986",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34986"
},
{
"category": "external",
"summary": "https://github.com/go-jose/go-jose/security/advisories/GHSA-78h2-9frx-2jm8",
"url": "https://github.com/go-jose/go-jose/security/advisories/GHSA-78h2-9frx-2jm8"
},
{
"category": "external",
"summary": "https://pkg.go.dev/github.com/go-jose/go-jose/v4#pkg-constants",
"url": "https://pkg.go.dev/github.com/go-jose/go-jose/v4#pkg-constants"
}
],
"release_date": "2026-04-06T16:22:45.353000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-21T15:08:38+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/latest/html/operators/administrator-tasks#olm-upgrading-operators",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:9385"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "github.com/go-jose/go-jose/v3: github.com/go-jose/go-jose/v4: Go JOSE: Denial of Service via crafted JSON Web Encryption (JWE) object"
}
]
}
RHSA-2026:9052
Vulnerability from csaf_redhat - Published: 2026-04-20 14:01 - Updated: 2026-04-23 06:09The Go standard library function net/url.Parse insufficiently validated the host/authority component and accepted some invalid URLs by effectively treating garbage before an IP-literal as ignorable. The function should have rejected this as invalid.
A certificate validation flaw has been discovered in the golang crypto/x509 module. When verifying a certificate chain which contains a certificate containing multiple email address constraints which share common local portions but different domain portions, these constraints will not be properly applied, and only the last constraint will be considered.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for Red Hat Lightspeed (formerly Insights) for Runtimes on RHEL 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "An update is now available for Red Hat Lightspeed (formerly Insights) for Runtimes on RHEL 9.\n\nSecurity fix(es):\n\n* crypto/x509: Incorrect enforcement of email constraints in crypto/x509 (CVE-2026-27137)\n* net/url: Incorrect parsing of IPv6 host literals in net/url (CVE-2026-25679)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:9052",
"url": "https://access.redhat.com/errata/RHSA-2026:9052"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-25679",
"url": "https://access.redhat.com/security/cve/CVE-2026-25679"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-27137",
"url": "https://access.redhat.com/security/cve/CVE-2026-27137"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_9052.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Lightspeed (formerly Insights) for Runtimes security update",
"tracking": {
"current_release_date": "2026-04-23T06:09:25+00:00",
"generator": {
"date": "2026-04-23T06:09:25+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.5"
}
},
"id": "RHSA-2026:9052",
"initial_release_date": "2026-04-20T14:01:31+00:00",
"revision_history": [
{
"date": "2026-04-20T14:01:31+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-04-20T14:01:38+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-23T06:09:25+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Lightspeed (formerly Insights) for Runtimes 1",
"product": {
"name": "Red Hat Lightspeed (formerly Insights) for Runtimes 1",
"product_id": "Red Hat Lightspeed (formerly Insights) for Runtimes 1",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:lightspeed_for_runtimes:1.0::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat Lightspeed (formerly Insights) for Runtimes"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:37405eb98fc40f9b04ce0a5bdc37bd3941c1f3a3eee2c7a5195e0ccfd561364e_amd64",
"product": {
"name": "registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:37405eb98fc40f9b04ce0a5bdc37bd3941c1f3a3eee2c7a5195e0ccfd561364e_amd64",
"product_id": "registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:37405eb98fc40f9b04ce0a5bdc37bd3941c1f3a3eee2c7a5195e0ccfd561364e_amd64",
"product_identification_helper": {
"purl": "pkg:oci/runtimes-inventory-rhel9-operator@sha256%3A37405eb98fc40f9b04ce0a5bdc37bd3941c1f3a3eee2c7a5195e0ccfd561364e?arch=amd64\u0026repository_url=registry.redhat.io/rh-lightspeed-runtimes\u0026tag=1.0.2-1776288486"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-operator-bundle@sha256:e4f8aee3f5516d88ba4125cef4c162e19c87ae1654c46069c59a0b26aec172bb_amd64",
"product": {
"name": "registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-operator-bundle@sha256:e4f8aee3f5516d88ba4125cef4c162e19c87ae1654c46069c59a0b26aec172bb_amd64",
"product_id": "registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-operator-bundle@sha256:e4f8aee3f5516d88ba4125cef4c162e19c87ae1654c46069c59a0b26aec172bb_amd64",
"product_identification_helper": {
"purl": "pkg:oci/runtimes-inventory-operator-bundle@sha256%3Ae4f8aee3f5516d88ba4125cef4c162e19c87ae1654c46069c59a0b26aec172bb?arch=amd64\u0026repository_url=registry.redhat.io/rh-lightspeed-runtimes\u0026tag=1.0.2-1776372510"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:d71235e8467fad21686023bc3b843222cd40b5b44de614d28592b6ffb4b7d4b6_arm64",
"product": {
"name": "registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:d71235e8467fad21686023bc3b843222cd40b5b44de614d28592b6ffb4b7d4b6_arm64",
"product_id": "registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:d71235e8467fad21686023bc3b843222cd40b5b44de614d28592b6ffb4b7d4b6_arm64",
"product_identification_helper": {
"purl": "pkg:oci/runtimes-inventory-rhel9-operator@sha256%3Ad71235e8467fad21686023bc3b843222cd40b5b44de614d28592b6ffb4b7d4b6?arch=arm64\u0026repository_url=registry.redhat.io/rh-lightspeed-runtimes\u0026tag=1.0.2-1776288486"
}
}
}
],
"category": "architecture",
"name": "arm64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:7058c6cb9f9feb524dd8ae915fa266540a1c3ff05a8bc90f558a16ee99891799_ppc64le",
"product": {
"name": "registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:7058c6cb9f9feb524dd8ae915fa266540a1c3ff05a8bc90f558a16ee99891799_ppc64le",
"product_id": "registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:7058c6cb9f9feb524dd8ae915fa266540a1c3ff05a8bc90f558a16ee99891799_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/runtimes-inventory-rhel9-operator@sha256%3A7058c6cb9f9feb524dd8ae915fa266540a1c3ff05a8bc90f558a16ee99891799?arch=ppc64le\u0026repository_url=registry.redhat.io/rh-lightspeed-runtimes\u0026tag=1.0.2-1776288486"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:e65ed233ea4b24fc1bbdd82e7719e797067fa53ea99ba0c3b9aa50e2ca8dc2b6_s390x",
"product": {
"name": "registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:e65ed233ea4b24fc1bbdd82e7719e797067fa53ea99ba0c3b9aa50e2ca8dc2b6_s390x",
"product_id": "registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:e65ed233ea4b24fc1bbdd82e7719e797067fa53ea99ba0c3b9aa50e2ca8dc2b6_s390x",
"product_identification_helper": {
"purl": "pkg:oci/runtimes-inventory-rhel9-operator@sha256%3Ae65ed233ea4b24fc1bbdd82e7719e797067fa53ea99ba0c3b9aa50e2ca8dc2b6?arch=s390x\u0026repository_url=registry.redhat.io/rh-lightspeed-runtimes\u0026tag=1.0.2-1776288486"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-operator-bundle@sha256:e4f8aee3f5516d88ba4125cef4c162e19c87ae1654c46069c59a0b26aec172bb_amd64 as a component of Red Hat Lightspeed (formerly Insights) for Runtimes 1",
"product_id": "Red Hat Lightspeed (formerly Insights) for Runtimes 1:registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-operator-bundle@sha256:e4f8aee3f5516d88ba4125cef4c162e19c87ae1654c46069c59a0b26aec172bb_amd64"
},
"product_reference": "registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-operator-bundle@sha256:e4f8aee3f5516d88ba4125cef4c162e19c87ae1654c46069c59a0b26aec172bb_amd64",
"relates_to_product_reference": "Red Hat Lightspeed (formerly Insights) for Runtimes 1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:37405eb98fc40f9b04ce0a5bdc37bd3941c1f3a3eee2c7a5195e0ccfd561364e_amd64 as a component of Red Hat Lightspeed (formerly Insights) for Runtimes 1",
"product_id": "Red Hat Lightspeed (formerly Insights) for Runtimes 1:registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:37405eb98fc40f9b04ce0a5bdc37bd3941c1f3a3eee2c7a5195e0ccfd561364e_amd64"
},
"product_reference": "registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:37405eb98fc40f9b04ce0a5bdc37bd3941c1f3a3eee2c7a5195e0ccfd561364e_amd64",
"relates_to_product_reference": "Red Hat Lightspeed (formerly Insights) for Runtimes 1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:7058c6cb9f9feb524dd8ae915fa266540a1c3ff05a8bc90f558a16ee99891799_ppc64le as a component of Red Hat Lightspeed (formerly Insights) for Runtimes 1",
"product_id": "Red Hat Lightspeed (formerly Insights) for Runtimes 1:registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:7058c6cb9f9feb524dd8ae915fa266540a1c3ff05a8bc90f558a16ee99891799_ppc64le"
},
"product_reference": "registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:7058c6cb9f9feb524dd8ae915fa266540a1c3ff05a8bc90f558a16ee99891799_ppc64le",
"relates_to_product_reference": "Red Hat Lightspeed (formerly Insights) for Runtimes 1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:d71235e8467fad21686023bc3b843222cd40b5b44de614d28592b6ffb4b7d4b6_arm64 as a component of Red Hat Lightspeed (formerly Insights) for Runtimes 1",
"product_id": "Red Hat Lightspeed (formerly Insights) for Runtimes 1:registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:d71235e8467fad21686023bc3b843222cd40b5b44de614d28592b6ffb4b7d4b6_arm64"
},
"product_reference": "registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:d71235e8467fad21686023bc3b843222cd40b5b44de614d28592b6ffb4b7d4b6_arm64",
"relates_to_product_reference": "Red Hat Lightspeed (formerly Insights) for Runtimes 1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:e65ed233ea4b24fc1bbdd82e7719e797067fa53ea99ba0c3b9aa50e2ca8dc2b6_s390x as a component of Red Hat Lightspeed (formerly Insights) for Runtimes 1",
"product_id": "Red Hat Lightspeed (formerly Insights) for Runtimes 1:registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:e65ed233ea4b24fc1bbdd82e7719e797067fa53ea99ba0c3b9aa50e2ca8dc2b6_s390x"
},
"product_reference": "registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:e65ed233ea4b24fc1bbdd82e7719e797067fa53ea99ba0c3b9aa50e2ca8dc2b6_s390x",
"relates_to_product_reference": "Red Hat Lightspeed (formerly Insights) for Runtimes 1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-25679",
"cwe": {
"id": "CWE-1286",
"name": "Improper Validation of Syntactic Correctness of Input"
},
"discovery_date": "2026-03-06T22:02:11.567841+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Lightspeed (formerly Insights) for Runtimes 1:registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-operator-bundle@sha256:e4f8aee3f5516d88ba4125cef4c162e19c87ae1654c46069c59a0b26aec172bb_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2445356"
}
],
"notes": [
{
"category": "description",
"text": "The Go standard library function net/url.Parse insufficiently validated the host/authority component and accepted some invalid URLs by effectively treating garbage before an IP-literal as ignorable. The function should have rejected this as invalid.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "net/url: Incorrect parsing of IPv6 host literals in net/url",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Lightspeed (formerly Insights) for Runtimes 1:registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:37405eb98fc40f9b04ce0a5bdc37bd3941c1f3a3eee2c7a5195e0ccfd561364e_amd64",
"Red Hat Lightspeed (formerly Insights) for Runtimes 1:registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:7058c6cb9f9feb524dd8ae915fa266540a1c3ff05a8bc90f558a16ee99891799_ppc64le",
"Red Hat Lightspeed (formerly Insights) for Runtimes 1:registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:d71235e8467fad21686023bc3b843222cd40b5b44de614d28592b6ffb4b7d4b6_arm64",
"Red Hat Lightspeed (formerly Insights) for Runtimes 1:registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:e65ed233ea4b24fc1bbdd82e7719e797067fa53ea99ba0c3b9aa50e2ca8dc2b6_s390x"
],
"known_not_affected": [
"Red Hat Lightspeed (formerly Insights) for Runtimes 1:registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-operator-bundle@sha256:e4f8aee3f5516d88ba4125cef4c162e19c87ae1654c46069c59a0b26aec172bb_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-25679"
},
{
"category": "external",
"summary": "RHBZ#2445356",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2445356"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-25679",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25679"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-25679",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25679"
},
{
"category": "external",
"summary": "https://go.dev/cl/752180",
"url": "https://go.dev/cl/752180"
},
{
"category": "external",
"summary": "https://go.dev/issue/77578",
"url": "https://go.dev/issue/77578"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk",
"url": "https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4601",
"url": "https://pkg.go.dev/vuln/GO-2026-4601"
}
],
"release_date": "2026-03-06T21:28:14.211000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-20T14:01:31+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Lightspeed (formerly Insights) for Runtimes 1:registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:37405eb98fc40f9b04ce0a5bdc37bd3941c1f3a3eee2c7a5195e0ccfd561364e_amd64",
"Red Hat Lightspeed (formerly Insights) for Runtimes 1:registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:7058c6cb9f9feb524dd8ae915fa266540a1c3ff05a8bc90f558a16ee99891799_ppc64le",
"Red Hat Lightspeed (formerly Insights) for Runtimes 1:registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:d71235e8467fad21686023bc3b843222cd40b5b44de614d28592b6ffb4b7d4b6_arm64",
"Red Hat Lightspeed (formerly Insights) for Runtimes 1:registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:e65ed233ea4b24fc1bbdd82e7719e797067fa53ea99ba0c3b9aa50e2ca8dc2b6_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:9052"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Lightspeed (formerly Insights) for Runtimes 1:registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-operator-bundle@sha256:e4f8aee3f5516d88ba4125cef4c162e19c87ae1654c46069c59a0b26aec172bb_amd64",
"Red Hat Lightspeed (formerly Insights) for Runtimes 1:registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:37405eb98fc40f9b04ce0a5bdc37bd3941c1f3a3eee2c7a5195e0ccfd561364e_amd64",
"Red Hat Lightspeed (formerly Insights) for Runtimes 1:registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:7058c6cb9f9feb524dd8ae915fa266540a1c3ff05a8bc90f558a16ee99891799_ppc64le",
"Red Hat Lightspeed (formerly Insights) for Runtimes 1:registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:d71235e8467fad21686023bc3b843222cd40b5b44de614d28592b6ffb4b7d4b6_arm64",
"Red Hat Lightspeed (formerly Insights) for Runtimes 1:registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:e65ed233ea4b24fc1bbdd82e7719e797067fa53ea99ba0c3b9aa50e2ca8dc2b6_s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Lightspeed (formerly Insights) for Runtimes 1:registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-operator-bundle@sha256:e4f8aee3f5516d88ba4125cef4c162e19c87ae1654c46069c59a0b26aec172bb_amd64",
"Red Hat Lightspeed (formerly Insights) for Runtimes 1:registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:37405eb98fc40f9b04ce0a5bdc37bd3941c1f3a3eee2c7a5195e0ccfd561364e_amd64",
"Red Hat Lightspeed (formerly Insights) for Runtimes 1:registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:7058c6cb9f9feb524dd8ae915fa266540a1c3ff05a8bc90f558a16ee99891799_ppc64le",
"Red Hat Lightspeed (formerly Insights) for Runtimes 1:registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:d71235e8467fad21686023bc3b843222cd40b5b44de614d28592b6ffb4b7d4b6_arm64",
"Red Hat Lightspeed (formerly Insights) for Runtimes 1:registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:e65ed233ea4b24fc1bbdd82e7719e797067fa53ea99ba0c3b9aa50e2ca8dc2b6_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "net/url: Incorrect parsing of IPv6 host literals in net/url"
},
{
"cve": "CVE-2026-27137",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"discovery_date": "2026-03-06T22:01:38.859733+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Lightspeed (formerly Insights) for Runtimes 1:registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-operator-bundle@sha256:e4f8aee3f5516d88ba4125cef4c162e19c87ae1654c46069c59a0b26aec172bb_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2445345"
}
],
"notes": [
{
"category": "description",
"text": "A certificate validation flaw has been discovered in the golang crypto/x509 module. When verifying a certificate chain which contains a certificate containing multiple email address constraints which share common local portions but different domain portions, these constraints will not be properly applied, and only the last constraint will be considered.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: Incorrect enforcement of email constraints in crypto/x509",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Lightspeed (formerly Insights) for Runtimes 1:registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:37405eb98fc40f9b04ce0a5bdc37bd3941c1f3a3eee2c7a5195e0ccfd561364e_amd64",
"Red Hat Lightspeed (formerly Insights) for Runtimes 1:registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:7058c6cb9f9feb524dd8ae915fa266540a1c3ff05a8bc90f558a16ee99891799_ppc64le",
"Red Hat Lightspeed (formerly Insights) for Runtimes 1:registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:d71235e8467fad21686023bc3b843222cd40b5b44de614d28592b6ffb4b7d4b6_arm64",
"Red Hat Lightspeed (formerly Insights) for Runtimes 1:registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:e65ed233ea4b24fc1bbdd82e7719e797067fa53ea99ba0c3b9aa50e2ca8dc2b6_s390x"
],
"known_not_affected": [
"Red Hat Lightspeed (formerly Insights) for Runtimes 1:registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-operator-bundle@sha256:e4f8aee3f5516d88ba4125cef4c162e19c87ae1654c46069c59a0b26aec172bb_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-27137"
},
{
"category": "external",
"summary": "RHBZ#2445345",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2445345"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-27137",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27137"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-27137",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27137"
},
{
"category": "external",
"summary": "https://go.dev/cl/752182",
"url": "https://go.dev/cl/752182"
},
{
"category": "external",
"summary": "https://go.dev/issue/77952",
"url": "https://go.dev/issue/77952"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk",
"url": "https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4599",
"url": "https://pkg.go.dev/vuln/GO-2026-4599"
}
],
"release_date": "2026-03-06T21:28:13.748000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-20T14:01:31+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Lightspeed (formerly Insights) for Runtimes 1:registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:37405eb98fc40f9b04ce0a5bdc37bd3941c1f3a3eee2c7a5195e0ccfd561364e_amd64",
"Red Hat Lightspeed (formerly Insights) for Runtimes 1:registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:7058c6cb9f9feb524dd8ae915fa266540a1c3ff05a8bc90f558a16ee99891799_ppc64le",
"Red Hat Lightspeed (formerly Insights) for Runtimes 1:registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:d71235e8467fad21686023bc3b843222cd40b5b44de614d28592b6ffb4b7d4b6_arm64",
"Red Hat Lightspeed (formerly Insights) for Runtimes 1:registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:e65ed233ea4b24fc1bbdd82e7719e797067fa53ea99ba0c3b9aa50e2ca8dc2b6_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:9052"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Lightspeed (formerly Insights) for Runtimes 1:registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-operator-bundle@sha256:e4f8aee3f5516d88ba4125cef4c162e19c87ae1654c46069c59a0b26aec172bb_amd64",
"Red Hat Lightspeed (formerly Insights) for Runtimes 1:registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:37405eb98fc40f9b04ce0a5bdc37bd3941c1f3a3eee2c7a5195e0ccfd561364e_amd64",
"Red Hat Lightspeed (formerly Insights) for Runtimes 1:registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:7058c6cb9f9feb524dd8ae915fa266540a1c3ff05a8bc90f558a16ee99891799_ppc64le",
"Red Hat Lightspeed (formerly Insights) for Runtimes 1:registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:d71235e8467fad21686023bc3b843222cd40b5b44de614d28592b6ffb4b7d4b6_arm64",
"Red Hat Lightspeed (formerly Insights) for Runtimes 1:registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:e65ed233ea4b24fc1bbdd82e7719e797067fa53ea99ba0c3b9aa50e2ca8dc2b6_s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Lightspeed (formerly Insights) for Runtimes 1:registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-operator-bundle@sha256:e4f8aee3f5516d88ba4125cef4c162e19c87ae1654c46069c59a0b26aec172bb_amd64",
"Red Hat Lightspeed (formerly Insights) for Runtimes 1:registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:37405eb98fc40f9b04ce0a5bdc37bd3941c1f3a3eee2c7a5195e0ccfd561364e_amd64",
"Red Hat Lightspeed (formerly Insights) for Runtimes 1:registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:7058c6cb9f9feb524dd8ae915fa266540a1c3ff05a8bc90f558a16ee99891799_ppc64le",
"Red Hat Lightspeed (formerly Insights) for Runtimes 1:registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:d71235e8467fad21686023bc3b843222cd40b5b44de614d28592b6ffb4b7d4b6_arm64",
"Red Hat Lightspeed (formerly Insights) for Runtimes 1:registry.redhat.io/rh-lightspeed-runtimes/runtimes-inventory-rhel9-operator@sha256:e65ed233ea4b24fc1bbdd82e7719e797067fa53ea99ba0c3b9aa50e2ca8dc2b6_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: Incorrect enforcement of email constraints in crypto/x509"
}
]
}
RHSA-2026:8338
Vulnerability from csaf_redhat - Published: 2026-04-15 18:17 - Updated: 2026-04-23 06:09A flaw was found in the net/url package in the Go standard library. The package does not enforce a limit on the number of unique query parameters it parses. A Go application using the net/http.Request.ParseForm method will try to process all parameters provided in the request. A specially crafted HTTP request containing a massive number of query parameters will cause the application to consume an excessive amount of memory, eventually causing the application to crash or become unresponsive, resulting in a denial of service.
A flaw was found in golang. A remote attacker could exploit this vulnerability by providing a specially crafted certificate during the error string construction process within the `HostnameError.Error()` function. This flaw, caused by unbounded string concatenation, leads to excessive resource consumption. Successful exploitation can result in a denial of service (DoS) for the affected system.
A flaw was found in the crypto/tls component. This vulnerability occurs during Transport Layer Security (TLS) session resumption when certificate authority (CA) settings are modified between the initial and resumed handshakes. An attacker could exploit this to bypass certificate validation, allowing a client or server to establish a connection that should have been rejected. This could lead to an authentication bypass under specific conditions.
The Go standard library function net/url.Parse insufficiently validated the host/authority component and accepted some invalid URLs by effectively treating garbage before an IP-literal as ignorable. The function should have rejected this as invalid.
A certificate validation flaw has been discovered in the golang crypto/x509 module. When verifying a certificate chain which contains a certificate containing multiple email address constraints which share common local portions but different domain portions, these constraints will not be properly applied, and only the last constraint will be considered.
A flaw was found in gRPC-Go, the Go language implementation of gRPC. This vulnerability, an authorization bypass, is caused by improper input validation of the HTTP/2 `:path` pseudo-header. A remote attacker can exploit this by sending raw HTTP/2 frames with a malformed `:path` that omits the mandatory leading slash. This allows the attacker to bypass defined security policies, potentially leading to unauthorized access to services or information disclosure.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat Web Terminal Operator 1.13.0 has been released.",
"title": "Topic"
},
{
"category": "general",
"text": "The Web Terminal provides a way to access a fully in-browser terminal emulator within the OpenShift Console. Command-line tools for interacting with the OpenShift cluster are pre-installed.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:8338",
"url": "https://access.redhat.com/errata/RHSA-2026:8338"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61726",
"url": "https://access.redhat.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61729",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-68121",
"url": "https://access.redhat.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-25679",
"url": "https://access.redhat.com/security/cve/CVE-2026-25679"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-27137",
"url": "https://access.redhat.com/security/cve/CVE-2026-27137"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-33186",
"url": "https://access.redhat.com/security/cve/CVE-2026-33186"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "external",
"summary": "https://redhat.atlassian.net/browse/WTO-366",
"url": "https://redhat.atlassian.net/browse/WTO-366"
},
{
"category": "external",
"summary": "https://redhat.atlassian.net/browse/WTO-371",
"url": "https://redhat.atlassian.net/browse/WTO-371"
},
{
"category": "external",
"summary": "https://redhat.atlassian.net/browse/WTO-375",
"url": "https://redhat.atlassian.net/browse/WTO-375"
},
{
"category": "external",
"summary": "https://redhat.atlassian.net/browse/WTO-381",
"url": "https://redhat.atlassian.net/browse/WTO-381"
},
{
"category": "external",
"summary": "https://redhat.atlassian.net/browse/WTO-386",
"url": "https://redhat.atlassian.net/browse/WTO-386"
},
{
"category": "external",
"summary": "https://redhat.atlassian.net/browse/WTO-391",
"url": "https://redhat.atlassian.net/browse/WTO-391"
},
{
"category": "external",
"summary": "https://redhat.atlassian.net/browse/WTO-396",
"url": "https://redhat.atlassian.net/browse/WTO-396"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_8338.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Web Terminal Operator 1.13.0 release.",
"tracking": {
"current_release_date": "2026-04-23T06:09:10+00:00",
"generator": {
"date": "2026-04-23T06:09:10+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.5"
}
},
"id": "RHSA-2026:8338",
"initial_release_date": "2026-04-15T18:17:16+00:00",
"revision_history": [
{
"date": "2026-04-15T18:17:16+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-04-15T18:17:23+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-23T06:09:10+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Web Terminal 1.13",
"product": {
"name": "Red Hat Web Terminal 1.13",
"product_id": "Red Hat Web Terminal 1.13",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:webterminal:1.13::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat Web Terminal"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:33aedbb88539c99ebf0a85e99a1f0b7e681f69a9ee281e88c5ff214e54d85d8a_amd64",
"product": {
"name": "registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:33aedbb88539c99ebf0a85e99a1f0b7e681f69a9ee281e88c5ff214e54d85d8a_amd64",
"product_id": "registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:33aedbb88539c99ebf0a85e99a1f0b7e681f69a9ee281e88c5ff214e54d85d8a_amd64",
"product_identification_helper": {
"purl": "pkg:oci/web-terminal-exec-rhel9@sha256%3A33aedbb88539c99ebf0a85e99a1f0b7e681f69a9ee281e88c5ff214e54d85d8a?arch=amd64\u0026repository_url=registry.redhat.io/web-terminal\u0026tag=1776197785"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:c9e040ffac9873b07f37d29b8c83cbebf5f380d94c46be86ad63798afe8ba363_amd64",
"product": {
"name": "registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:c9e040ffac9873b07f37d29b8c83cbebf5f380d94c46be86ad63798afe8ba363_amd64",
"product_id": "registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:c9e040ffac9873b07f37d29b8c83cbebf5f380d94c46be86ad63798afe8ba363_amd64",
"product_identification_helper": {
"purl": "pkg:oci/web-terminal-rhel9-operator@sha256%3Ac9e040ffac9873b07f37d29b8c83cbebf5f380d94c46be86ad63798afe8ba363?arch=amd64\u0026repository_url=registry.redhat.io/web-terminal\u0026tag=1776197691"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:54ef39794ebdb90596e4666bb89e23a4fad8fe8cdc79eb825f1c57af5af9951b_amd64",
"product": {
"name": "registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:54ef39794ebdb90596e4666bb89e23a4fad8fe8cdc79eb825f1c57af5af9951b_amd64",
"product_id": "registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:54ef39794ebdb90596e4666bb89e23a4fad8fe8cdc79eb825f1c57af5af9951b_amd64",
"product_identification_helper": {
"purl": "pkg:oci/web-terminal-operator-bundle@sha256%3A54ef39794ebdb90596e4666bb89e23a4fad8fe8cdc79eb825f1c57af5af9951b?arch=amd64\u0026repository_url=registry.redhat.io/web-terminal\u0026tag=1776197674"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:790b2a87d81149568d58618db96e7804068b2bc112ff9313e0a06e95ac9841de_amd64",
"product": {
"name": "registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:790b2a87d81149568d58618db96e7804068b2bc112ff9313e0a06e95ac9841de_amd64",
"product_id": "registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:790b2a87d81149568d58618db96e7804068b2bc112ff9313e0a06e95ac9841de_amd64",
"product_identification_helper": {
"purl": "pkg:oci/web-terminal-tooling-rhel9@sha256%3A790b2a87d81149568d58618db96e7804068b2bc112ff9313e0a06e95ac9841de?arch=amd64\u0026repository_url=registry.redhat.io/web-terminal\u0026tag=1776197792"
}
}
}
],
"category": "architecture",
"name": "amd64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:33aedbb88539c99ebf0a85e99a1f0b7e681f69a9ee281e88c5ff214e54d85d8a_amd64 as a component of Red Hat Web Terminal 1.13",
"product_id": "Red Hat Web Terminal 1.13:registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:33aedbb88539c99ebf0a85e99a1f0b7e681f69a9ee281e88c5ff214e54d85d8a_amd64"
},
"product_reference": "registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:33aedbb88539c99ebf0a85e99a1f0b7e681f69a9ee281e88c5ff214e54d85d8a_amd64",
"relates_to_product_reference": "Red Hat Web Terminal 1.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:54ef39794ebdb90596e4666bb89e23a4fad8fe8cdc79eb825f1c57af5af9951b_amd64 as a component of Red Hat Web Terminal 1.13",
"product_id": "Red Hat Web Terminal 1.13:registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:54ef39794ebdb90596e4666bb89e23a4fad8fe8cdc79eb825f1c57af5af9951b_amd64"
},
"product_reference": "registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:54ef39794ebdb90596e4666bb89e23a4fad8fe8cdc79eb825f1c57af5af9951b_amd64",
"relates_to_product_reference": "Red Hat Web Terminal 1.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:c9e040ffac9873b07f37d29b8c83cbebf5f380d94c46be86ad63798afe8ba363_amd64 as a component of Red Hat Web Terminal 1.13",
"product_id": "Red Hat Web Terminal 1.13:registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:c9e040ffac9873b07f37d29b8c83cbebf5f380d94c46be86ad63798afe8ba363_amd64"
},
"product_reference": "registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:c9e040ffac9873b07f37d29b8c83cbebf5f380d94c46be86ad63798afe8ba363_amd64",
"relates_to_product_reference": "Red Hat Web Terminal 1.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:790b2a87d81149568d58618db96e7804068b2bc112ff9313e0a06e95ac9841de_amd64 as a component of Red Hat Web Terminal 1.13",
"product_id": "Red Hat Web Terminal 1.13:registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:790b2a87d81149568d58618db96e7804068b2bc112ff9313e0a06e95ac9841de_amd64"
},
"product_reference": "registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:790b2a87d81149568d58618db96e7804068b2bc112ff9313e0a06e95ac9841de_amd64",
"relates_to_product_reference": "Red Hat Web Terminal 1.13"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61726",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:42.791305+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Web Terminal 1.13:registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:54ef39794ebdb90596e4666bb89e23a4fad8fe8cdc79eb825f1c57af5af9951b_amd64",
"Red Hat Web Terminal 1.13:registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:790b2a87d81149568d58618db96e7804068b2bc112ff9313e0a06e95ac9841de_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434432"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the net/url package in the Go standard library. The package does not enforce a limit on the number of unique query parameters it parses. A Go application using the net/http.Request.ParseForm method will try to process all parameters provided in the request. A specially crafted HTTP request containing a massive number of query parameters will cause the application to consume an excessive amount of memory, eventually causing the application to crash or become unresponsive, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/url: Memory exhaustion in query parameter parsing in net/url",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker must be able to send a specially crafted HTTP request to an application parsing URL-encoded forms with net/url, specifically a request containing a large number of unique query parameters. The request will cause the application to consume an excessive amount of memory and eventually result in a denial of service, with no impact to confidentiality or integrity. Due to this reason, this vulnerability has been rated with an important severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Web Terminal 1.13:registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:33aedbb88539c99ebf0a85e99a1f0b7e681f69a9ee281e88c5ff214e54d85d8a_amd64",
"Red Hat Web Terminal 1.13:registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:c9e040ffac9873b07f37d29b8c83cbebf5f380d94c46be86ad63798afe8ba363_amd64"
],
"known_not_affected": [
"Red Hat Web Terminal 1.13:registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:54ef39794ebdb90596e4666bb89e23a4fad8fe8cdc79eb825f1c57af5af9951b_amd64",
"Red Hat Web Terminal 1.13:registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:790b2a87d81149568d58618db96e7804068b2bc112ff9313e0a06e95ac9841de_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "RHBZ#2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"category": "external",
"summary": "https://go.dev/cl/736712",
"url": "https://go.dev/cl/736712"
},
{
"category": "external",
"summary": "https://go.dev/issue/77101",
"url": "https://go.dev/issue/77101"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4341",
"url": "https://pkg.go.dev/vuln/GO-2026-4341"
}
],
"release_date": "2026-01-28T19:30:31.215000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-15T18:17:16+00:00",
"details": "To start using the Web Terminal Operator, install the Web Terminal Operator from OpenShift OperatorHub on OpenShift Container Platform 4.18 or higher.",
"product_ids": [
"Red Hat Web Terminal 1.13:registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:33aedbb88539c99ebf0a85e99a1f0b7e681f69a9ee281e88c5ff214e54d85d8a_amd64",
"Red Hat Web Terminal 1.13:registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:c9e040ffac9873b07f37d29b8c83cbebf5f380d94c46be86ad63798afe8ba363_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8338"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"Red Hat Web Terminal 1.13:registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:33aedbb88539c99ebf0a85e99a1f0b7e681f69a9ee281e88c5ff214e54d85d8a_amd64",
"Red Hat Web Terminal 1.13:registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:54ef39794ebdb90596e4666bb89e23a4fad8fe8cdc79eb825f1c57af5af9951b_amd64",
"Red Hat Web Terminal 1.13:registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:c9e040ffac9873b07f37d29b8c83cbebf5f380d94c46be86ad63798afe8ba363_amd64",
"Red Hat Web Terminal 1.13:registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:790b2a87d81149568d58618db96e7804068b2bc112ff9313e0a06e95ac9841de_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Web Terminal 1.13:registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:33aedbb88539c99ebf0a85e99a1f0b7e681f69a9ee281e88c5ff214e54d85d8a_amd64",
"Red Hat Web Terminal 1.13:registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:54ef39794ebdb90596e4666bb89e23a4fad8fe8cdc79eb825f1c57af5af9951b_amd64",
"Red Hat Web Terminal 1.13:registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:c9e040ffac9873b07f37d29b8c83cbebf5f380d94c46be86ad63798afe8ba363_amd64",
"Red Hat Web Terminal 1.13:registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:790b2a87d81149568d58618db96e7804068b2bc112ff9313e0a06e95ac9841de_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: net/url: Memory exhaustion in query parameter parsing in net/url"
},
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Web Terminal 1.13:registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:54ef39794ebdb90596e4666bb89e23a4fad8fe8cdc79eb825f1c57af5af9951b_amd64",
"Red Hat Web Terminal 1.13:registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:c9e040ffac9873b07f37d29b8c83cbebf5f380d94c46be86ad63798afe8ba363_amd64",
"Red Hat Web Terminal 1.13:registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:790b2a87d81149568d58618db96e7804068b2bc112ff9313e0a06e95ac9841de_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang. A remote attacker could exploit this vulnerability by providing a specially crafted certificate during the error string construction process within the `HostnameError.Error()` function. This flaw, caused by unbounded string concatenation, leads to excessive resource consumption. Successful exploitation can result in a denial of service (DoS) for the affected system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Web Terminal 1.13:registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:33aedbb88539c99ebf0a85e99a1f0b7e681f69a9ee281e88c5ff214e54d85d8a_amd64"
],
"known_not_affected": [
"Red Hat Web Terminal 1.13:registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:54ef39794ebdb90596e4666bb89e23a4fad8fe8cdc79eb825f1c57af5af9951b_amd64",
"Red Hat Web Terminal 1.13:registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:c9e040ffac9873b07f37d29b8c83cbebf5f380d94c46be86ad63798afe8ba363_amd64",
"Red Hat Web Terminal 1.13:registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:790b2a87d81149568d58618db96e7804068b2bc112ff9313e0a06e95ac9841de_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-15T18:17:16+00:00",
"details": "To start using the Web Terminal Operator, install the Web Terminal Operator from OpenShift OperatorHub on OpenShift Container Platform 4.18 or higher.",
"product_ids": [
"Red Hat Web Terminal 1.13:registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:33aedbb88539c99ebf0a85e99a1f0b7e681f69a9ee281e88c5ff214e54d85d8a_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8338"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Web Terminal 1.13:registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:33aedbb88539c99ebf0a85e99a1f0b7e681f69a9ee281e88c5ff214e54d85d8a_amd64",
"Red Hat Web Terminal 1.13:registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:54ef39794ebdb90596e4666bb89e23a4fad8fe8cdc79eb825f1c57af5af9951b_amd64",
"Red Hat Web Terminal 1.13:registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:c9e040ffac9873b07f37d29b8c83cbebf5f380d94c46be86ad63798afe8ba363_amd64",
"Red Hat Web Terminal 1.13:registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:790b2a87d81149568d58618db96e7804068b2bc112ff9313e0a06e95ac9841de_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
},
{
"cve": "CVE-2025-68121",
"discovery_date": "2026-02-05T18:01:30.086058+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Web Terminal 1.13:registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:54ef39794ebdb90596e4666bb89e23a4fad8fe8cdc79eb825f1c57af5af9951b_amd64",
"Red Hat Web Terminal 1.13:registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:c9e040ffac9873b07f37d29b8c83cbebf5f380d94c46be86ad63798afe8ba363_amd64",
"Red Hat Web Terminal 1.13:registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:790b2a87d81149568d58618db96e7804068b2bc112ff9313e0a06e95ac9841de_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2437111"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the crypto/tls component. This vulnerability occurs during Transport Layer Security (TLS) session resumption when certificate authority (CA) settings are modified between the initial and resumed handshakes. An attacker could exploit this to bypass certificate validation, allowing a client or server to establish a connection that should have been rejected. This could lead to an authentication bypass under specific conditions.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/tls: crypto/tls: Incorrect certificate validation during TLS session resumption",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This is a moderate flaw because it only occurs under specific conditions, such as TLS session resumption with runtime changes to certificate authority settings. Exploitation is not straightforward and requires a controlled setup. The impact is limited to certificate validation within the same component and does not affect system availability.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Web Terminal 1.13:registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:33aedbb88539c99ebf0a85e99a1f0b7e681f69a9ee281e88c5ff214e54d85d8a_amd64"
],
"known_not_affected": [
"Red Hat Web Terminal 1.13:registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:54ef39794ebdb90596e4666bb89e23a4fad8fe8cdc79eb825f1c57af5af9951b_amd64",
"Red Hat Web Terminal 1.13:registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:c9e040ffac9873b07f37d29b8c83cbebf5f380d94c46be86ad63798afe8ba363_amd64",
"Red Hat Web Terminal 1.13:registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:790b2a87d81149568d58618db96e7804068b2bc112ff9313e0a06e95ac9841de_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "RHBZ#2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"category": "external",
"summary": "https://go.dev/cl/737700",
"url": "https://go.dev/cl/737700"
},
{
"category": "external",
"summary": "https://go.dev/issue/77217",
"url": "https://go.dev/issue/77217"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk",
"url": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4337",
"url": "https://pkg.go.dev/vuln/GO-2026-4337"
}
],
"release_date": "2026-02-05T17:48:44.141000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-15T18:17:16+00:00",
"details": "To start using the Web Terminal Operator, install the Web Terminal Operator from OpenShift OperatorHub on OpenShift Container Platform 4.18 or higher.",
"product_ids": [
"Red Hat Web Terminal 1.13:registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:33aedbb88539c99ebf0a85e99a1f0b7e681f69a9ee281e88c5ff214e54d85d8a_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8338"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Web Terminal 1.13:registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:33aedbb88539c99ebf0a85e99a1f0b7e681f69a9ee281e88c5ff214e54d85d8a_amd64",
"Red Hat Web Terminal 1.13:registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:54ef39794ebdb90596e4666bb89e23a4fad8fe8cdc79eb825f1c57af5af9951b_amd64",
"Red Hat Web Terminal 1.13:registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:c9e040ffac9873b07f37d29b8c83cbebf5f380d94c46be86ad63798afe8ba363_amd64",
"Red Hat Web Terminal 1.13:registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:790b2a87d81149568d58618db96e7804068b2bc112ff9313e0a06e95ac9841de_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "crypto/tls: crypto/tls: Incorrect certificate validation during TLS session resumption"
},
{
"cve": "CVE-2026-25679",
"cwe": {
"id": "CWE-1286",
"name": "Improper Validation of Syntactic Correctness of Input"
},
"discovery_date": "2026-03-06T22:02:11.567841+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Web Terminal 1.13:registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:54ef39794ebdb90596e4666bb89e23a4fad8fe8cdc79eb825f1c57af5af9951b_amd64",
"Red Hat Web Terminal 1.13:registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:c9e040ffac9873b07f37d29b8c83cbebf5f380d94c46be86ad63798afe8ba363_amd64",
"Red Hat Web Terminal 1.13:registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:790b2a87d81149568d58618db96e7804068b2bc112ff9313e0a06e95ac9841de_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2445356"
}
],
"notes": [
{
"category": "description",
"text": "The Go standard library function net/url.Parse insufficiently validated the host/authority component and accepted some invalid URLs by effectively treating garbage before an IP-literal as ignorable. The function should have rejected this as invalid.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "net/url: Incorrect parsing of IPv6 host literals in net/url",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Web Terminal 1.13:registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:33aedbb88539c99ebf0a85e99a1f0b7e681f69a9ee281e88c5ff214e54d85d8a_amd64"
],
"known_not_affected": [
"Red Hat Web Terminal 1.13:registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:54ef39794ebdb90596e4666bb89e23a4fad8fe8cdc79eb825f1c57af5af9951b_amd64",
"Red Hat Web Terminal 1.13:registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:c9e040ffac9873b07f37d29b8c83cbebf5f380d94c46be86ad63798afe8ba363_amd64",
"Red Hat Web Terminal 1.13:registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:790b2a87d81149568d58618db96e7804068b2bc112ff9313e0a06e95ac9841de_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-25679"
},
{
"category": "external",
"summary": "RHBZ#2445356",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2445356"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-25679",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25679"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-25679",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25679"
},
{
"category": "external",
"summary": "https://go.dev/cl/752180",
"url": "https://go.dev/cl/752180"
},
{
"category": "external",
"summary": "https://go.dev/issue/77578",
"url": "https://go.dev/issue/77578"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk",
"url": "https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4601",
"url": "https://pkg.go.dev/vuln/GO-2026-4601"
}
],
"release_date": "2026-03-06T21:28:14.211000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-15T18:17:16+00:00",
"details": "To start using the Web Terminal Operator, install the Web Terminal Operator from OpenShift OperatorHub on OpenShift Container Platform 4.18 or higher.",
"product_ids": [
"Red Hat Web Terminal 1.13:registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:33aedbb88539c99ebf0a85e99a1f0b7e681f69a9ee281e88c5ff214e54d85d8a_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8338"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Web Terminal 1.13:registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:33aedbb88539c99ebf0a85e99a1f0b7e681f69a9ee281e88c5ff214e54d85d8a_amd64",
"Red Hat Web Terminal 1.13:registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:54ef39794ebdb90596e4666bb89e23a4fad8fe8cdc79eb825f1c57af5af9951b_amd64",
"Red Hat Web Terminal 1.13:registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:c9e040ffac9873b07f37d29b8c83cbebf5f380d94c46be86ad63798afe8ba363_amd64",
"Red Hat Web Terminal 1.13:registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:790b2a87d81149568d58618db96e7804068b2bc112ff9313e0a06e95ac9841de_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Web Terminal 1.13:registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:33aedbb88539c99ebf0a85e99a1f0b7e681f69a9ee281e88c5ff214e54d85d8a_amd64",
"Red Hat Web Terminal 1.13:registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:54ef39794ebdb90596e4666bb89e23a4fad8fe8cdc79eb825f1c57af5af9951b_amd64",
"Red Hat Web Terminal 1.13:registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:c9e040ffac9873b07f37d29b8c83cbebf5f380d94c46be86ad63798afe8ba363_amd64",
"Red Hat Web Terminal 1.13:registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:790b2a87d81149568d58618db96e7804068b2bc112ff9313e0a06e95ac9841de_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "net/url: Incorrect parsing of IPv6 host literals in net/url"
},
{
"cve": "CVE-2026-27137",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"discovery_date": "2026-03-06T22:01:38.859733+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Web Terminal 1.13:registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:54ef39794ebdb90596e4666bb89e23a4fad8fe8cdc79eb825f1c57af5af9951b_amd64",
"Red Hat Web Terminal 1.13:registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:c9e040ffac9873b07f37d29b8c83cbebf5f380d94c46be86ad63798afe8ba363_amd64",
"Red Hat Web Terminal 1.13:registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:790b2a87d81149568d58618db96e7804068b2bc112ff9313e0a06e95ac9841de_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2445345"
}
],
"notes": [
{
"category": "description",
"text": "A certificate validation flaw has been discovered in the golang crypto/x509 module. When verifying a certificate chain which contains a certificate containing multiple email address constraints which share common local portions but different domain portions, these constraints will not be properly applied, and only the last constraint will be considered.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: Incorrect enforcement of email constraints in crypto/x509",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Web Terminal 1.13:registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:33aedbb88539c99ebf0a85e99a1f0b7e681f69a9ee281e88c5ff214e54d85d8a_amd64"
],
"known_not_affected": [
"Red Hat Web Terminal 1.13:registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:54ef39794ebdb90596e4666bb89e23a4fad8fe8cdc79eb825f1c57af5af9951b_amd64",
"Red Hat Web Terminal 1.13:registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:c9e040ffac9873b07f37d29b8c83cbebf5f380d94c46be86ad63798afe8ba363_amd64",
"Red Hat Web Terminal 1.13:registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:790b2a87d81149568d58618db96e7804068b2bc112ff9313e0a06e95ac9841de_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-27137"
},
{
"category": "external",
"summary": "RHBZ#2445345",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2445345"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-27137",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27137"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-27137",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27137"
},
{
"category": "external",
"summary": "https://go.dev/cl/752182",
"url": "https://go.dev/cl/752182"
},
{
"category": "external",
"summary": "https://go.dev/issue/77952",
"url": "https://go.dev/issue/77952"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk",
"url": "https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4599",
"url": "https://pkg.go.dev/vuln/GO-2026-4599"
}
],
"release_date": "2026-03-06T21:28:13.748000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-15T18:17:16+00:00",
"details": "To start using the Web Terminal Operator, install the Web Terminal Operator from OpenShift OperatorHub on OpenShift Container Platform 4.18 or higher.",
"product_ids": [
"Red Hat Web Terminal 1.13:registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:33aedbb88539c99ebf0a85e99a1f0b7e681f69a9ee281e88c5ff214e54d85d8a_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8338"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Web Terminal 1.13:registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:33aedbb88539c99ebf0a85e99a1f0b7e681f69a9ee281e88c5ff214e54d85d8a_amd64",
"Red Hat Web Terminal 1.13:registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:54ef39794ebdb90596e4666bb89e23a4fad8fe8cdc79eb825f1c57af5af9951b_amd64",
"Red Hat Web Terminal 1.13:registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:c9e040ffac9873b07f37d29b8c83cbebf5f380d94c46be86ad63798afe8ba363_amd64",
"Red Hat Web Terminal 1.13:registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:790b2a87d81149568d58618db96e7804068b2bc112ff9313e0a06e95ac9841de_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Web Terminal 1.13:registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:33aedbb88539c99ebf0a85e99a1f0b7e681f69a9ee281e88c5ff214e54d85d8a_amd64",
"Red Hat Web Terminal 1.13:registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:54ef39794ebdb90596e4666bb89e23a4fad8fe8cdc79eb825f1c57af5af9951b_amd64",
"Red Hat Web Terminal 1.13:registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:c9e040ffac9873b07f37d29b8c83cbebf5f380d94c46be86ad63798afe8ba363_amd64",
"Red Hat Web Terminal 1.13:registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:790b2a87d81149568d58618db96e7804068b2bc112ff9313e0a06e95ac9841de_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: Incorrect enforcement of email constraints in crypto/x509"
},
{
"cve": "CVE-2026-33186",
"cwe": {
"id": "CWE-551",
"name": "Incorrect Behavior Order: Authorization Before Parsing and Canonicalization"
},
"discovery_date": "2026-03-20T23:02:27.802640+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Web Terminal 1.13:registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:33aedbb88539c99ebf0a85e99a1f0b7e681f69a9ee281e88c5ff214e54d85d8a_amd64",
"Red Hat Web Terminal 1.13:registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:54ef39794ebdb90596e4666bb89e23a4fad8fe8cdc79eb825f1c57af5af9951b_amd64",
"Red Hat Web Terminal 1.13:registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:c9e040ffac9873b07f37d29b8c83cbebf5f380d94c46be86ad63798afe8ba363_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2449833"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in gRPC-Go, the Go language implementation of gRPC. This vulnerability, an authorization bypass, is caused by improper input validation of the HTTP/2 `:path` pseudo-header. A remote attacker can exploit this by sending raw HTTP/2 frames with a malformed `:path` that omits the mandatory leading slash. This allows the attacker to bypass defined security policies, potentially leading to unauthorized access to services or information disclosure.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "google.golang.org/grpc/grpc-go: google.golang.org/grpc/authz: gRPC-Go: Authorization bypass due to improper HTTP/2 path validation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Web Terminal 1.13:registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:790b2a87d81149568d58618db96e7804068b2bc112ff9313e0a06e95ac9841de_amd64"
],
"known_not_affected": [
"Red Hat Web Terminal 1.13:registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:33aedbb88539c99ebf0a85e99a1f0b7e681f69a9ee281e88c5ff214e54d85d8a_amd64",
"Red Hat Web Terminal 1.13:registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:54ef39794ebdb90596e4666bb89e23a4fad8fe8cdc79eb825f1c57af5af9951b_amd64",
"Red Hat Web Terminal 1.13:registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:c9e040ffac9873b07f37d29b8c83cbebf5f380d94c46be86ad63798afe8ba363_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-33186"
},
{
"category": "external",
"summary": "RHBZ#2449833",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2449833"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-33186",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33186"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186"
},
{
"category": "external",
"summary": "https://github.com/grpc/grpc-go/security/advisories/GHSA-p77j-4mvh-x3m3",
"url": "https://github.com/grpc/grpc-go/security/advisories/GHSA-p77j-4mvh-x3m3"
}
],
"release_date": "2026-03-20T22:23:32.147000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-15T18:17:16+00:00",
"details": "To start using the Web Terminal Operator, install the Web Terminal Operator from OpenShift OperatorHub on OpenShift Container Platform 4.18 or higher.",
"product_ids": [
"Red Hat Web Terminal 1.13:registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:790b2a87d81149568d58618db96e7804068b2bc112ff9313e0a06e95ac9841de_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8338"
},
{
"category": "workaround",
"details": "To mitigate this issue, implement infrastructure-level normalization to ensure all incoming HTTP/2 `:path` headers are properly formatted with a leading slash before reaching the gRPC-Go server. This can be achieved by configuring a reverse proxy or API gateway to validate and normalize the `:path` header. Ensure that any such intermediary is properly configured and restarted to apply the changes, which may temporarily impact service availability.",
"product_ids": [
"Red Hat Web Terminal 1.13:registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:33aedbb88539c99ebf0a85e99a1f0b7e681f69a9ee281e88c5ff214e54d85d8a_amd64",
"Red Hat Web Terminal 1.13:registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:54ef39794ebdb90596e4666bb89e23a4fad8fe8cdc79eb825f1c57af5af9951b_amd64",
"Red Hat Web Terminal 1.13:registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:c9e040ffac9873b07f37d29b8c83cbebf5f380d94c46be86ad63798afe8ba363_amd64",
"Red Hat Web Terminal 1.13:registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:790b2a87d81149568d58618db96e7804068b2bc112ff9313e0a06e95ac9841de_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Web Terminal 1.13:registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:33aedbb88539c99ebf0a85e99a1f0b7e681f69a9ee281e88c5ff214e54d85d8a_amd64",
"Red Hat Web Terminal 1.13:registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:54ef39794ebdb90596e4666bb89e23a4fad8fe8cdc79eb825f1c57af5af9951b_amd64",
"Red Hat Web Terminal 1.13:registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:c9e040ffac9873b07f37d29b8c83cbebf5f380d94c46be86ad63798afe8ba363_amd64",
"Red Hat Web Terminal 1.13:registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:790b2a87d81149568d58618db96e7804068b2bc112ff9313e0a06e95ac9841de_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "google.golang.org/grpc/grpc-go: google.golang.org/grpc/authz: gRPC-Go: Authorization bypass due to improper HTTP/2 path validation"
}
]
}
RHSA-2026:5110
Vulnerability from csaf_redhat - Published: 2026-03-19 10:27 - Updated: 2026-04-23 06:08A flaw was found in the net/url package in the Go standard library. The package does not enforce a limit on the number of unique query parameters it parses. A Go application using the net/http.Request.ParseForm method will try to process all parameters provided in the request. A specially crafted HTTP request containing a massive number of query parameters will cause the application to consume an excessive amount of memory, eventually causing the application to crash or become unresponsive, resulting in a denial of service.
A flaw was found in the archive/zip package in the Go standard library. A super-linear file name indexing algorithm is used in the first time a file in an archive is opened. A crafted zip archive containing a specific arrangement of file names can cause an excessive CPU and memory consumption. A Go application processing a malicious archive can become unresponsive or crash, resulting in a denial of service.
A flaw was found in golang. A remote attacker could exploit this vulnerability by providing a specially crafted certificate during the error string construction process within the `HostnameError.Error()` function. This flaw, caused by unbounded string concatenation, leads to excessive resource consumption. Successful exploitation can result in a denial of service (DoS) for the affected system.
A flaw was found in the crypto/tls component. This vulnerability occurs during Transport Layer Security (TLS) session resumption when certificate authority (CA) settings are modified between the initial and resumed handshakes. An attacker could exploit this to bypass certificate validation, allowing a client or server to establish a connection that should have been rejected. This could lead to an authentication bypass under specific conditions.
The Go standard library function net/url.Parse insufficiently validated the host/authority component and accepted some invalid URLs by effectively treating garbage before an IP-literal as ignorable. The function should have rejected this as invalid.
A certificate validation flaw has been discovered in the golang crypto/x509 module. When verifying a certificate chain which contains a certificate containing multiple email address constraints which share common local portions but different domain portions, these constraints will not be properly applied, and only the last constraint will be considered.
A flaw was found in nats-server. The WebSockets implementation fails to enforce a memory allocation limit during the decompression of WebSocket messages. A malicious compressed payload allows an attacker to cause an excessive memory consumption, eventually resulting in a server crash and a complete denial of service.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Multicluster Global Hub v1.5.4 general availability release images, which provide security fixes, bug fixes, and updated container images.\n\nRed Hat Product Security has rated this update as having a security impact of Important. \nA Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat multicluster global hub is a set of components that enable you to import one or more hub clusters and manage them from a single hub cluster.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:5110",
"url": "https://access.redhat.com/errata/RHSA-2026:5110"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61726",
"url": "https://access.redhat.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61728",
"url": "https://access.redhat.com/security/cve/CVE-2025-61728"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61729",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-68121",
"url": "https://access.redhat.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-25679",
"url": "https://access.redhat.com/security/cve/CVE-2026-25679"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-27137",
"url": "https://access.redhat.com/security/cve/CVE-2026-27137"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-27571",
"url": "https://access.redhat.com/security/cve/CVE-2026-27571"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_5110.json"
}
],
"title": "Red Hat Security Advisory: Multicluster Global Hub 1.5.4 security update",
"tracking": {
"current_release_date": "2026-04-23T06:08:38+00:00",
"generator": {
"date": "2026-04-23T06:08:38+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.5"
}
},
"id": "RHSA-2026:5110",
"initial_release_date": "2026-03-19T10:27:09+00:00",
"revision_history": [
{
"date": "2026-03-19T10:27:09+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-03-19T10:27:16+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-23T06:08:38+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Multicluster Global Hub 1.5.4",
"product": {
"name": "Multicluster Global Hub 1.5.4",
"product_id": "Multicluster Global Hub 1.5.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:multicluster_globalhub:1.5::el9"
}
}
}
],
"category": "product_family",
"name": "Multicluster Global Hub"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:d28a834892e0339001e0c414ad1eb697a9d822e5638b8422ae6f2950036bb858_amd64",
"product": {
"name": "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:d28a834892e0339001e0c414ad1eb697a9d822e5638b8422ae6f2950036bb858_amd64",
"product_id": "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:d28a834892e0339001e0c414ad1eb697a9d822e5638b8422ae6f2950036bb858_amd64",
"product_identification_helper": {
"purl": "pkg:oci/multicluster-globalhub-grafana-rhel9@sha256%3Ad28a834892e0339001e0c414ad1eb697a9d822e5638b8422ae6f2950036bb858?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-globalhub\u0026tag=1773650767"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:a57734fe379ec378107c03068b4fce04ae186656352c810b5db2b91bf8ca1eb1_amd64",
"product": {
"name": "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:a57734fe379ec378107c03068b4fce04ae186656352c810b5db2b91bf8ca1eb1_amd64",
"product_id": "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:a57734fe379ec378107c03068b4fce04ae186656352c810b5db2b91bf8ca1eb1_amd64",
"product_identification_helper": {
"purl": "pkg:oci/multicluster-globalhub-agent-rhel9@sha256%3Aa57734fe379ec378107c03068b4fce04ae186656352c810b5db2b91bf8ca1eb1?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-globalhub\u0026tag=1773650627"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:adfa7c9d11670bf55289595d6d21124741586c1116e3f5427a5fd350e140d094_amd64",
"product": {
"name": "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:adfa7c9d11670bf55289595d6d21124741586c1116e3f5427a5fd350e140d094_amd64",
"product_id": "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:adfa7c9d11670bf55289595d6d21124741586c1116e3f5427a5fd350e140d094_amd64",
"product_identification_helper": {
"purl": "pkg:oci/multicluster-globalhub-manager-rhel9@sha256%3Aadfa7c9d11670bf55289595d6d21124741586c1116e3f5427a5fd350e140d094?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-globalhub\u0026tag=1773650749"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-operator-bundle@sha256:4a587f8153ff2a466414fb69e288f754da2b9f43154ba1ede5e9493a6d43c587_amd64",
"product": {
"name": "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-operator-bundle@sha256:4a587f8153ff2a466414fb69e288f754da2b9f43154ba1ede5e9493a6d43c587_amd64",
"product_id": "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-operator-bundle@sha256:4a587f8153ff2a466414fb69e288f754da2b9f43154ba1ede5e9493a6d43c587_amd64",
"product_identification_helper": {
"purl": "pkg:oci/multicluster-globalhub-operator-bundle@sha256%3A4a587f8153ff2a466414fb69e288f754da2b9f43154ba1ede5e9493a6d43c587?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-globalhub\u0026tag=1773652587"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:ecb1b97101f371f6159e3ca2eecb8be0fb04019ce379e5cc7936c146150cc36c_amd64",
"product": {
"name": "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:ecb1b97101f371f6159e3ca2eecb8be0fb04019ce379e5cc7936c146150cc36c_amd64",
"product_id": "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:ecb1b97101f371f6159e3ca2eecb8be0fb04019ce379e5cc7936c146150cc36c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/multicluster-globalhub-rhel9-operator@sha256%3Aecb1b97101f371f6159e3ca2eecb8be0fb04019ce379e5cc7936c146150cc36c?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-globalhub\u0026tag=1773649850"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:574a52d17bd38da7882a32dedbb991ce81b5a67b8fdffe68e51ca477f790d0e1_amd64",
"product": {
"name": "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:574a52d17bd38da7882a32dedbb991ce81b5a67b8fdffe68e51ca477f790d0e1_amd64",
"product_id": "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:574a52d17bd38da7882a32dedbb991ce81b5a67b8fdffe68e51ca477f790d0e1_amd64",
"product_identification_helper": {
"purl": "pkg:oci/multicluster-globalhub-postgres-exporter-rhel9@sha256%3A574a52d17bd38da7882a32dedbb991ce81b5a67b8fdffe68e51ca477f790d0e1?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-globalhub\u0026tag=1773649705"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:7a5453ebb841bfcaae1b15c823a6ca2e4714d4028a457d5687d412ee568c2062_ppc64le",
"product": {
"name": "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:7a5453ebb841bfcaae1b15c823a6ca2e4714d4028a457d5687d412ee568c2062_ppc64le",
"product_id": "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:7a5453ebb841bfcaae1b15c823a6ca2e4714d4028a457d5687d412ee568c2062_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/multicluster-globalhub-grafana-rhel9@sha256%3A7a5453ebb841bfcaae1b15c823a6ca2e4714d4028a457d5687d412ee568c2062?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-globalhub\u0026tag=1773650767"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:9850fe55e07917fc01f1562f3e4ba555c7c1a7ee9bc93edb3ec6e47b45671163_ppc64le",
"product": {
"name": "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:9850fe55e07917fc01f1562f3e4ba555c7c1a7ee9bc93edb3ec6e47b45671163_ppc64le",
"product_id": "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:9850fe55e07917fc01f1562f3e4ba555c7c1a7ee9bc93edb3ec6e47b45671163_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/multicluster-globalhub-agent-rhel9@sha256%3A9850fe55e07917fc01f1562f3e4ba555c7c1a7ee9bc93edb3ec6e47b45671163?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-globalhub\u0026tag=1773650627"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:a10ba2206c5d95f2df3e198ddc002ee354272e8660acb4ea68797083f35dba6d_ppc64le",
"product": {
"name": "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:a10ba2206c5d95f2df3e198ddc002ee354272e8660acb4ea68797083f35dba6d_ppc64le",
"product_id": "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:a10ba2206c5d95f2df3e198ddc002ee354272e8660acb4ea68797083f35dba6d_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/multicluster-globalhub-manager-rhel9@sha256%3Aa10ba2206c5d95f2df3e198ddc002ee354272e8660acb4ea68797083f35dba6d?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-globalhub\u0026tag=1773650749"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:01162aa8ce5c48b47301fd4c9a6835fda1b36358804c3ad50a5230fd151d2916_ppc64le",
"product": {
"name": "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:01162aa8ce5c48b47301fd4c9a6835fda1b36358804c3ad50a5230fd151d2916_ppc64le",
"product_id": "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:01162aa8ce5c48b47301fd4c9a6835fda1b36358804c3ad50a5230fd151d2916_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/multicluster-globalhub-rhel9-operator@sha256%3A01162aa8ce5c48b47301fd4c9a6835fda1b36358804c3ad50a5230fd151d2916?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-globalhub\u0026tag=1773649850"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:d13900e0094bac295a523436594d568101888ab10732c297c4ab01ad92d5a296_ppc64le",
"product": {
"name": "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:d13900e0094bac295a523436594d568101888ab10732c297c4ab01ad92d5a296_ppc64le",
"product_id": "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:d13900e0094bac295a523436594d568101888ab10732c297c4ab01ad92d5a296_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/multicluster-globalhub-postgres-exporter-rhel9@sha256%3Ad13900e0094bac295a523436594d568101888ab10732c297c4ab01ad92d5a296?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-globalhub\u0026tag=1773649705"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:cc48d9258a74255d7b46dbba8550a224fa97dc5f5fe095093d6e72e1a22a8461_s390x",
"product": {
"name": "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:cc48d9258a74255d7b46dbba8550a224fa97dc5f5fe095093d6e72e1a22a8461_s390x",
"product_id": "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:cc48d9258a74255d7b46dbba8550a224fa97dc5f5fe095093d6e72e1a22a8461_s390x",
"product_identification_helper": {
"purl": "pkg:oci/multicluster-globalhub-grafana-rhel9@sha256%3Acc48d9258a74255d7b46dbba8550a224fa97dc5f5fe095093d6e72e1a22a8461?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-globalhub\u0026tag=1773650767"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:1e950fd906277c3bafaffa140dc387b14d07d2a818c18638b98d03c21cb618fd_s390x",
"product": {
"name": "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:1e950fd906277c3bafaffa140dc387b14d07d2a818c18638b98d03c21cb618fd_s390x",
"product_id": "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:1e950fd906277c3bafaffa140dc387b14d07d2a818c18638b98d03c21cb618fd_s390x",
"product_identification_helper": {
"purl": "pkg:oci/multicluster-globalhub-agent-rhel9@sha256%3A1e950fd906277c3bafaffa140dc387b14d07d2a818c18638b98d03c21cb618fd?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-globalhub\u0026tag=1773650627"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:0f39666f8f6365d09cd0716348344adb091fa47171810fbf821088b5a12978fd_s390x",
"product": {
"name": "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:0f39666f8f6365d09cd0716348344adb091fa47171810fbf821088b5a12978fd_s390x",
"product_id": "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:0f39666f8f6365d09cd0716348344adb091fa47171810fbf821088b5a12978fd_s390x",
"product_identification_helper": {
"purl": "pkg:oci/multicluster-globalhub-manager-rhel9@sha256%3A0f39666f8f6365d09cd0716348344adb091fa47171810fbf821088b5a12978fd?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-globalhub\u0026tag=1773650749"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:32009013a53f53faeb9107e06f8c654cdaaaa1233bcecdee290e9592df77b968_s390x",
"product": {
"name": "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:32009013a53f53faeb9107e06f8c654cdaaaa1233bcecdee290e9592df77b968_s390x",
"product_id": "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:32009013a53f53faeb9107e06f8c654cdaaaa1233bcecdee290e9592df77b968_s390x",
"product_identification_helper": {
"purl": "pkg:oci/multicluster-globalhub-rhel9-operator@sha256%3A32009013a53f53faeb9107e06f8c654cdaaaa1233bcecdee290e9592df77b968?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-globalhub\u0026tag=1773649850"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:b8c5202df848f0b13960183434c382ae188ed2fa728bc5437e47622ec948c443_s390x",
"product": {
"name": "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:b8c5202df848f0b13960183434c382ae188ed2fa728bc5437e47622ec948c443_s390x",
"product_id": "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:b8c5202df848f0b13960183434c382ae188ed2fa728bc5437e47622ec948c443_s390x",
"product_identification_helper": {
"purl": "pkg:oci/multicluster-globalhub-postgres-exporter-rhel9@sha256%3Ab8c5202df848f0b13960183434c382ae188ed2fa728bc5437e47622ec948c443?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-globalhub\u0026tag=1773649705"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:f8d74fced944874bb10872332c1fb3884b03cb68449ffad4bb8633d70e700745_arm64",
"product": {
"name": "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:f8d74fced944874bb10872332c1fb3884b03cb68449ffad4bb8633d70e700745_arm64",
"product_id": "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:f8d74fced944874bb10872332c1fb3884b03cb68449ffad4bb8633d70e700745_arm64",
"product_identification_helper": {
"purl": "pkg:oci/multicluster-globalhub-grafana-rhel9@sha256%3Af8d74fced944874bb10872332c1fb3884b03cb68449ffad4bb8633d70e700745?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-globalhub\u0026tag=1773650767"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:64543029a7895652884f31bc0d94cd39868617b1c47bb5cae5e5fa23689e4480_arm64",
"product": {
"name": "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:64543029a7895652884f31bc0d94cd39868617b1c47bb5cae5e5fa23689e4480_arm64",
"product_id": "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:64543029a7895652884f31bc0d94cd39868617b1c47bb5cae5e5fa23689e4480_arm64",
"product_identification_helper": {
"purl": "pkg:oci/multicluster-globalhub-agent-rhel9@sha256%3A64543029a7895652884f31bc0d94cd39868617b1c47bb5cae5e5fa23689e4480?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-globalhub\u0026tag=1773650627"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:c045f9b0e496240b907d0ba572fc1bbd0a12e1510115ff1884e3a7226206500c_arm64",
"product": {
"name": "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:c045f9b0e496240b907d0ba572fc1bbd0a12e1510115ff1884e3a7226206500c_arm64",
"product_id": "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:c045f9b0e496240b907d0ba572fc1bbd0a12e1510115ff1884e3a7226206500c_arm64",
"product_identification_helper": {
"purl": "pkg:oci/multicluster-globalhub-manager-rhel9@sha256%3Ac045f9b0e496240b907d0ba572fc1bbd0a12e1510115ff1884e3a7226206500c?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-globalhub\u0026tag=1773650749"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:84eb26e40548fbeba8e3b0a85dd167d74c2cdc0909523d25e4942fe22e77eebb_arm64",
"product": {
"name": "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:84eb26e40548fbeba8e3b0a85dd167d74c2cdc0909523d25e4942fe22e77eebb_arm64",
"product_id": "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:84eb26e40548fbeba8e3b0a85dd167d74c2cdc0909523d25e4942fe22e77eebb_arm64",
"product_identification_helper": {
"purl": "pkg:oci/multicluster-globalhub-rhel9-operator@sha256%3A84eb26e40548fbeba8e3b0a85dd167d74c2cdc0909523d25e4942fe22e77eebb?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-globalhub\u0026tag=1773649850"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:bace0a9040688db829cccfd83579e0a88ab08991b2ff6dc1064af72a14d5b2f7_arm64",
"product": {
"name": "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:bace0a9040688db829cccfd83579e0a88ab08991b2ff6dc1064af72a14d5b2f7_arm64",
"product_id": "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:bace0a9040688db829cccfd83579e0a88ab08991b2ff6dc1064af72a14d5b2f7_arm64",
"product_identification_helper": {
"purl": "pkg:oci/multicluster-globalhub-postgres-exporter-rhel9@sha256%3Abace0a9040688db829cccfd83579e0a88ab08991b2ff6dc1064af72a14d5b2f7?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-globalhub\u0026tag=1773649705"
}
}
}
],
"category": "architecture",
"name": "arm64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:1e950fd906277c3bafaffa140dc387b14d07d2a818c18638b98d03c21cb618fd_s390x as a component of Multicluster Global Hub 1.5.4",
"product_id": "Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:1e950fd906277c3bafaffa140dc387b14d07d2a818c18638b98d03c21cb618fd_s390x"
},
"product_reference": "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:1e950fd906277c3bafaffa140dc387b14d07d2a818c18638b98d03c21cb618fd_s390x",
"relates_to_product_reference": "Multicluster Global Hub 1.5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:64543029a7895652884f31bc0d94cd39868617b1c47bb5cae5e5fa23689e4480_arm64 as a component of Multicluster Global Hub 1.5.4",
"product_id": "Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:64543029a7895652884f31bc0d94cd39868617b1c47bb5cae5e5fa23689e4480_arm64"
},
"product_reference": "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:64543029a7895652884f31bc0d94cd39868617b1c47bb5cae5e5fa23689e4480_arm64",
"relates_to_product_reference": "Multicluster Global Hub 1.5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:9850fe55e07917fc01f1562f3e4ba555c7c1a7ee9bc93edb3ec6e47b45671163_ppc64le as a component of Multicluster Global Hub 1.5.4",
"product_id": "Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:9850fe55e07917fc01f1562f3e4ba555c7c1a7ee9bc93edb3ec6e47b45671163_ppc64le"
},
"product_reference": "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:9850fe55e07917fc01f1562f3e4ba555c7c1a7ee9bc93edb3ec6e47b45671163_ppc64le",
"relates_to_product_reference": "Multicluster Global Hub 1.5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:a57734fe379ec378107c03068b4fce04ae186656352c810b5db2b91bf8ca1eb1_amd64 as a component of Multicluster Global Hub 1.5.4",
"product_id": "Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:a57734fe379ec378107c03068b4fce04ae186656352c810b5db2b91bf8ca1eb1_amd64"
},
"product_reference": "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:a57734fe379ec378107c03068b4fce04ae186656352c810b5db2b91bf8ca1eb1_amd64",
"relates_to_product_reference": "Multicluster Global Hub 1.5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:7a5453ebb841bfcaae1b15c823a6ca2e4714d4028a457d5687d412ee568c2062_ppc64le as a component of Multicluster Global Hub 1.5.4",
"product_id": "Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:7a5453ebb841bfcaae1b15c823a6ca2e4714d4028a457d5687d412ee568c2062_ppc64le"
},
"product_reference": "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:7a5453ebb841bfcaae1b15c823a6ca2e4714d4028a457d5687d412ee568c2062_ppc64le",
"relates_to_product_reference": "Multicluster Global Hub 1.5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:cc48d9258a74255d7b46dbba8550a224fa97dc5f5fe095093d6e72e1a22a8461_s390x as a component of Multicluster Global Hub 1.5.4",
"product_id": "Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:cc48d9258a74255d7b46dbba8550a224fa97dc5f5fe095093d6e72e1a22a8461_s390x"
},
"product_reference": "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:cc48d9258a74255d7b46dbba8550a224fa97dc5f5fe095093d6e72e1a22a8461_s390x",
"relates_to_product_reference": "Multicluster Global Hub 1.5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:d28a834892e0339001e0c414ad1eb697a9d822e5638b8422ae6f2950036bb858_amd64 as a component of Multicluster Global Hub 1.5.4",
"product_id": "Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:d28a834892e0339001e0c414ad1eb697a9d822e5638b8422ae6f2950036bb858_amd64"
},
"product_reference": "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:d28a834892e0339001e0c414ad1eb697a9d822e5638b8422ae6f2950036bb858_amd64",
"relates_to_product_reference": "Multicluster Global Hub 1.5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:f8d74fced944874bb10872332c1fb3884b03cb68449ffad4bb8633d70e700745_arm64 as a component of Multicluster Global Hub 1.5.4",
"product_id": "Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:f8d74fced944874bb10872332c1fb3884b03cb68449ffad4bb8633d70e700745_arm64"
},
"product_reference": "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:f8d74fced944874bb10872332c1fb3884b03cb68449ffad4bb8633d70e700745_arm64",
"relates_to_product_reference": "Multicluster Global Hub 1.5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:0f39666f8f6365d09cd0716348344adb091fa47171810fbf821088b5a12978fd_s390x as a component of Multicluster Global Hub 1.5.4",
"product_id": "Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:0f39666f8f6365d09cd0716348344adb091fa47171810fbf821088b5a12978fd_s390x"
},
"product_reference": "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:0f39666f8f6365d09cd0716348344adb091fa47171810fbf821088b5a12978fd_s390x",
"relates_to_product_reference": "Multicluster Global Hub 1.5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:a10ba2206c5d95f2df3e198ddc002ee354272e8660acb4ea68797083f35dba6d_ppc64le as a component of Multicluster Global Hub 1.5.4",
"product_id": "Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:a10ba2206c5d95f2df3e198ddc002ee354272e8660acb4ea68797083f35dba6d_ppc64le"
},
"product_reference": "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:a10ba2206c5d95f2df3e198ddc002ee354272e8660acb4ea68797083f35dba6d_ppc64le",
"relates_to_product_reference": "Multicluster Global Hub 1.5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:adfa7c9d11670bf55289595d6d21124741586c1116e3f5427a5fd350e140d094_amd64 as a component of Multicluster Global Hub 1.5.4",
"product_id": "Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:adfa7c9d11670bf55289595d6d21124741586c1116e3f5427a5fd350e140d094_amd64"
},
"product_reference": "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:adfa7c9d11670bf55289595d6d21124741586c1116e3f5427a5fd350e140d094_amd64",
"relates_to_product_reference": "Multicluster Global Hub 1.5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:c045f9b0e496240b907d0ba572fc1bbd0a12e1510115ff1884e3a7226206500c_arm64 as a component of Multicluster Global Hub 1.5.4",
"product_id": "Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:c045f9b0e496240b907d0ba572fc1bbd0a12e1510115ff1884e3a7226206500c_arm64"
},
"product_reference": "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:c045f9b0e496240b907d0ba572fc1bbd0a12e1510115ff1884e3a7226206500c_arm64",
"relates_to_product_reference": "Multicluster Global Hub 1.5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-operator-bundle@sha256:4a587f8153ff2a466414fb69e288f754da2b9f43154ba1ede5e9493a6d43c587_amd64 as a component of Multicluster Global Hub 1.5.4",
"product_id": "Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-operator-bundle@sha256:4a587f8153ff2a466414fb69e288f754da2b9f43154ba1ede5e9493a6d43c587_amd64"
},
"product_reference": "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-operator-bundle@sha256:4a587f8153ff2a466414fb69e288f754da2b9f43154ba1ede5e9493a6d43c587_amd64",
"relates_to_product_reference": "Multicluster Global Hub 1.5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:574a52d17bd38da7882a32dedbb991ce81b5a67b8fdffe68e51ca477f790d0e1_amd64 as a component of Multicluster Global Hub 1.5.4",
"product_id": "Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:574a52d17bd38da7882a32dedbb991ce81b5a67b8fdffe68e51ca477f790d0e1_amd64"
},
"product_reference": "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:574a52d17bd38da7882a32dedbb991ce81b5a67b8fdffe68e51ca477f790d0e1_amd64",
"relates_to_product_reference": "Multicluster Global Hub 1.5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:b8c5202df848f0b13960183434c382ae188ed2fa728bc5437e47622ec948c443_s390x as a component of Multicluster Global Hub 1.5.4",
"product_id": "Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:b8c5202df848f0b13960183434c382ae188ed2fa728bc5437e47622ec948c443_s390x"
},
"product_reference": "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:b8c5202df848f0b13960183434c382ae188ed2fa728bc5437e47622ec948c443_s390x",
"relates_to_product_reference": "Multicluster Global Hub 1.5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:bace0a9040688db829cccfd83579e0a88ab08991b2ff6dc1064af72a14d5b2f7_arm64 as a component of Multicluster Global Hub 1.5.4",
"product_id": "Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:bace0a9040688db829cccfd83579e0a88ab08991b2ff6dc1064af72a14d5b2f7_arm64"
},
"product_reference": "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:bace0a9040688db829cccfd83579e0a88ab08991b2ff6dc1064af72a14d5b2f7_arm64",
"relates_to_product_reference": "Multicluster Global Hub 1.5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:d13900e0094bac295a523436594d568101888ab10732c297c4ab01ad92d5a296_ppc64le as a component of Multicluster Global Hub 1.5.4",
"product_id": "Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:d13900e0094bac295a523436594d568101888ab10732c297c4ab01ad92d5a296_ppc64le"
},
"product_reference": "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:d13900e0094bac295a523436594d568101888ab10732c297c4ab01ad92d5a296_ppc64le",
"relates_to_product_reference": "Multicluster Global Hub 1.5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:01162aa8ce5c48b47301fd4c9a6835fda1b36358804c3ad50a5230fd151d2916_ppc64le as a component of Multicluster Global Hub 1.5.4",
"product_id": "Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:01162aa8ce5c48b47301fd4c9a6835fda1b36358804c3ad50a5230fd151d2916_ppc64le"
},
"product_reference": "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:01162aa8ce5c48b47301fd4c9a6835fda1b36358804c3ad50a5230fd151d2916_ppc64le",
"relates_to_product_reference": "Multicluster Global Hub 1.5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:32009013a53f53faeb9107e06f8c654cdaaaa1233bcecdee290e9592df77b968_s390x as a component of Multicluster Global Hub 1.5.4",
"product_id": "Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:32009013a53f53faeb9107e06f8c654cdaaaa1233bcecdee290e9592df77b968_s390x"
},
"product_reference": "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:32009013a53f53faeb9107e06f8c654cdaaaa1233bcecdee290e9592df77b968_s390x",
"relates_to_product_reference": "Multicluster Global Hub 1.5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:84eb26e40548fbeba8e3b0a85dd167d74c2cdc0909523d25e4942fe22e77eebb_arm64 as a component of Multicluster Global Hub 1.5.4",
"product_id": "Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:84eb26e40548fbeba8e3b0a85dd167d74c2cdc0909523d25e4942fe22e77eebb_arm64"
},
"product_reference": "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:84eb26e40548fbeba8e3b0a85dd167d74c2cdc0909523d25e4942fe22e77eebb_arm64",
"relates_to_product_reference": "Multicluster Global Hub 1.5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:ecb1b97101f371f6159e3ca2eecb8be0fb04019ce379e5cc7936c146150cc36c_amd64 as a component of Multicluster Global Hub 1.5.4",
"product_id": "Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:ecb1b97101f371f6159e3ca2eecb8be0fb04019ce379e5cc7936c146150cc36c_amd64"
},
"product_reference": "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:ecb1b97101f371f6159e3ca2eecb8be0fb04019ce379e5cc7936c146150cc36c_amd64",
"relates_to_product_reference": "Multicluster Global Hub 1.5.4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61726",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:42.791305+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-operator-bundle@sha256:4a587f8153ff2a466414fb69e288f754da2b9f43154ba1ede5e9493a6d43c587_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434432"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the net/url package in the Go standard library. The package does not enforce a limit on the number of unique query parameters it parses. A Go application using the net/http.Request.ParseForm method will try to process all parameters provided in the request. A specially crafted HTTP request containing a massive number of query parameters will cause the application to consume an excessive amount of memory, eventually causing the application to crash or become unresponsive, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/url: Memory exhaustion in query parameter parsing in net/url",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker must be able to send a specially crafted HTTP request to an application parsing URL-encoded forms with net/url, specifically a request containing a large number of unique query parameters. The request will cause the application to consume an excessive amount of memory and eventually result in a denial of service, with no impact to confidentiality or integrity. Due to this reason, this vulnerability has been rated with an important severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:1e950fd906277c3bafaffa140dc387b14d07d2a818c18638b98d03c21cb618fd_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:64543029a7895652884f31bc0d94cd39868617b1c47bb5cae5e5fa23689e4480_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:9850fe55e07917fc01f1562f3e4ba555c7c1a7ee9bc93edb3ec6e47b45671163_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:a57734fe379ec378107c03068b4fce04ae186656352c810b5db2b91bf8ca1eb1_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:7a5453ebb841bfcaae1b15c823a6ca2e4714d4028a457d5687d412ee568c2062_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:cc48d9258a74255d7b46dbba8550a224fa97dc5f5fe095093d6e72e1a22a8461_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:d28a834892e0339001e0c414ad1eb697a9d822e5638b8422ae6f2950036bb858_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:f8d74fced944874bb10872332c1fb3884b03cb68449ffad4bb8633d70e700745_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:0f39666f8f6365d09cd0716348344adb091fa47171810fbf821088b5a12978fd_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:a10ba2206c5d95f2df3e198ddc002ee354272e8660acb4ea68797083f35dba6d_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:adfa7c9d11670bf55289595d6d21124741586c1116e3f5427a5fd350e140d094_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:c045f9b0e496240b907d0ba572fc1bbd0a12e1510115ff1884e3a7226206500c_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:574a52d17bd38da7882a32dedbb991ce81b5a67b8fdffe68e51ca477f790d0e1_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:b8c5202df848f0b13960183434c382ae188ed2fa728bc5437e47622ec948c443_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:bace0a9040688db829cccfd83579e0a88ab08991b2ff6dc1064af72a14d5b2f7_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:d13900e0094bac295a523436594d568101888ab10732c297c4ab01ad92d5a296_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:01162aa8ce5c48b47301fd4c9a6835fda1b36358804c3ad50a5230fd151d2916_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:32009013a53f53faeb9107e06f8c654cdaaaa1233bcecdee290e9592df77b968_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:84eb26e40548fbeba8e3b0a85dd167d74c2cdc0909523d25e4942fe22e77eebb_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:ecb1b97101f371f6159e3ca2eecb8be0fb04019ce379e5cc7936c146150cc36c_amd64"
],
"known_not_affected": [
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-operator-bundle@sha256:4a587f8153ff2a466414fb69e288f754da2b9f43154ba1ede5e9493a6d43c587_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "RHBZ#2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"category": "external",
"summary": "https://go.dev/cl/736712",
"url": "https://go.dev/cl/736712"
},
{
"category": "external",
"summary": "https://go.dev/issue/77101",
"url": "https://go.dev/issue/77101"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4341",
"url": "https://pkg.go.dev/vuln/GO-2026-4341"
}
],
"release_date": "2026-01-28T19:30:31.215000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-19T10:27:09+00:00",
"details": "For more details, see the Red Hat Advanced Cluster Management for Kubernetes documentation:\n\nhttps://docs.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.14/html/multicluster_global_hub/index",
"product_ids": [
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:1e950fd906277c3bafaffa140dc387b14d07d2a818c18638b98d03c21cb618fd_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:64543029a7895652884f31bc0d94cd39868617b1c47bb5cae5e5fa23689e4480_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:9850fe55e07917fc01f1562f3e4ba555c7c1a7ee9bc93edb3ec6e47b45671163_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:a57734fe379ec378107c03068b4fce04ae186656352c810b5db2b91bf8ca1eb1_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:7a5453ebb841bfcaae1b15c823a6ca2e4714d4028a457d5687d412ee568c2062_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:cc48d9258a74255d7b46dbba8550a224fa97dc5f5fe095093d6e72e1a22a8461_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:d28a834892e0339001e0c414ad1eb697a9d822e5638b8422ae6f2950036bb858_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:f8d74fced944874bb10872332c1fb3884b03cb68449ffad4bb8633d70e700745_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:0f39666f8f6365d09cd0716348344adb091fa47171810fbf821088b5a12978fd_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:a10ba2206c5d95f2df3e198ddc002ee354272e8660acb4ea68797083f35dba6d_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:adfa7c9d11670bf55289595d6d21124741586c1116e3f5427a5fd350e140d094_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:c045f9b0e496240b907d0ba572fc1bbd0a12e1510115ff1884e3a7226206500c_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:574a52d17bd38da7882a32dedbb991ce81b5a67b8fdffe68e51ca477f790d0e1_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:b8c5202df848f0b13960183434c382ae188ed2fa728bc5437e47622ec948c443_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:bace0a9040688db829cccfd83579e0a88ab08991b2ff6dc1064af72a14d5b2f7_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:d13900e0094bac295a523436594d568101888ab10732c297c4ab01ad92d5a296_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:01162aa8ce5c48b47301fd4c9a6835fda1b36358804c3ad50a5230fd151d2916_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:32009013a53f53faeb9107e06f8c654cdaaaa1233bcecdee290e9592df77b968_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:84eb26e40548fbeba8e3b0a85dd167d74c2cdc0909523d25e4942fe22e77eebb_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:ecb1b97101f371f6159e3ca2eecb8be0fb04019ce379e5cc7936c146150cc36c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:5110"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:1e950fd906277c3bafaffa140dc387b14d07d2a818c18638b98d03c21cb618fd_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:64543029a7895652884f31bc0d94cd39868617b1c47bb5cae5e5fa23689e4480_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:9850fe55e07917fc01f1562f3e4ba555c7c1a7ee9bc93edb3ec6e47b45671163_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:a57734fe379ec378107c03068b4fce04ae186656352c810b5db2b91bf8ca1eb1_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:7a5453ebb841bfcaae1b15c823a6ca2e4714d4028a457d5687d412ee568c2062_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:cc48d9258a74255d7b46dbba8550a224fa97dc5f5fe095093d6e72e1a22a8461_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:d28a834892e0339001e0c414ad1eb697a9d822e5638b8422ae6f2950036bb858_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:f8d74fced944874bb10872332c1fb3884b03cb68449ffad4bb8633d70e700745_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:0f39666f8f6365d09cd0716348344adb091fa47171810fbf821088b5a12978fd_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:a10ba2206c5d95f2df3e198ddc002ee354272e8660acb4ea68797083f35dba6d_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:adfa7c9d11670bf55289595d6d21124741586c1116e3f5427a5fd350e140d094_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:c045f9b0e496240b907d0ba572fc1bbd0a12e1510115ff1884e3a7226206500c_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-operator-bundle@sha256:4a587f8153ff2a466414fb69e288f754da2b9f43154ba1ede5e9493a6d43c587_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:574a52d17bd38da7882a32dedbb991ce81b5a67b8fdffe68e51ca477f790d0e1_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:b8c5202df848f0b13960183434c382ae188ed2fa728bc5437e47622ec948c443_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:bace0a9040688db829cccfd83579e0a88ab08991b2ff6dc1064af72a14d5b2f7_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:d13900e0094bac295a523436594d568101888ab10732c297c4ab01ad92d5a296_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:01162aa8ce5c48b47301fd4c9a6835fda1b36358804c3ad50a5230fd151d2916_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:32009013a53f53faeb9107e06f8c654cdaaaa1233bcecdee290e9592df77b968_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:84eb26e40548fbeba8e3b0a85dd167d74c2cdc0909523d25e4942fe22e77eebb_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:ecb1b97101f371f6159e3ca2eecb8be0fb04019ce379e5cc7936c146150cc36c_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:1e950fd906277c3bafaffa140dc387b14d07d2a818c18638b98d03c21cb618fd_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:64543029a7895652884f31bc0d94cd39868617b1c47bb5cae5e5fa23689e4480_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:9850fe55e07917fc01f1562f3e4ba555c7c1a7ee9bc93edb3ec6e47b45671163_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:a57734fe379ec378107c03068b4fce04ae186656352c810b5db2b91bf8ca1eb1_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:7a5453ebb841bfcaae1b15c823a6ca2e4714d4028a457d5687d412ee568c2062_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:cc48d9258a74255d7b46dbba8550a224fa97dc5f5fe095093d6e72e1a22a8461_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:d28a834892e0339001e0c414ad1eb697a9d822e5638b8422ae6f2950036bb858_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:f8d74fced944874bb10872332c1fb3884b03cb68449ffad4bb8633d70e700745_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:0f39666f8f6365d09cd0716348344adb091fa47171810fbf821088b5a12978fd_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:a10ba2206c5d95f2df3e198ddc002ee354272e8660acb4ea68797083f35dba6d_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:adfa7c9d11670bf55289595d6d21124741586c1116e3f5427a5fd350e140d094_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:c045f9b0e496240b907d0ba572fc1bbd0a12e1510115ff1884e3a7226206500c_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-operator-bundle@sha256:4a587f8153ff2a466414fb69e288f754da2b9f43154ba1ede5e9493a6d43c587_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:574a52d17bd38da7882a32dedbb991ce81b5a67b8fdffe68e51ca477f790d0e1_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:b8c5202df848f0b13960183434c382ae188ed2fa728bc5437e47622ec948c443_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:bace0a9040688db829cccfd83579e0a88ab08991b2ff6dc1064af72a14d5b2f7_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:d13900e0094bac295a523436594d568101888ab10732c297c4ab01ad92d5a296_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:01162aa8ce5c48b47301fd4c9a6835fda1b36358804c3ad50a5230fd151d2916_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:32009013a53f53faeb9107e06f8c654cdaaaa1233bcecdee290e9592df77b968_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:84eb26e40548fbeba8e3b0a85dd167d74c2cdc0909523d25e4942fe22e77eebb_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:ecb1b97101f371f6159e3ca2eecb8be0fb04019ce379e5cc7936c146150cc36c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: net/url: Memory exhaustion in query parameter parsing in net/url"
},
{
"cve": "CVE-2025-61728",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:39.965024+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-operator-bundle@sha256:4a587f8153ff2a466414fb69e288f754da2b9f43154ba1ede5e9493a6d43c587_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434431"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the archive/zip package in the Go standard library. A super-linear file name indexing algorithm is used in the first time a file in an archive is opened. A crafted zip archive containing a specific arrangement of file names can cause an excessive CPU and memory consumption. A Go application processing a malicious archive can become unresponsive or crash, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to be able to process a malicious zip archive with an application using the archive/zip package. Additionally, this vulnerability can cause a Go application to consume an excessive amount of CPU and memory, eventually resulting in a denial of service with no other security impact. Due to these reasons, this flaw has been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:1e950fd906277c3bafaffa140dc387b14d07d2a818c18638b98d03c21cb618fd_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:64543029a7895652884f31bc0d94cd39868617b1c47bb5cae5e5fa23689e4480_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:9850fe55e07917fc01f1562f3e4ba555c7c1a7ee9bc93edb3ec6e47b45671163_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:a57734fe379ec378107c03068b4fce04ae186656352c810b5db2b91bf8ca1eb1_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:7a5453ebb841bfcaae1b15c823a6ca2e4714d4028a457d5687d412ee568c2062_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:cc48d9258a74255d7b46dbba8550a224fa97dc5f5fe095093d6e72e1a22a8461_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:d28a834892e0339001e0c414ad1eb697a9d822e5638b8422ae6f2950036bb858_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:f8d74fced944874bb10872332c1fb3884b03cb68449ffad4bb8633d70e700745_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:0f39666f8f6365d09cd0716348344adb091fa47171810fbf821088b5a12978fd_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:a10ba2206c5d95f2df3e198ddc002ee354272e8660acb4ea68797083f35dba6d_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:adfa7c9d11670bf55289595d6d21124741586c1116e3f5427a5fd350e140d094_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:c045f9b0e496240b907d0ba572fc1bbd0a12e1510115ff1884e3a7226206500c_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:574a52d17bd38da7882a32dedbb991ce81b5a67b8fdffe68e51ca477f790d0e1_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:b8c5202df848f0b13960183434c382ae188ed2fa728bc5437e47622ec948c443_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:bace0a9040688db829cccfd83579e0a88ab08991b2ff6dc1064af72a14d5b2f7_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:d13900e0094bac295a523436594d568101888ab10732c297c4ab01ad92d5a296_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:01162aa8ce5c48b47301fd4c9a6835fda1b36358804c3ad50a5230fd151d2916_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:32009013a53f53faeb9107e06f8c654cdaaaa1233bcecdee290e9592df77b968_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:84eb26e40548fbeba8e3b0a85dd167d74c2cdc0909523d25e4942fe22e77eebb_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:ecb1b97101f371f6159e3ca2eecb8be0fb04019ce379e5cc7936c146150cc36c_amd64"
],
"known_not_affected": [
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-operator-bundle@sha256:4a587f8153ff2a466414fb69e288f754da2b9f43154ba1ede5e9493a6d43c587_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61728"
},
{
"category": "external",
"summary": "RHBZ#2434431",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434431"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61728"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728"
},
{
"category": "external",
"summary": "https://go.dev/cl/736713",
"url": "https://go.dev/cl/736713"
},
{
"category": "external",
"summary": "https://go.dev/issue/77102",
"url": "https://go.dev/issue/77102"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4342",
"url": "https://pkg.go.dev/vuln/GO-2026-4342"
}
],
"release_date": "2026-01-28T19:30:31.354000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-19T10:27:09+00:00",
"details": "For more details, see the Red Hat Advanced Cluster Management for Kubernetes documentation:\n\nhttps://docs.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.14/html/multicluster_global_hub/index",
"product_ids": [
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:1e950fd906277c3bafaffa140dc387b14d07d2a818c18638b98d03c21cb618fd_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:64543029a7895652884f31bc0d94cd39868617b1c47bb5cae5e5fa23689e4480_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:9850fe55e07917fc01f1562f3e4ba555c7c1a7ee9bc93edb3ec6e47b45671163_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:a57734fe379ec378107c03068b4fce04ae186656352c810b5db2b91bf8ca1eb1_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:7a5453ebb841bfcaae1b15c823a6ca2e4714d4028a457d5687d412ee568c2062_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:cc48d9258a74255d7b46dbba8550a224fa97dc5f5fe095093d6e72e1a22a8461_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:d28a834892e0339001e0c414ad1eb697a9d822e5638b8422ae6f2950036bb858_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:f8d74fced944874bb10872332c1fb3884b03cb68449ffad4bb8633d70e700745_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:0f39666f8f6365d09cd0716348344adb091fa47171810fbf821088b5a12978fd_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:a10ba2206c5d95f2df3e198ddc002ee354272e8660acb4ea68797083f35dba6d_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:adfa7c9d11670bf55289595d6d21124741586c1116e3f5427a5fd350e140d094_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:c045f9b0e496240b907d0ba572fc1bbd0a12e1510115ff1884e3a7226206500c_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:574a52d17bd38da7882a32dedbb991ce81b5a67b8fdffe68e51ca477f790d0e1_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:b8c5202df848f0b13960183434c382ae188ed2fa728bc5437e47622ec948c443_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:bace0a9040688db829cccfd83579e0a88ab08991b2ff6dc1064af72a14d5b2f7_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:d13900e0094bac295a523436594d568101888ab10732c297c4ab01ad92d5a296_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:01162aa8ce5c48b47301fd4c9a6835fda1b36358804c3ad50a5230fd151d2916_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:32009013a53f53faeb9107e06f8c654cdaaaa1233bcecdee290e9592df77b968_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:84eb26e40548fbeba8e3b0a85dd167d74c2cdc0909523d25e4942fe22e77eebb_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:ecb1b97101f371f6159e3ca2eecb8be0fb04019ce379e5cc7936c146150cc36c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:5110"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, implement a timeout in your archive/zip processing logic to abort the operation if it exceeds a few seconds, preventing the application from consuming an excessive amount of resources.",
"product_ids": [
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:1e950fd906277c3bafaffa140dc387b14d07d2a818c18638b98d03c21cb618fd_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:64543029a7895652884f31bc0d94cd39868617b1c47bb5cae5e5fa23689e4480_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:9850fe55e07917fc01f1562f3e4ba555c7c1a7ee9bc93edb3ec6e47b45671163_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:a57734fe379ec378107c03068b4fce04ae186656352c810b5db2b91bf8ca1eb1_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:7a5453ebb841bfcaae1b15c823a6ca2e4714d4028a457d5687d412ee568c2062_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:cc48d9258a74255d7b46dbba8550a224fa97dc5f5fe095093d6e72e1a22a8461_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:d28a834892e0339001e0c414ad1eb697a9d822e5638b8422ae6f2950036bb858_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:f8d74fced944874bb10872332c1fb3884b03cb68449ffad4bb8633d70e700745_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:0f39666f8f6365d09cd0716348344adb091fa47171810fbf821088b5a12978fd_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:a10ba2206c5d95f2df3e198ddc002ee354272e8660acb4ea68797083f35dba6d_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:adfa7c9d11670bf55289595d6d21124741586c1116e3f5427a5fd350e140d094_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:c045f9b0e496240b907d0ba572fc1bbd0a12e1510115ff1884e3a7226206500c_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-operator-bundle@sha256:4a587f8153ff2a466414fb69e288f754da2b9f43154ba1ede5e9493a6d43c587_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:574a52d17bd38da7882a32dedbb991ce81b5a67b8fdffe68e51ca477f790d0e1_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:b8c5202df848f0b13960183434c382ae188ed2fa728bc5437e47622ec948c443_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:bace0a9040688db829cccfd83579e0a88ab08991b2ff6dc1064af72a14d5b2f7_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:d13900e0094bac295a523436594d568101888ab10732c297c4ab01ad92d5a296_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:01162aa8ce5c48b47301fd4c9a6835fda1b36358804c3ad50a5230fd151d2916_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:32009013a53f53faeb9107e06f8c654cdaaaa1233bcecdee290e9592df77b968_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:84eb26e40548fbeba8e3b0a85dd167d74c2cdc0909523d25e4942fe22e77eebb_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:ecb1b97101f371f6159e3ca2eecb8be0fb04019ce379e5cc7936c146150cc36c_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:1e950fd906277c3bafaffa140dc387b14d07d2a818c18638b98d03c21cb618fd_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:64543029a7895652884f31bc0d94cd39868617b1c47bb5cae5e5fa23689e4480_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:9850fe55e07917fc01f1562f3e4ba555c7c1a7ee9bc93edb3ec6e47b45671163_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:a57734fe379ec378107c03068b4fce04ae186656352c810b5db2b91bf8ca1eb1_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:7a5453ebb841bfcaae1b15c823a6ca2e4714d4028a457d5687d412ee568c2062_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:cc48d9258a74255d7b46dbba8550a224fa97dc5f5fe095093d6e72e1a22a8461_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:d28a834892e0339001e0c414ad1eb697a9d822e5638b8422ae6f2950036bb858_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:f8d74fced944874bb10872332c1fb3884b03cb68449ffad4bb8633d70e700745_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:0f39666f8f6365d09cd0716348344adb091fa47171810fbf821088b5a12978fd_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:a10ba2206c5d95f2df3e198ddc002ee354272e8660acb4ea68797083f35dba6d_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:adfa7c9d11670bf55289595d6d21124741586c1116e3f5427a5fd350e140d094_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:c045f9b0e496240b907d0ba572fc1bbd0a12e1510115ff1884e3a7226206500c_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-operator-bundle@sha256:4a587f8153ff2a466414fb69e288f754da2b9f43154ba1ede5e9493a6d43c587_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:574a52d17bd38da7882a32dedbb991ce81b5a67b8fdffe68e51ca477f790d0e1_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:b8c5202df848f0b13960183434c382ae188ed2fa728bc5437e47622ec948c443_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:bace0a9040688db829cccfd83579e0a88ab08991b2ff6dc1064af72a14d5b2f7_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:d13900e0094bac295a523436594d568101888ab10732c297c4ab01ad92d5a296_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:01162aa8ce5c48b47301fd4c9a6835fda1b36358804c3ad50a5230fd151d2916_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:32009013a53f53faeb9107e06f8c654cdaaaa1233bcecdee290e9592df77b968_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:84eb26e40548fbeba8e3b0a85dd167d74c2cdc0909523d25e4942fe22e77eebb_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:ecb1b97101f371f6159e3ca2eecb8be0fb04019ce379e5cc7936c146150cc36c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip"
},
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:7a5453ebb841bfcaae1b15c823a6ca2e4714d4028a457d5687d412ee568c2062_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:cc48d9258a74255d7b46dbba8550a224fa97dc5f5fe095093d6e72e1a22a8461_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:d28a834892e0339001e0c414ad1eb697a9d822e5638b8422ae6f2950036bb858_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:f8d74fced944874bb10872332c1fb3884b03cb68449ffad4bb8633d70e700745_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:0f39666f8f6365d09cd0716348344adb091fa47171810fbf821088b5a12978fd_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:a10ba2206c5d95f2df3e198ddc002ee354272e8660acb4ea68797083f35dba6d_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:adfa7c9d11670bf55289595d6d21124741586c1116e3f5427a5fd350e140d094_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:c045f9b0e496240b907d0ba572fc1bbd0a12e1510115ff1884e3a7226206500c_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-operator-bundle@sha256:4a587f8153ff2a466414fb69e288f754da2b9f43154ba1ede5e9493a6d43c587_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:574a52d17bd38da7882a32dedbb991ce81b5a67b8fdffe68e51ca477f790d0e1_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:b8c5202df848f0b13960183434c382ae188ed2fa728bc5437e47622ec948c443_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:bace0a9040688db829cccfd83579e0a88ab08991b2ff6dc1064af72a14d5b2f7_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:d13900e0094bac295a523436594d568101888ab10732c297c4ab01ad92d5a296_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:01162aa8ce5c48b47301fd4c9a6835fda1b36358804c3ad50a5230fd151d2916_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:32009013a53f53faeb9107e06f8c654cdaaaa1233bcecdee290e9592df77b968_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:84eb26e40548fbeba8e3b0a85dd167d74c2cdc0909523d25e4942fe22e77eebb_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:ecb1b97101f371f6159e3ca2eecb8be0fb04019ce379e5cc7936c146150cc36c_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang. A remote attacker could exploit this vulnerability by providing a specially crafted certificate during the error string construction process within the `HostnameError.Error()` function. This flaw, caused by unbounded string concatenation, leads to excessive resource consumption. Successful exploitation can result in a denial of service (DoS) for the affected system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:1e950fd906277c3bafaffa140dc387b14d07d2a818c18638b98d03c21cb618fd_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:64543029a7895652884f31bc0d94cd39868617b1c47bb5cae5e5fa23689e4480_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:9850fe55e07917fc01f1562f3e4ba555c7c1a7ee9bc93edb3ec6e47b45671163_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:a57734fe379ec378107c03068b4fce04ae186656352c810b5db2b91bf8ca1eb1_amd64"
],
"known_not_affected": [
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:7a5453ebb841bfcaae1b15c823a6ca2e4714d4028a457d5687d412ee568c2062_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:cc48d9258a74255d7b46dbba8550a224fa97dc5f5fe095093d6e72e1a22a8461_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:d28a834892e0339001e0c414ad1eb697a9d822e5638b8422ae6f2950036bb858_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:f8d74fced944874bb10872332c1fb3884b03cb68449ffad4bb8633d70e700745_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:0f39666f8f6365d09cd0716348344adb091fa47171810fbf821088b5a12978fd_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:a10ba2206c5d95f2df3e198ddc002ee354272e8660acb4ea68797083f35dba6d_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:adfa7c9d11670bf55289595d6d21124741586c1116e3f5427a5fd350e140d094_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:c045f9b0e496240b907d0ba572fc1bbd0a12e1510115ff1884e3a7226206500c_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-operator-bundle@sha256:4a587f8153ff2a466414fb69e288f754da2b9f43154ba1ede5e9493a6d43c587_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:574a52d17bd38da7882a32dedbb991ce81b5a67b8fdffe68e51ca477f790d0e1_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:b8c5202df848f0b13960183434c382ae188ed2fa728bc5437e47622ec948c443_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:bace0a9040688db829cccfd83579e0a88ab08991b2ff6dc1064af72a14d5b2f7_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:d13900e0094bac295a523436594d568101888ab10732c297c4ab01ad92d5a296_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:01162aa8ce5c48b47301fd4c9a6835fda1b36358804c3ad50a5230fd151d2916_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:32009013a53f53faeb9107e06f8c654cdaaaa1233bcecdee290e9592df77b968_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:84eb26e40548fbeba8e3b0a85dd167d74c2cdc0909523d25e4942fe22e77eebb_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:ecb1b97101f371f6159e3ca2eecb8be0fb04019ce379e5cc7936c146150cc36c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-19T10:27:09+00:00",
"details": "For more details, see the Red Hat Advanced Cluster Management for Kubernetes documentation:\n\nhttps://docs.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.14/html/multicluster_global_hub/index",
"product_ids": [
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:1e950fd906277c3bafaffa140dc387b14d07d2a818c18638b98d03c21cb618fd_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:64543029a7895652884f31bc0d94cd39868617b1c47bb5cae5e5fa23689e4480_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:9850fe55e07917fc01f1562f3e4ba555c7c1a7ee9bc93edb3ec6e47b45671163_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:a57734fe379ec378107c03068b4fce04ae186656352c810b5db2b91bf8ca1eb1_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:5110"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:1e950fd906277c3bafaffa140dc387b14d07d2a818c18638b98d03c21cb618fd_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:64543029a7895652884f31bc0d94cd39868617b1c47bb5cae5e5fa23689e4480_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:9850fe55e07917fc01f1562f3e4ba555c7c1a7ee9bc93edb3ec6e47b45671163_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:a57734fe379ec378107c03068b4fce04ae186656352c810b5db2b91bf8ca1eb1_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:7a5453ebb841bfcaae1b15c823a6ca2e4714d4028a457d5687d412ee568c2062_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:cc48d9258a74255d7b46dbba8550a224fa97dc5f5fe095093d6e72e1a22a8461_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:d28a834892e0339001e0c414ad1eb697a9d822e5638b8422ae6f2950036bb858_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:f8d74fced944874bb10872332c1fb3884b03cb68449ffad4bb8633d70e700745_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:0f39666f8f6365d09cd0716348344adb091fa47171810fbf821088b5a12978fd_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:a10ba2206c5d95f2df3e198ddc002ee354272e8660acb4ea68797083f35dba6d_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:adfa7c9d11670bf55289595d6d21124741586c1116e3f5427a5fd350e140d094_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:c045f9b0e496240b907d0ba572fc1bbd0a12e1510115ff1884e3a7226206500c_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-operator-bundle@sha256:4a587f8153ff2a466414fb69e288f754da2b9f43154ba1ede5e9493a6d43c587_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:574a52d17bd38da7882a32dedbb991ce81b5a67b8fdffe68e51ca477f790d0e1_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:b8c5202df848f0b13960183434c382ae188ed2fa728bc5437e47622ec948c443_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:bace0a9040688db829cccfd83579e0a88ab08991b2ff6dc1064af72a14d5b2f7_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:d13900e0094bac295a523436594d568101888ab10732c297c4ab01ad92d5a296_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:01162aa8ce5c48b47301fd4c9a6835fda1b36358804c3ad50a5230fd151d2916_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:32009013a53f53faeb9107e06f8c654cdaaaa1233bcecdee290e9592df77b968_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:84eb26e40548fbeba8e3b0a85dd167d74c2cdc0909523d25e4942fe22e77eebb_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:ecb1b97101f371f6159e3ca2eecb8be0fb04019ce379e5cc7936c146150cc36c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
},
{
"cve": "CVE-2025-68121",
"discovery_date": "2026-02-05T18:01:30.086058+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:7a5453ebb841bfcaae1b15c823a6ca2e4714d4028a457d5687d412ee568c2062_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:cc48d9258a74255d7b46dbba8550a224fa97dc5f5fe095093d6e72e1a22a8461_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:d28a834892e0339001e0c414ad1eb697a9d822e5638b8422ae6f2950036bb858_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:f8d74fced944874bb10872332c1fb3884b03cb68449ffad4bb8633d70e700745_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:0f39666f8f6365d09cd0716348344adb091fa47171810fbf821088b5a12978fd_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:a10ba2206c5d95f2df3e198ddc002ee354272e8660acb4ea68797083f35dba6d_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:adfa7c9d11670bf55289595d6d21124741586c1116e3f5427a5fd350e140d094_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:c045f9b0e496240b907d0ba572fc1bbd0a12e1510115ff1884e3a7226206500c_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-operator-bundle@sha256:4a587f8153ff2a466414fb69e288f754da2b9f43154ba1ede5e9493a6d43c587_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:574a52d17bd38da7882a32dedbb991ce81b5a67b8fdffe68e51ca477f790d0e1_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:b8c5202df848f0b13960183434c382ae188ed2fa728bc5437e47622ec948c443_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:bace0a9040688db829cccfd83579e0a88ab08991b2ff6dc1064af72a14d5b2f7_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:d13900e0094bac295a523436594d568101888ab10732c297c4ab01ad92d5a296_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:01162aa8ce5c48b47301fd4c9a6835fda1b36358804c3ad50a5230fd151d2916_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:32009013a53f53faeb9107e06f8c654cdaaaa1233bcecdee290e9592df77b968_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:84eb26e40548fbeba8e3b0a85dd167d74c2cdc0909523d25e4942fe22e77eebb_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:ecb1b97101f371f6159e3ca2eecb8be0fb04019ce379e5cc7936c146150cc36c_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2437111"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the crypto/tls component. This vulnerability occurs during Transport Layer Security (TLS) session resumption when certificate authority (CA) settings are modified between the initial and resumed handshakes. An attacker could exploit this to bypass certificate validation, allowing a client or server to establish a connection that should have been rejected. This could lead to an authentication bypass under specific conditions.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/tls: crypto/tls: Incorrect certificate validation during TLS session resumption",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This is a moderate flaw because it only occurs under specific conditions, such as TLS session resumption with runtime changes to certificate authority settings. Exploitation is not straightforward and requires a controlled setup. The impact is limited to certificate validation within the same component and does not affect system availability.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:1e950fd906277c3bafaffa140dc387b14d07d2a818c18638b98d03c21cb618fd_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:64543029a7895652884f31bc0d94cd39868617b1c47bb5cae5e5fa23689e4480_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:9850fe55e07917fc01f1562f3e4ba555c7c1a7ee9bc93edb3ec6e47b45671163_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:a57734fe379ec378107c03068b4fce04ae186656352c810b5db2b91bf8ca1eb1_amd64"
],
"known_not_affected": [
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:7a5453ebb841bfcaae1b15c823a6ca2e4714d4028a457d5687d412ee568c2062_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:cc48d9258a74255d7b46dbba8550a224fa97dc5f5fe095093d6e72e1a22a8461_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:d28a834892e0339001e0c414ad1eb697a9d822e5638b8422ae6f2950036bb858_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:f8d74fced944874bb10872332c1fb3884b03cb68449ffad4bb8633d70e700745_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:0f39666f8f6365d09cd0716348344adb091fa47171810fbf821088b5a12978fd_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:a10ba2206c5d95f2df3e198ddc002ee354272e8660acb4ea68797083f35dba6d_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:adfa7c9d11670bf55289595d6d21124741586c1116e3f5427a5fd350e140d094_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:c045f9b0e496240b907d0ba572fc1bbd0a12e1510115ff1884e3a7226206500c_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-operator-bundle@sha256:4a587f8153ff2a466414fb69e288f754da2b9f43154ba1ede5e9493a6d43c587_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:574a52d17bd38da7882a32dedbb991ce81b5a67b8fdffe68e51ca477f790d0e1_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:b8c5202df848f0b13960183434c382ae188ed2fa728bc5437e47622ec948c443_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:bace0a9040688db829cccfd83579e0a88ab08991b2ff6dc1064af72a14d5b2f7_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:d13900e0094bac295a523436594d568101888ab10732c297c4ab01ad92d5a296_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:01162aa8ce5c48b47301fd4c9a6835fda1b36358804c3ad50a5230fd151d2916_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:32009013a53f53faeb9107e06f8c654cdaaaa1233bcecdee290e9592df77b968_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:84eb26e40548fbeba8e3b0a85dd167d74c2cdc0909523d25e4942fe22e77eebb_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:ecb1b97101f371f6159e3ca2eecb8be0fb04019ce379e5cc7936c146150cc36c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "RHBZ#2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"category": "external",
"summary": "https://go.dev/cl/737700",
"url": "https://go.dev/cl/737700"
},
{
"category": "external",
"summary": "https://go.dev/issue/77217",
"url": "https://go.dev/issue/77217"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk",
"url": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4337",
"url": "https://pkg.go.dev/vuln/GO-2026-4337"
}
],
"release_date": "2026-02-05T17:48:44.141000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-19T10:27:09+00:00",
"details": "For more details, see the Red Hat Advanced Cluster Management for Kubernetes documentation:\n\nhttps://docs.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.14/html/multicluster_global_hub/index",
"product_ids": [
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:1e950fd906277c3bafaffa140dc387b14d07d2a818c18638b98d03c21cb618fd_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:64543029a7895652884f31bc0d94cd39868617b1c47bb5cae5e5fa23689e4480_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:9850fe55e07917fc01f1562f3e4ba555c7c1a7ee9bc93edb3ec6e47b45671163_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:a57734fe379ec378107c03068b4fce04ae186656352c810b5db2b91bf8ca1eb1_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:5110"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:1e950fd906277c3bafaffa140dc387b14d07d2a818c18638b98d03c21cb618fd_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:64543029a7895652884f31bc0d94cd39868617b1c47bb5cae5e5fa23689e4480_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:9850fe55e07917fc01f1562f3e4ba555c7c1a7ee9bc93edb3ec6e47b45671163_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:a57734fe379ec378107c03068b4fce04ae186656352c810b5db2b91bf8ca1eb1_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:7a5453ebb841bfcaae1b15c823a6ca2e4714d4028a457d5687d412ee568c2062_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:cc48d9258a74255d7b46dbba8550a224fa97dc5f5fe095093d6e72e1a22a8461_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:d28a834892e0339001e0c414ad1eb697a9d822e5638b8422ae6f2950036bb858_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:f8d74fced944874bb10872332c1fb3884b03cb68449ffad4bb8633d70e700745_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:0f39666f8f6365d09cd0716348344adb091fa47171810fbf821088b5a12978fd_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:a10ba2206c5d95f2df3e198ddc002ee354272e8660acb4ea68797083f35dba6d_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:adfa7c9d11670bf55289595d6d21124741586c1116e3f5427a5fd350e140d094_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:c045f9b0e496240b907d0ba572fc1bbd0a12e1510115ff1884e3a7226206500c_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-operator-bundle@sha256:4a587f8153ff2a466414fb69e288f754da2b9f43154ba1ede5e9493a6d43c587_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:574a52d17bd38da7882a32dedbb991ce81b5a67b8fdffe68e51ca477f790d0e1_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:b8c5202df848f0b13960183434c382ae188ed2fa728bc5437e47622ec948c443_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:bace0a9040688db829cccfd83579e0a88ab08991b2ff6dc1064af72a14d5b2f7_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:d13900e0094bac295a523436594d568101888ab10732c297c4ab01ad92d5a296_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:01162aa8ce5c48b47301fd4c9a6835fda1b36358804c3ad50a5230fd151d2916_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:32009013a53f53faeb9107e06f8c654cdaaaa1233bcecdee290e9592df77b968_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:84eb26e40548fbeba8e3b0a85dd167d74c2cdc0909523d25e4942fe22e77eebb_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:ecb1b97101f371f6159e3ca2eecb8be0fb04019ce379e5cc7936c146150cc36c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "crypto/tls: crypto/tls: Incorrect certificate validation during TLS session resumption"
},
{
"cve": "CVE-2026-25679",
"cwe": {
"id": "CWE-1286",
"name": "Improper Validation of Syntactic Correctness of Input"
},
"discovery_date": "2026-03-06T22:02:11.567841+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:7a5453ebb841bfcaae1b15c823a6ca2e4714d4028a457d5687d412ee568c2062_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:cc48d9258a74255d7b46dbba8550a224fa97dc5f5fe095093d6e72e1a22a8461_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:d28a834892e0339001e0c414ad1eb697a9d822e5638b8422ae6f2950036bb858_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:f8d74fced944874bb10872332c1fb3884b03cb68449ffad4bb8633d70e700745_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:0f39666f8f6365d09cd0716348344adb091fa47171810fbf821088b5a12978fd_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:a10ba2206c5d95f2df3e198ddc002ee354272e8660acb4ea68797083f35dba6d_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:adfa7c9d11670bf55289595d6d21124741586c1116e3f5427a5fd350e140d094_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:c045f9b0e496240b907d0ba572fc1bbd0a12e1510115ff1884e3a7226206500c_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-operator-bundle@sha256:4a587f8153ff2a466414fb69e288f754da2b9f43154ba1ede5e9493a6d43c587_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:574a52d17bd38da7882a32dedbb991ce81b5a67b8fdffe68e51ca477f790d0e1_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:b8c5202df848f0b13960183434c382ae188ed2fa728bc5437e47622ec948c443_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:bace0a9040688db829cccfd83579e0a88ab08991b2ff6dc1064af72a14d5b2f7_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:d13900e0094bac295a523436594d568101888ab10732c297c4ab01ad92d5a296_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:01162aa8ce5c48b47301fd4c9a6835fda1b36358804c3ad50a5230fd151d2916_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:32009013a53f53faeb9107e06f8c654cdaaaa1233bcecdee290e9592df77b968_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:84eb26e40548fbeba8e3b0a85dd167d74c2cdc0909523d25e4942fe22e77eebb_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:ecb1b97101f371f6159e3ca2eecb8be0fb04019ce379e5cc7936c146150cc36c_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2445356"
}
],
"notes": [
{
"category": "description",
"text": "The Go standard library function net/url.Parse insufficiently validated the host/authority component and accepted some invalid URLs by effectively treating garbage before an IP-literal as ignorable. The function should have rejected this as invalid.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "net/url: Incorrect parsing of IPv6 host literals in net/url",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:1e950fd906277c3bafaffa140dc387b14d07d2a818c18638b98d03c21cb618fd_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:64543029a7895652884f31bc0d94cd39868617b1c47bb5cae5e5fa23689e4480_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:9850fe55e07917fc01f1562f3e4ba555c7c1a7ee9bc93edb3ec6e47b45671163_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:a57734fe379ec378107c03068b4fce04ae186656352c810b5db2b91bf8ca1eb1_amd64"
],
"known_not_affected": [
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:7a5453ebb841bfcaae1b15c823a6ca2e4714d4028a457d5687d412ee568c2062_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:cc48d9258a74255d7b46dbba8550a224fa97dc5f5fe095093d6e72e1a22a8461_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:d28a834892e0339001e0c414ad1eb697a9d822e5638b8422ae6f2950036bb858_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:f8d74fced944874bb10872332c1fb3884b03cb68449ffad4bb8633d70e700745_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:0f39666f8f6365d09cd0716348344adb091fa47171810fbf821088b5a12978fd_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:a10ba2206c5d95f2df3e198ddc002ee354272e8660acb4ea68797083f35dba6d_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:adfa7c9d11670bf55289595d6d21124741586c1116e3f5427a5fd350e140d094_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:c045f9b0e496240b907d0ba572fc1bbd0a12e1510115ff1884e3a7226206500c_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-operator-bundle@sha256:4a587f8153ff2a466414fb69e288f754da2b9f43154ba1ede5e9493a6d43c587_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:574a52d17bd38da7882a32dedbb991ce81b5a67b8fdffe68e51ca477f790d0e1_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:b8c5202df848f0b13960183434c382ae188ed2fa728bc5437e47622ec948c443_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:bace0a9040688db829cccfd83579e0a88ab08991b2ff6dc1064af72a14d5b2f7_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:d13900e0094bac295a523436594d568101888ab10732c297c4ab01ad92d5a296_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:01162aa8ce5c48b47301fd4c9a6835fda1b36358804c3ad50a5230fd151d2916_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:32009013a53f53faeb9107e06f8c654cdaaaa1233bcecdee290e9592df77b968_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:84eb26e40548fbeba8e3b0a85dd167d74c2cdc0909523d25e4942fe22e77eebb_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:ecb1b97101f371f6159e3ca2eecb8be0fb04019ce379e5cc7936c146150cc36c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-25679"
},
{
"category": "external",
"summary": "RHBZ#2445356",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2445356"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-25679",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25679"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-25679",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25679"
},
{
"category": "external",
"summary": "https://go.dev/cl/752180",
"url": "https://go.dev/cl/752180"
},
{
"category": "external",
"summary": "https://go.dev/issue/77578",
"url": "https://go.dev/issue/77578"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk",
"url": "https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4601",
"url": "https://pkg.go.dev/vuln/GO-2026-4601"
}
],
"release_date": "2026-03-06T21:28:14.211000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-19T10:27:09+00:00",
"details": "For more details, see the Red Hat Advanced Cluster Management for Kubernetes documentation:\n\nhttps://docs.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.14/html/multicluster_global_hub/index",
"product_ids": [
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:1e950fd906277c3bafaffa140dc387b14d07d2a818c18638b98d03c21cb618fd_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:64543029a7895652884f31bc0d94cd39868617b1c47bb5cae5e5fa23689e4480_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:9850fe55e07917fc01f1562f3e4ba555c7c1a7ee9bc93edb3ec6e47b45671163_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:a57734fe379ec378107c03068b4fce04ae186656352c810b5db2b91bf8ca1eb1_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:5110"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:1e950fd906277c3bafaffa140dc387b14d07d2a818c18638b98d03c21cb618fd_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:64543029a7895652884f31bc0d94cd39868617b1c47bb5cae5e5fa23689e4480_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:9850fe55e07917fc01f1562f3e4ba555c7c1a7ee9bc93edb3ec6e47b45671163_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:a57734fe379ec378107c03068b4fce04ae186656352c810b5db2b91bf8ca1eb1_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:7a5453ebb841bfcaae1b15c823a6ca2e4714d4028a457d5687d412ee568c2062_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:cc48d9258a74255d7b46dbba8550a224fa97dc5f5fe095093d6e72e1a22a8461_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:d28a834892e0339001e0c414ad1eb697a9d822e5638b8422ae6f2950036bb858_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:f8d74fced944874bb10872332c1fb3884b03cb68449ffad4bb8633d70e700745_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:0f39666f8f6365d09cd0716348344adb091fa47171810fbf821088b5a12978fd_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:a10ba2206c5d95f2df3e198ddc002ee354272e8660acb4ea68797083f35dba6d_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:adfa7c9d11670bf55289595d6d21124741586c1116e3f5427a5fd350e140d094_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:c045f9b0e496240b907d0ba572fc1bbd0a12e1510115ff1884e3a7226206500c_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-operator-bundle@sha256:4a587f8153ff2a466414fb69e288f754da2b9f43154ba1ede5e9493a6d43c587_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:574a52d17bd38da7882a32dedbb991ce81b5a67b8fdffe68e51ca477f790d0e1_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:b8c5202df848f0b13960183434c382ae188ed2fa728bc5437e47622ec948c443_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:bace0a9040688db829cccfd83579e0a88ab08991b2ff6dc1064af72a14d5b2f7_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:d13900e0094bac295a523436594d568101888ab10732c297c4ab01ad92d5a296_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:01162aa8ce5c48b47301fd4c9a6835fda1b36358804c3ad50a5230fd151d2916_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:32009013a53f53faeb9107e06f8c654cdaaaa1233bcecdee290e9592df77b968_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:84eb26e40548fbeba8e3b0a85dd167d74c2cdc0909523d25e4942fe22e77eebb_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:ecb1b97101f371f6159e3ca2eecb8be0fb04019ce379e5cc7936c146150cc36c_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:1e950fd906277c3bafaffa140dc387b14d07d2a818c18638b98d03c21cb618fd_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:64543029a7895652884f31bc0d94cd39868617b1c47bb5cae5e5fa23689e4480_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:9850fe55e07917fc01f1562f3e4ba555c7c1a7ee9bc93edb3ec6e47b45671163_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:a57734fe379ec378107c03068b4fce04ae186656352c810b5db2b91bf8ca1eb1_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:7a5453ebb841bfcaae1b15c823a6ca2e4714d4028a457d5687d412ee568c2062_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:cc48d9258a74255d7b46dbba8550a224fa97dc5f5fe095093d6e72e1a22a8461_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:d28a834892e0339001e0c414ad1eb697a9d822e5638b8422ae6f2950036bb858_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:f8d74fced944874bb10872332c1fb3884b03cb68449ffad4bb8633d70e700745_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:0f39666f8f6365d09cd0716348344adb091fa47171810fbf821088b5a12978fd_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:a10ba2206c5d95f2df3e198ddc002ee354272e8660acb4ea68797083f35dba6d_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:adfa7c9d11670bf55289595d6d21124741586c1116e3f5427a5fd350e140d094_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:c045f9b0e496240b907d0ba572fc1bbd0a12e1510115ff1884e3a7226206500c_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-operator-bundle@sha256:4a587f8153ff2a466414fb69e288f754da2b9f43154ba1ede5e9493a6d43c587_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:574a52d17bd38da7882a32dedbb991ce81b5a67b8fdffe68e51ca477f790d0e1_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:b8c5202df848f0b13960183434c382ae188ed2fa728bc5437e47622ec948c443_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:bace0a9040688db829cccfd83579e0a88ab08991b2ff6dc1064af72a14d5b2f7_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:d13900e0094bac295a523436594d568101888ab10732c297c4ab01ad92d5a296_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:01162aa8ce5c48b47301fd4c9a6835fda1b36358804c3ad50a5230fd151d2916_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:32009013a53f53faeb9107e06f8c654cdaaaa1233bcecdee290e9592df77b968_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:84eb26e40548fbeba8e3b0a85dd167d74c2cdc0909523d25e4942fe22e77eebb_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:ecb1b97101f371f6159e3ca2eecb8be0fb04019ce379e5cc7936c146150cc36c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "net/url: Incorrect parsing of IPv6 host literals in net/url"
},
{
"cve": "CVE-2026-27137",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"discovery_date": "2026-03-06T22:01:38.859733+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:7a5453ebb841bfcaae1b15c823a6ca2e4714d4028a457d5687d412ee568c2062_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:cc48d9258a74255d7b46dbba8550a224fa97dc5f5fe095093d6e72e1a22a8461_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:d28a834892e0339001e0c414ad1eb697a9d822e5638b8422ae6f2950036bb858_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:f8d74fced944874bb10872332c1fb3884b03cb68449ffad4bb8633d70e700745_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:0f39666f8f6365d09cd0716348344adb091fa47171810fbf821088b5a12978fd_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:a10ba2206c5d95f2df3e198ddc002ee354272e8660acb4ea68797083f35dba6d_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:adfa7c9d11670bf55289595d6d21124741586c1116e3f5427a5fd350e140d094_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:c045f9b0e496240b907d0ba572fc1bbd0a12e1510115ff1884e3a7226206500c_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-operator-bundle@sha256:4a587f8153ff2a466414fb69e288f754da2b9f43154ba1ede5e9493a6d43c587_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:574a52d17bd38da7882a32dedbb991ce81b5a67b8fdffe68e51ca477f790d0e1_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:b8c5202df848f0b13960183434c382ae188ed2fa728bc5437e47622ec948c443_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:bace0a9040688db829cccfd83579e0a88ab08991b2ff6dc1064af72a14d5b2f7_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:d13900e0094bac295a523436594d568101888ab10732c297c4ab01ad92d5a296_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:01162aa8ce5c48b47301fd4c9a6835fda1b36358804c3ad50a5230fd151d2916_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:32009013a53f53faeb9107e06f8c654cdaaaa1233bcecdee290e9592df77b968_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:84eb26e40548fbeba8e3b0a85dd167d74c2cdc0909523d25e4942fe22e77eebb_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:ecb1b97101f371f6159e3ca2eecb8be0fb04019ce379e5cc7936c146150cc36c_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2445345"
}
],
"notes": [
{
"category": "description",
"text": "A certificate validation flaw has been discovered in the golang crypto/x509 module. When verifying a certificate chain which contains a certificate containing multiple email address constraints which share common local portions but different domain portions, these constraints will not be properly applied, and only the last constraint will be considered.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: Incorrect enforcement of email constraints in crypto/x509",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:1e950fd906277c3bafaffa140dc387b14d07d2a818c18638b98d03c21cb618fd_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:64543029a7895652884f31bc0d94cd39868617b1c47bb5cae5e5fa23689e4480_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:9850fe55e07917fc01f1562f3e4ba555c7c1a7ee9bc93edb3ec6e47b45671163_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:a57734fe379ec378107c03068b4fce04ae186656352c810b5db2b91bf8ca1eb1_amd64"
],
"known_not_affected": [
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:7a5453ebb841bfcaae1b15c823a6ca2e4714d4028a457d5687d412ee568c2062_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:cc48d9258a74255d7b46dbba8550a224fa97dc5f5fe095093d6e72e1a22a8461_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:d28a834892e0339001e0c414ad1eb697a9d822e5638b8422ae6f2950036bb858_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:f8d74fced944874bb10872332c1fb3884b03cb68449ffad4bb8633d70e700745_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:0f39666f8f6365d09cd0716348344adb091fa47171810fbf821088b5a12978fd_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:a10ba2206c5d95f2df3e198ddc002ee354272e8660acb4ea68797083f35dba6d_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:adfa7c9d11670bf55289595d6d21124741586c1116e3f5427a5fd350e140d094_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:c045f9b0e496240b907d0ba572fc1bbd0a12e1510115ff1884e3a7226206500c_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-operator-bundle@sha256:4a587f8153ff2a466414fb69e288f754da2b9f43154ba1ede5e9493a6d43c587_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:574a52d17bd38da7882a32dedbb991ce81b5a67b8fdffe68e51ca477f790d0e1_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:b8c5202df848f0b13960183434c382ae188ed2fa728bc5437e47622ec948c443_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:bace0a9040688db829cccfd83579e0a88ab08991b2ff6dc1064af72a14d5b2f7_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:d13900e0094bac295a523436594d568101888ab10732c297c4ab01ad92d5a296_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:01162aa8ce5c48b47301fd4c9a6835fda1b36358804c3ad50a5230fd151d2916_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:32009013a53f53faeb9107e06f8c654cdaaaa1233bcecdee290e9592df77b968_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:84eb26e40548fbeba8e3b0a85dd167d74c2cdc0909523d25e4942fe22e77eebb_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:ecb1b97101f371f6159e3ca2eecb8be0fb04019ce379e5cc7936c146150cc36c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-27137"
},
{
"category": "external",
"summary": "RHBZ#2445345",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2445345"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-27137",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27137"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-27137",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27137"
},
{
"category": "external",
"summary": "https://go.dev/cl/752182",
"url": "https://go.dev/cl/752182"
},
{
"category": "external",
"summary": "https://go.dev/issue/77952",
"url": "https://go.dev/issue/77952"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk",
"url": "https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4599",
"url": "https://pkg.go.dev/vuln/GO-2026-4599"
}
],
"release_date": "2026-03-06T21:28:13.748000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-19T10:27:09+00:00",
"details": "For more details, see the Red Hat Advanced Cluster Management for Kubernetes documentation:\n\nhttps://docs.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.14/html/multicluster_global_hub/index",
"product_ids": [
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:1e950fd906277c3bafaffa140dc387b14d07d2a818c18638b98d03c21cb618fd_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:64543029a7895652884f31bc0d94cd39868617b1c47bb5cae5e5fa23689e4480_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:9850fe55e07917fc01f1562f3e4ba555c7c1a7ee9bc93edb3ec6e47b45671163_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:a57734fe379ec378107c03068b4fce04ae186656352c810b5db2b91bf8ca1eb1_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:5110"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:1e950fd906277c3bafaffa140dc387b14d07d2a818c18638b98d03c21cb618fd_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:64543029a7895652884f31bc0d94cd39868617b1c47bb5cae5e5fa23689e4480_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:9850fe55e07917fc01f1562f3e4ba555c7c1a7ee9bc93edb3ec6e47b45671163_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:a57734fe379ec378107c03068b4fce04ae186656352c810b5db2b91bf8ca1eb1_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:7a5453ebb841bfcaae1b15c823a6ca2e4714d4028a457d5687d412ee568c2062_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:cc48d9258a74255d7b46dbba8550a224fa97dc5f5fe095093d6e72e1a22a8461_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:d28a834892e0339001e0c414ad1eb697a9d822e5638b8422ae6f2950036bb858_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:f8d74fced944874bb10872332c1fb3884b03cb68449ffad4bb8633d70e700745_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:0f39666f8f6365d09cd0716348344adb091fa47171810fbf821088b5a12978fd_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:a10ba2206c5d95f2df3e198ddc002ee354272e8660acb4ea68797083f35dba6d_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:adfa7c9d11670bf55289595d6d21124741586c1116e3f5427a5fd350e140d094_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:c045f9b0e496240b907d0ba572fc1bbd0a12e1510115ff1884e3a7226206500c_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-operator-bundle@sha256:4a587f8153ff2a466414fb69e288f754da2b9f43154ba1ede5e9493a6d43c587_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:574a52d17bd38da7882a32dedbb991ce81b5a67b8fdffe68e51ca477f790d0e1_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:b8c5202df848f0b13960183434c382ae188ed2fa728bc5437e47622ec948c443_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:bace0a9040688db829cccfd83579e0a88ab08991b2ff6dc1064af72a14d5b2f7_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:d13900e0094bac295a523436594d568101888ab10732c297c4ab01ad92d5a296_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:01162aa8ce5c48b47301fd4c9a6835fda1b36358804c3ad50a5230fd151d2916_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:32009013a53f53faeb9107e06f8c654cdaaaa1233bcecdee290e9592df77b968_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:84eb26e40548fbeba8e3b0a85dd167d74c2cdc0909523d25e4942fe22e77eebb_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:ecb1b97101f371f6159e3ca2eecb8be0fb04019ce379e5cc7936c146150cc36c_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:1e950fd906277c3bafaffa140dc387b14d07d2a818c18638b98d03c21cb618fd_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:64543029a7895652884f31bc0d94cd39868617b1c47bb5cae5e5fa23689e4480_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:9850fe55e07917fc01f1562f3e4ba555c7c1a7ee9bc93edb3ec6e47b45671163_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:a57734fe379ec378107c03068b4fce04ae186656352c810b5db2b91bf8ca1eb1_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:7a5453ebb841bfcaae1b15c823a6ca2e4714d4028a457d5687d412ee568c2062_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:cc48d9258a74255d7b46dbba8550a224fa97dc5f5fe095093d6e72e1a22a8461_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:d28a834892e0339001e0c414ad1eb697a9d822e5638b8422ae6f2950036bb858_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:f8d74fced944874bb10872332c1fb3884b03cb68449ffad4bb8633d70e700745_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:0f39666f8f6365d09cd0716348344adb091fa47171810fbf821088b5a12978fd_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:a10ba2206c5d95f2df3e198ddc002ee354272e8660acb4ea68797083f35dba6d_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:adfa7c9d11670bf55289595d6d21124741586c1116e3f5427a5fd350e140d094_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:c045f9b0e496240b907d0ba572fc1bbd0a12e1510115ff1884e3a7226206500c_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-operator-bundle@sha256:4a587f8153ff2a466414fb69e288f754da2b9f43154ba1ede5e9493a6d43c587_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:574a52d17bd38da7882a32dedbb991ce81b5a67b8fdffe68e51ca477f790d0e1_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:b8c5202df848f0b13960183434c382ae188ed2fa728bc5437e47622ec948c443_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:bace0a9040688db829cccfd83579e0a88ab08991b2ff6dc1064af72a14d5b2f7_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:d13900e0094bac295a523436594d568101888ab10732c297c4ab01ad92d5a296_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:01162aa8ce5c48b47301fd4c9a6835fda1b36358804c3ad50a5230fd151d2916_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:32009013a53f53faeb9107e06f8c654cdaaaa1233bcecdee290e9592df77b968_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:84eb26e40548fbeba8e3b0a85dd167d74c2cdc0909523d25e4942fe22e77eebb_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:ecb1b97101f371f6159e3ca2eecb8be0fb04019ce379e5cc7936c146150cc36c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: Incorrect enforcement of email constraints in crypto/x509"
},
{
"cve": "CVE-2026-27571",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-02-24T17:04:11.684134+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:1e950fd906277c3bafaffa140dc387b14d07d2a818c18638b98d03c21cb618fd_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:64543029a7895652884f31bc0d94cd39868617b1c47bb5cae5e5fa23689e4480_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:9850fe55e07917fc01f1562f3e4ba555c7c1a7ee9bc93edb3ec6e47b45671163_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:a57734fe379ec378107c03068b4fce04ae186656352c810b5db2b91bf8ca1eb1_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:0f39666f8f6365d09cd0716348344adb091fa47171810fbf821088b5a12978fd_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:a10ba2206c5d95f2df3e198ddc002ee354272e8660acb4ea68797083f35dba6d_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:adfa7c9d11670bf55289595d6d21124741586c1116e3f5427a5fd350e140d094_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:c045f9b0e496240b907d0ba572fc1bbd0a12e1510115ff1884e3a7226206500c_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-operator-bundle@sha256:4a587f8153ff2a466414fb69e288f754da2b9f43154ba1ede5e9493a6d43c587_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:574a52d17bd38da7882a32dedbb991ce81b5a67b8fdffe68e51ca477f790d0e1_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:b8c5202df848f0b13960183434c382ae188ed2fa728bc5437e47622ec948c443_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:bace0a9040688db829cccfd83579e0a88ab08991b2ff6dc1064af72a14d5b2f7_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:d13900e0094bac295a523436594d568101888ab10732c297c4ab01ad92d5a296_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:01162aa8ce5c48b47301fd4c9a6835fda1b36358804c3ad50a5230fd151d2916_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:32009013a53f53faeb9107e06f8c654cdaaaa1233bcecdee290e9592df77b968_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:84eb26e40548fbeba8e3b0a85dd167d74c2cdc0909523d25e4942fe22e77eebb_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:ecb1b97101f371f6159e3ca2eecb8be0fb04019ce379e5cc7936c146150cc36c_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2442401"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in nats-server. The WebSockets implementation fails to enforce a memory allocation limit during the decompression of WebSocket messages. A malicious compressed payload allows an attacker to cause an excessive memory consumption, eventually resulting in a server crash and a complete denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nats-server: WebSockets pre-auth memory DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw does not require valid NATS credentials to be exploited as the use of compression is negotiated before the authentication process. However, only deployments using WebSockets and that are exposed to untrusted network endpoints are vulnerable to this issue, limiting its exposure. Due to these reasons, this issue has been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:7a5453ebb841bfcaae1b15c823a6ca2e4714d4028a457d5687d412ee568c2062_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:cc48d9258a74255d7b46dbba8550a224fa97dc5f5fe095093d6e72e1a22a8461_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:d28a834892e0339001e0c414ad1eb697a9d822e5638b8422ae6f2950036bb858_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:f8d74fced944874bb10872332c1fb3884b03cb68449ffad4bb8633d70e700745_arm64"
],
"known_not_affected": [
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:1e950fd906277c3bafaffa140dc387b14d07d2a818c18638b98d03c21cb618fd_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:64543029a7895652884f31bc0d94cd39868617b1c47bb5cae5e5fa23689e4480_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:9850fe55e07917fc01f1562f3e4ba555c7c1a7ee9bc93edb3ec6e47b45671163_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:a57734fe379ec378107c03068b4fce04ae186656352c810b5db2b91bf8ca1eb1_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:0f39666f8f6365d09cd0716348344adb091fa47171810fbf821088b5a12978fd_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:a10ba2206c5d95f2df3e198ddc002ee354272e8660acb4ea68797083f35dba6d_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:adfa7c9d11670bf55289595d6d21124741586c1116e3f5427a5fd350e140d094_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:c045f9b0e496240b907d0ba572fc1bbd0a12e1510115ff1884e3a7226206500c_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-operator-bundle@sha256:4a587f8153ff2a466414fb69e288f754da2b9f43154ba1ede5e9493a6d43c587_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:574a52d17bd38da7882a32dedbb991ce81b5a67b8fdffe68e51ca477f790d0e1_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:b8c5202df848f0b13960183434c382ae188ed2fa728bc5437e47622ec948c443_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:bace0a9040688db829cccfd83579e0a88ab08991b2ff6dc1064af72a14d5b2f7_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:d13900e0094bac295a523436594d568101888ab10732c297c4ab01ad92d5a296_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:01162aa8ce5c48b47301fd4c9a6835fda1b36358804c3ad50a5230fd151d2916_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:32009013a53f53faeb9107e06f8c654cdaaaa1233bcecdee290e9592df77b968_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:84eb26e40548fbeba8e3b0a85dd167d74c2cdc0909523d25e4942fe22e77eebb_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:ecb1b97101f371f6159e3ca2eecb8be0fb04019ce379e5cc7936c146150cc36c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-27571"
},
{
"category": "external",
"summary": "RHBZ#2442401",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2442401"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-27571",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27571"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-27571",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27571"
},
{
"category": "external",
"summary": "https://github.com/nats-io/nats-server/commit/f77fb7c4535e6727cc1a2899cd8e6bbdd8ba2017",
"url": "https://github.com/nats-io/nats-server/commit/f77fb7c4535e6727cc1a2899cd8e6bbdd8ba2017"
},
{
"category": "external",
"summary": "https://github.com/nats-io/nats-server/releases/tag/v2.11.12",
"url": "https://github.com/nats-io/nats-server/releases/tag/v2.11.12"
},
{
"category": "external",
"summary": "https://github.com/nats-io/nats-server/releases/tag/v2.12.3",
"url": "https://github.com/nats-io/nats-server/releases/tag/v2.12.3"
},
{
"category": "external",
"summary": "https://github.com/nats-io/nats-server/security/advisories/GHSA-qrvq-68c2-7grw",
"url": "https://github.com/nats-io/nats-server/security/advisories/GHSA-qrvq-68c2-7grw"
}
],
"release_date": "2026-02-24T15:59:17.926000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-19T10:27:09+00:00",
"details": "For more details, see the Red Hat Advanced Cluster Management for Kubernetes documentation:\n\nhttps://docs.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.14/html/multicluster_global_hub/index",
"product_ids": [
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:7a5453ebb841bfcaae1b15c823a6ca2e4714d4028a457d5687d412ee568c2062_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:cc48d9258a74255d7b46dbba8550a224fa97dc5f5fe095093d6e72e1a22a8461_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:d28a834892e0339001e0c414ad1eb697a9d822e5638b8422ae6f2950036bb858_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:f8d74fced944874bb10872332c1fb3884b03cb68449ffad4bb8633d70e700745_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:5110"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:1e950fd906277c3bafaffa140dc387b14d07d2a818c18638b98d03c21cb618fd_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:64543029a7895652884f31bc0d94cd39868617b1c47bb5cae5e5fa23689e4480_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:9850fe55e07917fc01f1562f3e4ba555c7c1a7ee9bc93edb3ec6e47b45671163_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:a57734fe379ec378107c03068b4fce04ae186656352c810b5db2b91bf8ca1eb1_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:7a5453ebb841bfcaae1b15c823a6ca2e4714d4028a457d5687d412ee568c2062_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:cc48d9258a74255d7b46dbba8550a224fa97dc5f5fe095093d6e72e1a22a8461_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:d28a834892e0339001e0c414ad1eb697a9d822e5638b8422ae6f2950036bb858_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:f8d74fced944874bb10872332c1fb3884b03cb68449ffad4bb8633d70e700745_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:0f39666f8f6365d09cd0716348344adb091fa47171810fbf821088b5a12978fd_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:a10ba2206c5d95f2df3e198ddc002ee354272e8660acb4ea68797083f35dba6d_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:adfa7c9d11670bf55289595d6d21124741586c1116e3f5427a5fd350e140d094_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:c045f9b0e496240b907d0ba572fc1bbd0a12e1510115ff1884e3a7226206500c_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-operator-bundle@sha256:4a587f8153ff2a466414fb69e288f754da2b9f43154ba1ede5e9493a6d43c587_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:574a52d17bd38da7882a32dedbb991ce81b5a67b8fdffe68e51ca477f790d0e1_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:b8c5202df848f0b13960183434c382ae188ed2fa728bc5437e47622ec948c443_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:bace0a9040688db829cccfd83579e0a88ab08991b2ff6dc1064af72a14d5b2f7_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:d13900e0094bac295a523436594d568101888ab10732c297c4ab01ad92d5a296_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:01162aa8ce5c48b47301fd4c9a6835fda1b36358804c3ad50a5230fd151d2916_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:32009013a53f53faeb9107e06f8c654cdaaaa1233bcecdee290e9592df77b968_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:84eb26e40548fbeba8e3b0a85dd167d74c2cdc0909523d25e4942fe22e77eebb_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:ecb1b97101f371f6159e3ca2eecb8be0fb04019ce379e5cc7936c146150cc36c_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:1e950fd906277c3bafaffa140dc387b14d07d2a818c18638b98d03c21cb618fd_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:64543029a7895652884f31bc0d94cd39868617b1c47bb5cae5e5fa23689e4480_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:9850fe55e07917fc01f1562f3e4ba555c7c1a7ee9bc93edb3ec6e47b45671163_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9@sha256:a57734fe379ec378107c03068b4fce04ae186656352c810b5db2b91bf8ca1eb1_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:7a5453ebb841bfcaae1b15c823a6ca2e4714d4028a457d5687d412ee568c2062_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:cc48d9258a74255d7b46dbba8550a224fa97dc5f5fe095093d6e72e1a22a8461_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:d28a834892e0339001e0c414ad1eb697a9d822e5638b8422ae6f2950036bb858_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9@sha256:f8d74fced944874bb10872332c1fb3884b03cb68449ffad4bb8633d70e700745_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:0f39666f8f6365d09cd0716348344adb091fa47171810fbf821088b5a12978fd_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:a10ba2206c5d95f2df3e198ddc002ee354272e8660acb4ea68797083f35dba6d_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:adfa7c9d11670bf55289595d6d21124741586c1116e3f5427a5fd350e140d094_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9@sha256:c045f9b0e496240b907d0ba572fc1bbd0a12e1510115ff1884e3a7226206500c_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-operator-bundle@sha256:4a587f8153ff2a466414fb69e288f754da2b9f43154ba1ede5e9493a6d43c587_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:574a52d17bd38da7882a32dedbb991ce81b5a67b8fdffe68e51ca477f790d0e1_amd64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:b8c5202df848f0b13960183434c382ae188ed2fa728bc5437e47622ec948c443_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:bace0a9040688db829cccfd83579e0a88ab08991b2ff6dc1064af72a14d5b2f7_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9@sha256:d13900e0094bac295a523436594d568101888ab10732c297c4ab01ad92d5a296_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:01162aa8ce5c48b47301fd4c9a6835fda1b36358804c3ad50a5230fd151d2916_ppc64le",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:32009013a53f53faeb9107e06f8c654cdaaaa1233bcecdee290e9592df77b968_s390x",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:84eb26e40548fbeba8e3b0a85dd167d74c2cdc0909523d25e4942fe22e77eebb_arm64",
"Multicluster Global Hub 1.5.4:registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator@sha256:ecb1b97101f371f6159e3ca2eecb8be0fb04019ce379e5cc7936c146150cc36c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nats-server: WebSockets pre-auth memory DoS"
}
]
}
RHSA-2026:8842
Vulnerability from csaf_redhat - Published: 2026-04-20 00:37 - Updated: 2026-04-23 06:09The Go standard library function net/url.Parse insufficiently validated the host/authority component and accepted some invalid URLs by effectively treating garbage before an IP-literal as ignorable. The function should have rejected this as invalid.
A certificate validation flaw has been discovered in the golang crypto/x509 module. When verifying a certificate chain which contains a certificate containing multiple email address constraints which share common local portions but different domain portions, these constraints will not be properly applied, and only the last constraint will be considered.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for delve is now available for Red Hat Enterprise Linux 10.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Delve is a debugger for the Go programming language. The goal of the project is to provide a simple, full featured debugging tool for Go. Delve should be easy to invoke and easy to use. Chances are if you\u0027re using a debugger, things aren\u0027t going your way. With that in mind, Delve should stay out of your way as much as possible.\n\nSecurity Fix(es):\n\n* crypto/x509: Incorrect enforcement of email constraints in crypto/x509 (CVE-2026-27137)\n\n* net/url: Incorrect parsing of IPv6 host literals in net/url (CVE-2026-25679)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:8842",
"url": "https://access.redhat.com/errata/RHSA-2026:8842"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2445345",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2445345"
},
{
"category": "external",
"summary": "2445356",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2445356"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_8842.json"
}
],
"title": "Red Hat Security Advisory: delve security update",
"tracking": {
"current_release_date": "2026-04-23T06:09:17+00:00",
"generator": {
"date": "2026-04-23T06:09:17+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.5"
}
},
"id": "RHSA-2026:8842",
"initial_release_date": "2026-04-20T00:37:18+00:00",
"revision_history": [
{
"date": "2026-04-20T00:37:18+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-04-20T00:37:18+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-23T06:09:17+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 10)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:10.1"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "delve-0:1.25.2-3.el10_1.src",
"product": {
"name": "delve-0:1.25.2-3.el10_1.src",
"product_id": "delve-0:1.25.2-3.el10_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve@1.25.2-3.el10_1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "delve-0:1.25.2-3.el10_1.aarch64",
"product": {
"name": "delve-0:1.25.2-3.el10_1.aarch64",
"product_id": "delve-0:1.25.2-3.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve@1.25.2-3.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "delve-debugsource-0:1.25.2-3.el10_1.aarch64",
"product": {
"name": "delve-debugsource-0:1.25.2-3.el10_1.aarch64",
"product_id": "delve-debugsource-0:1.25.2-3.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve-debugsource@1.25.2-3.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "delve-debuginfo-0:1.25.2-3.el10_1.aarch64",
"product": {
"name": "delve-debuginfo-0:1.25.2-3.el10_1.aarch64",
"product_id": "delve-debuginfo-0:1.25.2-3.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve-debuginfo@1.25.2-3.el10_1?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "delve-0:1.25.2-3.el10_1.ppc64le",
"product": {
"name": "delve-0:1.25.2-3.el10_1.ppc64le",
"product_id": "delve-0:1.25.2-3.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve@1.25.2-3.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "delve-debugsource-0:1.25.2-3.el10_1.ppc64le",
"product": {
"name": "delve-debugsource-0:1.25.2-3.el10_1.ppc64le",
"product_id": "delve-debugsource-0:1.25.2-3.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve-debugsource@1.25.2-3.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "delve-debuginfo-0:1.25.2-3.el10_1.ppc64le",
"product": {
"name": "delve-debuginfo-0:1.25.2-3.el10_1.ppc64le",
"product_id": "delve-debuginfo-0:1.25.2-3.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve-debuginfo@1.25.2-3.el10_1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "delve-0:1.25.2-3.el10_1.x86_64",
"product": {
"name": "delve-0:1.25.2-3.el10_1.x86_64",
"product_id": "delve-0:1.25.2-3.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve@1.25.2-3.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "delve-debugsource-0:1.25.2-3.el10_1.x86_64",
"product": {
"name": "delve-debugsource-0:1.25.2-3.el10_1.x86_64",
"product_id": "delve-debugsource-0:1.25.2-3.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve-debugsource@1.25.2-3.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "delve-debuginfo-0:1.25.2-3.el10_1.x86_64",
"product": {
"name": "delve-debuginfo-0:1.25.2-3.el10_1.x86_64",
"product_id": "delve-debuginfo-0:1.25.2-3.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve-debuginfo@1.25.2-3.el10_1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-0:1.25.2-3.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:delve-0:1.25.2-3.el10_1.aarch64"
},
"product_reference": "delve-0:1.25.2-3.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-0:1.25.2-3.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:delve-0:1.25.2-3.el10_1.ppc64le"
},
"product_reference": "delve-0:1.25.2-3.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-0:1.25.2-3.el10_1.src as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:delve-0:1.25.2-3.el10_1.src"
},
"product_reference": "delve-0:1.25.2-3.el10_1.src",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-0:1.25.2-3.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:delve-0:1.25.2-3.el10_1.x86_64"
},
"product_reference": "delve-0:1.25.2-3.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-debuginfo-0:1.25.2-3.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:delve-debuginfo-0:1.25.2-3.el10_1.aarch64"
},
"product_reference": "delve-debuginfo-0:1.25.2-3.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-debuginfo-0:1.25.2-3.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:delve-debuginfo-0:1.25.2-3.el10_1.ppc64le"
},
"product_reference": "delve-debuginfo-0:1.25.2-3.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-debuginfo-0:1.25.2-3.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:delve-debuginfo-0:1.25.2-3.el10_1.x86_64"
},
"product_reference": "delve-debuginfo-0:1.25.2-3.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-debugsource-0:1.25.2-3.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:delve-debugsource-0:1.25.2-3.el10_1.aarch64"
},
"product_reference": "delve-debugsource-0:1.25.2-3.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-debugsource-0:1.25.2-3.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:delve-debugsource-0:1.25.2-3.el10_1.ppc64le"
},
"product_reference": "delve-debugsource-0:1.25.2-3.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-debugsource-0:1.25.2-3.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:delve-debugsource-0:1.25.2-3.el10_1.x86_64"
},
"product_reference": "delve-debugsource-0:1.25.2-3.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-25679",
"cwe": {
"id": "CWE-1286",
"name": "Improper Validation of Syntactic Correctness of Input"
},
"discovery_date": "2026-03-06T22:02:11.567841+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2445356"
}
],
"notes": [
{
"category": "description",
"text": "The Go standard library function net/url.Parse insufficiently validated the host/authority component and accepted some invalid URLs by effectively treating garbage before an IP-literal as ignorable. The function should have rejected this as invalid.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "net/url: Incorrect parsing of IPv6 host literals in net/url",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:delve-0:1.25.2-3.el10_1.aarch64",
"AppStream-10.1.Z:delve-0:1.25.2-3.el10_1.ppc64le",
"AppStream-10.1.Z:delve-0:1.25.2-3.el10_1.src",
"AppStream-10.1.Z:delve-0:1.25.2-3.el10_1.x86_64",
"AppStream-10.1.Z:delve-debuginfo-0:1.25.2-3.el10_1.aarch64",
"AppStream-10.1.Z:delve-debuginfo-0:1.25.2-3.el10_1.ppc64le",
"AppStream-10.1.Z:delve-debuginfo-0:1.25.2-3.el10_1.x86_64",
"AppStream-10.1.Z:delve-debugsource-0:1.25.2-3.el10_1.aarch64",
"AppStream-10.1.Z:delve-debugsource-0:1.25.2-3.el10_1.ppc64le",
"AppStream-10.1.Z:delve-debugsource-0:1.25.2-3.el10_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-25679"
},
{
"category": "external",
"summary": "RHBZ#2445356",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2445356"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-25679",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25679"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-25679",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25679"
},
{
"category": "external",
"summary": "https://go.dev/cl/752180",
"url": "https://go.dev/cl/752180"
},
{
"category": "external",
"summary": "https://go.dev/issue/77578",
"url": "https://go.dev/issue/77578"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk",
"url": "https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4601",
"url": "https://pkg.go.dev/vuln/GO-2026-4601"
}
],
"release_date": "2026-03-06T21:28:14.211000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-20T00:37:18+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:delve-0:1.25.2-3.el10_1.aarch64",
"AppStream-10.1.Z:delve-0:1.25.2-3.el10_1.ppc64le",
"AppStream-10.1.Z:delve-0:1.25.2-3.el10_1.src",
"AppStream-10.1.Z:delve-0:1.25.2-3.el10_1.x86_64",
"AppStream-10.1.Z:delve-debuginfo-0:1.25.2-3.el10_1.aarch64",
"AppStream-10.1.Z:delve-debuginfo-0:1.25.2-3.el10_1.ppc64le",
"AppStream-10.1.Z:delve-debuginfo-0:1.25.2-3.el10_1.x86_64",
"AppStream-10.1.Z:delve-debugsource-0:1.25.2-3.el10_1.aarch64",
"AppStream-10.1.Z:delve-debugsource-0:1.25.2-3.el10_1.ppc64le",
"AppStream-10.1.Z:delve-debugsource-0:1.25.2-3.el10_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8842"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-10.1.Z:delve-0:1.25.2-3.el10_1.aarch64",
"AppStream-10.1.Z:delve-0:1.25.2-3.el10_1.ppc64le",
"AppStream-10.1.Z:delve-0:1.25.2-3.el10_1.src",
"AppStream-10.1.Z:delve-0:1.25.2-3.el10_1.x86_64",
"AppStream-10.1.Z:delve-debuginfo-0:1.25.2-3.el10_1.aarch64",
"AppStream-10.1.Z:delve-debuginfo-0:1.25.2-3.el10_1.ppc64le",
"AppStream-10.1.Z:delve-debuginfo-0:1.25.2-3.el10_1.x86_64",
"AppStream-10.1.Z:delve-debugsource-0:1.25.2-3.el10_1.aarch64",
"AppStream-10.1.Z:delve-debugsource-0:1.25.2-3.el10_1.ppc64le",
"AppStream-10.1.Z:delve-debugsource-0:1.25.2-3.el10_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:delve-0:1.25.2-3.el10_1.aarch64",
"AppStream-10.1.Z:delve-0:1.25.2-3.el10_1.ppc64le",
"AppStream-10.1.Z:delve-0:1.25.2-3.el10_1.src",
"AppStream-10.1.Z:delve-0:1.25.2-3.el10_1.x86_64",
"AppStream-10.1.Z:delve-debuginfo-0:1.25.2-3.el10_1.aarch64",
"AppStream-10.1.Z:delve-debuginfo-0:1.25.2-3.el10_1.ppc64le",
"AppStream-10.1.Z:delve-debuginfo-0:1.25.2-3.el10_1.x86_64",
"AppStream-10.1.Z:delve-debugsource-0:1.25.2-3.el10_1.aarch64",
"AppStream-10.1.Z:delve-debugsource-0:1.25.2-3.el10_1.ppc64le",
"AppStream-10.1.Z:delve-debugsource-0:1.25.2-3.el10_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "net/url: Incorrect parsing of IPv6 host literals in net/url"
},
{
"cve": "CVE-2026-27137",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"discovery_date": "2026-03-06T22:01:38.859733+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2445345"
}
],
"notes": [
{
"category": "description",
"text": "A certificate validation flaw has been discovered in the golang crypto/x509 module. When verifying a certificate chain which contains a certificate containing multiple email address constraints which share common local portions but different domain portions, these constraints will not be properly applied, and only the last constraint will be considered.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: Incorrect enforcement of email constraints in crypto/x509",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:delve-0:1.25.2-3.el10_1.aarch64",
"AppStream-10.1.Z:delve-0:1.25.2-3.el10_1.ppc64le",
"AppStream-10.1.Z:delve-0:1.25.2-3.el10_1.src",
"AppStream-10.1.Z:delve-0:1.25.2-3.el10_1.x86_64",
"AppStream-10.1.Z:delve-debuginfo-0:1.25.2-3.el10_1.aarch64",
"AppStream-10.1.Z:delve-debuginfo-0:1.25.2-3.el10_1.ppc64le",
"AppStream-10.1.Z:delve-debuginfo-0:1.25.2-3.el10_1.x86_64",
"AppStream-10.1.Z:delve-debugsource-0:1.25.2-3.el10_1.aarch64",
"AppStream-10.1.Z:delve-debugsource-0:1.25.2-3.el10_1.ppc64le",
"AppStream-10.1.Z:delve-debugsource-0:1.25.2-3.el10_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-27137"
},
{
"category": "external",
"summary": "RHBZ#2445345",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2445345"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-27137",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27137"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-27137",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27137"
},
{
"category": "external",
"summary": "https://go.dev/cl/752182",
"url": "https://go.dev/cl/752182"
},
{
"category": "external",
"summary": "https://go.dev/issue/77952",
"url": "https://go.dev/issue/77952"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk",
"url": "https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4599",
"url": "https://pkg.go.dev/vuln/GO-2026-4599"
}
],
"release_date": "2026-03-06T21:28:13.748000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-20T00:37:18+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:delve-0:1.25.2-3.el10_1.aarch64",
"AppStream-10.1.Z:delve-0:1.25.2-3.el10_1.ppc64le",
"AppStream-10.1.Z:delve-0:1.25.2-3.el10_1.src",
"AppStream-10.1.Z:delve-0:1.25.2-3.el10_1.x86_64",
"AppStream-10.1.Z:delve-debuginfo-0:1.25.2-3.el10_1.aarch64",
"AppStream-10.1.Z:delve-debuginfo-0:1.25.2-3.el10_1.ppc64le",
"AppStream-10.1.Z:delve-debuginfo-0:1.25.2-3.el10_1.x86_64",
"AppStream-10.1.Z:delve-debugsource-0:1.25.2-3.el10_1.aarch64",
"AppStream-10.1.Z:delve-debugsource-0:1.25.2-3.el10_1.ppc64le",
"AppStream-10.1.Z:delve-debugsource-0:1.25.2-3.el10_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8842"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-10.1.Z:delve-0:1.25.2-3.el10_1.aarch64",
"AppStream-10.1.Z:delve-0:1.25.2-3.el10_1.ppc64le",
"AppStream-10.1.Z:delve-0:1.25.2-3.el10_1.src",
"AppStream-10.1.Z:delve-0:1.25.2-3.el10_1.x86_64",
"AppStream-10.1.Z:delve-debuginfo-0:1.25.2-3.el10_1.aarch64",
"AppStream-10.1.Z:delve-debuginfo-0:1.25.2-3.el10_1.ppc64le",
"AppStream-10.1.Z:delve-debuginfo-0:1.25.2-3.el10_1.x86_64",
"AppStream-10.1.Z:delve-debugsource-0:1.25.2-3.el10_1.aarch64",
"AppStream-10.1.Z:delve-debugsource-0:1.25.2-3.el10_1.ppc64le",
"AppStream-10.1.Z:delve-debugsource-0:1.25.2-3.el10_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:delve-0:1.25.2-3.el10_1.aarch64",
"AppStream-10.1.Z:delve-0:1.25.2-3.el10_1.ppc64le",
"AppStream-10.1.Z:delve-0:1.25.2-3.el10_1.src",
"AppStream-10.1.Z:delve-0:1.25.2-3.el10_1.x86_64",
"AppStream-10.1.Z:delve-debuginfo-0:1.25.2-3.el10_1.aarch64",
"AppStream-10.1.Z:delve-debuginfo-0:1.25.2-3.el10_1.ppc64le",
"AppStream-10.1.Z:delve-debuginfo-0:1.25.2-3.el10_1.x86_64",
"AppStream-10.1.Z:delve-debugsource-0:1.25.2-3.el10_1.aarch64",
"AppStream-10.1.Z:delve-debugsource-0:1.25.2-3.el10_1.ppc64le",
"AppStream-10.1.Z:delve-debugsource-0:1.25.2-3.el10_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: Incorrect enforcement of email constraints in crypto/x509"
}
]
}
cleanstart-2026-bc17682
Vulnerability from cleanstart
Multiple security vulnerabilities affect the newrelic-prometheus-configurator package. These issues are resolved in later releases. See references for individual vulnerability details.
| URL | Type | ||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "newrelic-prometheus-configurator"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.4.4-r1"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the newrelic-prometheus-configurator package. These issues are resolved in later releases. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-BC17682",
"modified": "2026-03-23T06:28:34Z",
"published": "2026-04-01T09:33:57.594313Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-BC17682.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-68121"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27137"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27138"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27137"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27138"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27142"
}
],
"related": [],
"schema_version": "1.7.3",
"summary": "Security fixes for CVE-2025-68121, CVE-2026-25679, CVE-2026-27137, CVE-2026-27138, CVE-2026-27139, CVE-2026-27142 applied in versions: 2.4.4-r0, 2.4.4-r1",
"upstream": [
"CVE-2025-68121",
"CVE-2026-25679",
"CVE-2026-27137",
"CVE-2026-27138",
"CVE-2026-27139",
"CVE-2026-27142"
]
}
cleanstart-2026-kr58137
Vulnerability from cleanstart
Multiple security vulnerabilities affect the node-problem-detector package. These issues are resolved in later releases. See references for individual vulnerability details.
| URL | Type | |||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "node-problem-detector"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.8.19-r2"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the node-problem-detector package. These issues are resolved in later releases. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-KR58137",
"modified": "2026-03-17T13:57:04Z",
"published": "2026-04-01T09:46:06.671153Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-KR58137.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-68121"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27137"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27138"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-6v2p-p543-phr9"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27137"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27138"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27142"
}
],
"related": [],
"schema_version": "1.7.3",
"summary": "Security fixes for CVE-2025-68121, CVE-2026-25679, CVE-2026-27137, CVE-2026-27138, CVE-2026-27139, CVE-2026-27142, ghsa-6v2p-p543-phr9 applied in versions: 0.8.19-r0, 0.8.19-r1, 0.8.19-r2",
"upstream": [
"CVE-2025-68121",
"CVE-2026-25679",
"CVE-2026-27137",
"CVE-2026-27138",
"CVE-2026-27139",
"CVE-2026-27142",
"ghsa-6v2p-p543-phr9"
]
}
cleanstart-2026-ps51260
Vulnerability from cleanstart
Multiple security vulnerabilities affect the kubernetes-dashboard-metrics-scraper package. These issues are resolved in later releases. See references for individual vulnerability details.
| URL | Type | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "kubernetes-dashboard-metrics-scraper"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.2.2-r1"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the kubernetes-dashboard-metrics-scraper package. These issues are resolved in later releases. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-PS51260",
"modified": "2026-03-23T07:02:53Z",
"published": "2026-04-01T09:33:07.208099Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-PS51260.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61726"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61728"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61730"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-68121"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27137"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27138"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61730"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27137"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27138"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27142"
}
],
"related": [],
"schema_version": "1.7.3",
"summary": "Security fixes for CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-68121, CVE-2026-25679, CVE-2026-27137, CVE-2026-27138, CVE-2026-27139, CVE-2026-27142 applied in versions: 1.2.2-r0, 1.2.2-r1",
"upstream": [
"CVE-2025-61726",
"CVE-2025-61728",
"CVE-2025-61730",
"CVE-2025-68121",
"CVE-2026-25679",
"CVE-2026-27137",
"CVE-2026-27138",
"CVE-2026-27139",
"CVE-2026-27142"
]
}
cleanstart-2026-bh97849
Vulnerability from cleanstart
Multiple security vulnerabilities affect the argo-cd package. gRPC-Go is the Go language implementation of gRPC. See references for individual vulnerability details.
| URL | Type | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "argo-cd"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "3.2.7-r2"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the argo-cd package. gRPC-Go is the Go language implementation of gRPC. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-BH97849",
"modified": "2026-04-15T10:00:00Z",
"published": "2026-04-16T00:46:20.819037Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-BH97849.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-55190"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-55191"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-58183"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-58185"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-58187"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-58188"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-58189"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-59537"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-59538"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61723"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61724"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61725"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27137"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27138"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33186"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-2v5j-vhc3-9cwm"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-2vgg-9h3w-qbr4"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-2xsj-vh29-9cwm"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-37cx-329c-33x3"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-3wgm-2mw2-vh5m"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-4x4m-3c2p-qppc"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-6v2p-p543-phr9"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-92cp-5422-2m47"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-93mq-9ffx-83m2"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-f6x5-jh6r-wrfv"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-hj2p-8wj8-pfq4"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-j5w8-q4qc-rx2x"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-mh63-6h87-95cp"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-mw99-9chc-xw7r"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-55190"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-55191"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58183"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58185"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58187"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58188"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58189"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-59537"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-59538"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61723"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61724"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61725"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27137"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27138"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186"
}
],
"related": [],
"schema_version": "1.7.3",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
],
"summary": "gRPC-Go is the Go language implementation of gRPC",
"upstream": [
"CVE-2025-55190",
"CVE-2025-55191",
"CVE-2025-58183",
"CVE-2025-58185",
"CVE-2025-58187",
"CVE-2025-58188",
"CVE-2025-58189",
"CVE-2025-59537",
"CVE-2025-59538",
"CVE-2025-61723",
"CVE-2025-61724",
"CVE-2025-61725",
"CVE-2026-24051",
"CVE-2026-25679",
"CVE-2026-27137",
"CVE-2026-27138",
"CVE-2026-27139",
"CVE-2026-27142",
"CVE-2026-33186",
"ghsa-2v5j-vhc3-9cwm",
"ghsa-2vgg-9h3w-qbr4",
"ghsa-2xsj-vh29-9cwm",
"ghsa-37cx-329c-33x3",
"ghsa-3wgm-2mw2-vh5m",
"ghsa-4x4m-3c2p-qppc",
"ghsa-6v2p-p543-phr9",
"ghsa-92cp-5422-2m47",
"ghsa-93mq-9ffx-83m2",
"ghsa-f6x5-jh6r-wrfv",
"ghsa-hj2p-8wj8-pfq4",
"ghsa-j5w8-q4qc-rx2x",
"ghsa-mh63-6h87-95cp",
"ghsa-mw99-9chc-xw7r"
]
}
cleanstart-2026-gq03231
Vulnerability from cleanstart
Multiple security vulnerabilities affect the argo-cd package. These issues are resolved in later releases. See references for individual vulnerability details.
| URL | Type | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "argo-cd"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "3.2.7-r1"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the argo-cd package. These issues are resolved in later releases. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-GQ03231",
"modified": "2026-03-13T12:42:57Z",
"published": "2026-04-01T09:56:49.752050Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-GQ03231.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-55190"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-55191"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-58183"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-58185"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-58187"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-58188"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-58189"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-59537"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-59538"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61723"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61724"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61725"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27137"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27138"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-2v5j-vhc3-9cwm"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-2vgg-9h3w-qbr4"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-2xsj-vh29-9cwm"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-37cx-329c-33x3"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-3wgm-2mw2-vh5m"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-4x4m-3c2p-qppc"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-6v2p-p543-phr9"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-92cp-5422-2m47"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-93mq-9ffx-83m2"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-f6x5-jh6r-wrfv"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-hj2p-8wj8-pfq4"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-j5w8-q4qc-rx2x"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-mh63-6h87-95cp"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-mw99-9chc-xw7r"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-55190"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-55191"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58183"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58185"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58187"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58188"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58189"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-59537"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-59538"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61723"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61724"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61725"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27137"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27138"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27142"
}
],
"related": [],
"schema_version": "1.7.3",
"summary": "Security fixes for CVE-2025-55190, CVE-2025-55191, CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-59537, CVE-2025-59538, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2026-24051, CVE-2026-25679, CVE-2026-27137, CVE-2026-27138, CVE-2026-27139, CVE-2026-27142, ghsa-2v5j-vhc3-9cwm, ghsa-2vgg-9h3w-qbr4, ghsa-2xsj-vh29-9cwm, ghsa-37cx-329c-33x3, ghsa-3wgm-2mw2-vh5m, ghsa-4x4m-3c2p-qppc, ghsa-6v2p-p543-phr9, ghsa-92cp-5422-2m47, ghsa-93mq-9ffx-83m2, ghsa-f6x5-jh6r-wrfv, ghsa-hj2p-8wj8-pfq4, ghsa-j5w8-q4qc-rx2x, ghsa-mh63-6h87-95cp, ghsa-mw99-9chc-xw7r applied in versions: 2.13.9-r0, 2.14.20-r0, 3.0.16-r0, 3.0.19-r0, 3.1.4-r0, 3.1.8.-r0, 3.1.9-r4, 3.2.7-r0, 3.2.7-r1",
"upstream": [
"CVE-2025-55190",
"CVE-2025-55191",
"CVE-2025-58183",
"CVE-2025-58185",
"CVE-2025-58187",
"CVE-2025-58188",
"CVE-2025-58189",
"CVE-2025-59537",
"CVE-2025-59538",
"CVE-2025-61723",
"CVE-2025-61724",
"CVE-2025-61725",
"CVE-2026-24051",
"CVE-2026-25679",
"CVE-2026-27137",
"CVE-2026-27138",
"CVE-2026-27139",
"CVE-2026-27142",
"ghsa-2v5j-vhc3-9cwm",
"ghsa-2vgg-9h3w-qbr4",
"ghsa-2xsj-vh29-9cwm",
"ghsa-37cx-329c-33x3",
"ghsa-3wgm-2mw2-vh5m",
"ghsa-4x4m-3c2p-qppc",
"ghsa-6v2p-p543-phr9",
"ghsa-92cp-5422-2m47",
"ghsa-93mq-9ffx-83m2",
"ghsa-f6x5-jh6r-wrfv",
"ghsa-hj2p-8wj8-pfq4",
"ghsa-j5w8-q4qc-rx2x",
"ghsa-mh63-6h87-95cp",
"ghsa-mw99-9chc-xw7r"
]
}
cleanstart-2026-gi67088
Vulnerability from cleanstart
Multiple security vulnerabilities affect the newrelic-nri-statsd package. These issues are resolved in later releases. See references for individual vulnerability details.
| URL | Type | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "newrelic-nri-statsd"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.12.0-r1"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the newrelic-nri-statsd package. These issues are resolved in later releases. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-GI67088",
"modified": "2026-03-23T07:05:35Z",
"published": "2026-04-01T09:33:02.208236Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-GI67088.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2020-8559"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2020-8565"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61726"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61728"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61730"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61732"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-68119"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-68121"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27137"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27138"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-33c5-9fx5-fvjm"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-8cfg-vx93-jvxw"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8559"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8565"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61730"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61732"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68119"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27137"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27138"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27142"
}
],
"related": [],
"schema_version": "1.7.3",
"summary": "Security fixes for CVE-2020-8559, CVE-2020-8565, CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-61732, CVE-2025-68119, CVE-2025-68121, CVE-2026-25679, CVE-2026-27137, CVE-2026-27138, CVE-2026-27139, CVE-2026-27142, ghsa-33c5-9fx5-fvjm, ghsa-8cfg-vx93-jvxw applied in versions: 2.12.0-r0, 2.12.0-r1",
"upstream": [
"CVE-2020-8559",
"CVE-2020-8565",
"CVE-2025-61726",
"CVE-2025-61728",
"CVE-2025-61730",
"CVE-2025-61732",
"CVE-2025-68119",
"CVE-2025-68121",
"CVE-2026-25679",
"CVE-2026-27137",
"CVE-2026-27138",
"CVE-2026-27139",
"CVE-2026-27142",
"ghsa-33c5-9fx5-fvjm",
"ghsa-8cfg-vx93-jvxw"
]
}
cleanstart-2026-jm96857
Vulnerability from cleanstart
Multiple security vulnerabilities affect the newrelic-nri-kube-events package. These issues are resolved in later releases. See references for individual vulnerability details.
| URL | Type | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "newrelic-nri-kube-events"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.16.4-r1"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the newrelic-nri-kube-events package. These issues are resolved in later releases. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-JM96857",
"modified": "2026-03-23T07:04:06Z",
"published": "2026-04-01T09:32:39.352692Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-JM96857.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61726"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61728"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61730"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-68121"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27137"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27138"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61730"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27137"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27138"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27142"
}
],
"related": [],
"schema_version": "1.7.3",
"summary": "Security fixes for CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-68121, CVE-2026-25679, CVE-2026-27137, CVE-2026-27138, CVE-2026-27139, CVE-2026-27142 applied in versions: 2.16.4-r0, 2.16.4-r1",
"upstream": [
"CVE-2025-61726",
"CVE-2025-61728",
"CVE-2025-61730",
"CVE-2025-68121",
"CVE-2026-25679",
"CVE-2026-27137",
"CVE-2026-27138",
"CVE-2026-27139",
"CVE-2026-27142"
]
}
cleanstart-2026-gm63718
Vulnerability from cleanstart
Multiple security vulnerabilities affect the syft package. These issues are resolved in later releases. See references for individual vulnerability details.
| URL | Type | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "syft"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.39.0-r3"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the syft package. These issues are resolved in later releases. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-GM63718",
"modified": "2026-03-25T14:21:09Z",
"published": "2026-04-01T09:19:09.281060Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-GM63718.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-15558"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61726"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61728"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61730"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-68121"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-25934"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27137"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27138"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33186"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-q9hv-hpm4-hj6x"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-15558"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61730"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25934"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27137"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27138"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186"
}
],
"related": [],
"schema_version": "1.7.3",
"summary": "Security fixes for CVE-2025-15558, CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-68121, CVE-2026-25679, CVE-2026-25934, CVE-2026-27137, CVE-2026-27138, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-q9hv-hpm4-hj6x applied in versions: 1.39.0-r0, 1.39.0-r1, 1.39.0-r2, 1.39.0-r3",
"upstream": [
"CVE-2025-15558",
"CVE-2025-61726",
"CVE-2025-61728",
"CVE-2025-61730",
"CVE-2025-68121",
"CVE-2026-25679",
"CVE-2026-25934",
"CVE-2026-27137",
"CVE-2026-27138",
"CVE-2026-27139",
"CVE-2026-27142",
"CVE-2026-33186",
"ghsa-q9hv-hpm4-hj6x"
]
}
cleanstart-2026-on62368
Vulnerability from cleanstart
Multiple security vulnerabilities affect the wave package. These issues are resolved in later releases. See references for individual vulnerability details.
| URL | Type | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "wave"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.13.1-r0"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the wave package. These issues are resolved in later releases. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-ON62368",
"modified": "2026-03-23T07:09:26Z",
"published": "2026-04-01T09:32:49.419019Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-ON62368.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-58183"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-58185"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-58187"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-58188"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-58189"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61723"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61724"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61725"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61729"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27137"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27138"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58183"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58185"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58187"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58188"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58189"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61723"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61724"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61725"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27137"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27138"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27142"
}
],
"related": [],
"schema_version": "1.7.3",
"summary": "Security fixes for CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61729, CVE-2026-25679, CVE-2026-27137, CVE-2026-27138, CVE-2026-27139, CVE-2026-27142 applied in versions: 0.10.0-r0, 0.10.0-r1, 0.11.0-r0, 1.13.1-r0",
"upstream": [
"CVE-2025-58183",
"CVE-2025-58185",
"CVE-2025-58187",
"CVE-2025-58188",
"CVE-2025-58189",
"CVE-2025-61723",
"CVE-2025-61724",
"CVE-2025-61725",
"CVE-2025-61729",
"CVE-2026-25679",
"CVE-2026-27137",
"CVE-2026-27138",
"CVE-2026-27139",
"CVE-2026-27142"
]
}
cleanstart-2026-ha09227
Vulnerability from cleanstart
Multiple security vulnerabilities affect the external-dns package. These issues are resolved in later releases. See references for individual vulnerability details.
| URL | Type | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "external-dns"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.18.0-r1"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the external-dns package. These issues are resolved in later releases. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-HA09227",
"modified": "2026-03-25T14:21:54Z",
"published": "2026-04-01T09:19:28.951475Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-HA09227.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-47911"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-47913"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-47914"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-58181"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-58190"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61726"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61727"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61728"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61729"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61730"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61732"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-68121"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27137"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27138"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27141"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33186"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-f6x5-jh6r-wrfv"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-j5w8-q4qc-rx2x"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47911"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47913"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47914"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58181"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58190"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61727"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61730"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61732"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27137"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27138"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27141"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186"
}
],
"related": [],
"schema_version": "1.7.3",
"summary": "Security fixes for CVE-2025-47911, CVE-2025-47913, CVE-2025-47914, CVE-2025-58181, CVE-2025-58190, CVE-2025-61726, CVE-2025-61727, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2025-61732, CVE-2025-68121, CVE-2026-25679, CVE-2026-27137, CVE-2026-27138, CVE-2026-27139, CVE-2026-27141, CVE-2026-27142, CVE-2026-33186, ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x applied in versions: 0.18.0-r0, 0.18.0-r1",
"upstream": [
"CVE-2025-47911",
"CVE-2025-47913",
"CVE-2025-47914",
"CVE-2025-58181",
"CVE-2025-58190",
"CVE-2025-61726",
"CVE-2025-61727",
"CVE-2025-61728",
"CVE-2025-61729",
"CVE-2025-61730",
"CVE-2025-61732",
"CVE-2025-68121",
"CVE-2026-25679",
"CVE-2026-27137",
"CVE-2026-27138",
"CVE-2026-27139",
"CVE-2026-27141",
"CVE-2026-27142",
"CVE-2026-33186",
"ghsa-f6x5-jh6r-wrfv",
"ghsa-j5w8-q4qc-rx2x"
]
}
SUSE-SU-2026:0876-1
Vulnerability from csaf_suse - Published: 2026-03-11 18:35 - Updated: 2026-03-11 18:35| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for go1.26",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for go1.26 fixes the following issues:\n\nUpdate to go1.26.1 (bsc#1255111):\n\n- CVE-2026-25679: net/url: reject IPv6 literal not at start of host (bsc#1259264).\n- CVE-2026-27137: crypto/x509: incorrect enforcement of email constraints (bsc#1259266).\n- CVE-2026-27138: crypto/x509: panic in name constraint checking for malformed certificates (bsc#1259267).\n- CVE-2026-27139: os: FileInfo can escape from a Root (bsc#1259268).\n- CVE-2026-27142: html/template: URLs in meta content attribute actions are not escaped (bsc#1259265).\n\nChangelog:\n\n* go#77252 cmd/compile: miscompile of global array initialization\n* go#77407 os: Go 1.25.x regression on RemoveAll for windows\n* go#77474 cmd/go: CGO compilation fails after upgrading from Go 1.25.5 to 1.25.6 due to --define-variable flag in \n pkg-config\n* go#77529 cmd/fix, x/tools/go/analysis/passes/modernize: stringscut: OOB panic in indexArgValid analyzing\n \u0027buf.Bytes()\u0027 call\n* go#77532 net/smtp: expiry date of localhostCert for testing is too short\n* go#77536 cmd/compile: internal compiler error: \u0027main.func1\u0027: not lowered: v15, Load STRUCT PTR SSA\n* go#77618 strings: HasSuffix doesn\u0027t work correctly for multibyte runes in go 1.26\n* go#77623 cmd/compile: internal compiler error on : \u0027tried to free an already free register\u0027 with generic function\n and type \u003e= 192 bytes\n* go#77624 cmd/fix, x/tools/go/analysis/passes/modernize: stringsbuilder breaks code when combining two \n strings.Builders\n* go#77680 cmd/link: TestFlagW/-w_-linkmode=external fails on illumos\n* go#77766 cmd/fix,x/tools/go/analysis/passes/modernize: rangeint uses target platform\u0027s type in the range expression,\n breaking other platforms\n* go#77780 reflect: breaking change for reflect.Value.Interface behaviour\n* go#77786 cmd/compile: rewriteFixedLoad does not properly sign extend AuxInt\n* go#77803 cmd/fix,x/tools/go/analysis/passes/modernize: reflect.TypeOf(nil) transformed into \n reflect.TypeFor[untyped nil]()\n* go#77804 cmd/fix,x/tools/go/analysis/passes/modernize: minmax breaks select statements\n* go#77805 cmd/fix, x/tools/go/analysis/passes/modernize: waitgroup leads to a compilation error\n* go#77807 cmd/fix,x/tools/go/analysis/passes/modernize: stringsbuilder ignores variables if they are used multiple\n times\n* go#77849 cmd/fix,x/tools/go/analysis/passes/modernize: stringscut rewrite changes behavior\n* go#77860 cmd/go: change go mod init default go directive back to 1.N\n* go#77899 cmd/fix, x/tools/go/analysis/passes/modernize: bad rangeint rewriting\n* go#77904 x/tools/go/analysis/passes/modernize: stringsbuilder breaks code when GenDecl is a block declaration\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2026-876,SUSE-SLE-Module-Development-Tools-15-SP7-2026-876,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-876,SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-876,SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-876,SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-876,SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-876,SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-876,SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-876,SUSE-SLE-Product-SLES_SAP-15-SP4-2026-876,SUSE-SLE-Product-SLES_SAP-15-SP5-2026-876,SUSE-SLE-Product-SLES_SAP-15-SP6-2026-876,openSUSE-SLE-15.6-2026-876",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_0876-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:0876-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260876-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:0876-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024673.html"
},
{
"category": "self",
"summary": "SUSE Bug 1255111",
"url": "https://bugzilla.suse.com/1255111"
},
{
"category": "self",
"summary": "SUSE Bug 1259264",
"url": "https://bugzilla.suse.com/1259264"
},
{
"category": "self",
"summary": "SUSE Bug 1259265",
"url": "https://bugzilla.suse.com/1259265"
},
{
"category": "self",
"summary": "SUSE Bug 1259266",
"url": "https://bugzilla.suse.com/1259266"
},
{
"category": "self",
"summary": "SUSE Bug 1259267",
"url": "https://bugzilla.suse.com/1259267"
},
{
"category": "self",
"summary": "SUSE Bug 1259268",
"url": "https://bugzilla.suse.com/1259268"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-25679 page",
"url": "https://www.suse.com/security/cve/CVE-2026-25679/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-27137 page",
"url": "https://www.suse.com/security/cve/CVE-2026-27137/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-27138 page",
"url": "https://www.suse.com/security/cve/CVE-2026-27138/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-27139 page",
"url": "https://www.suse.com/security/cve/CVE-2026-27139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-27142 page",
"url": "https://www.suse.com/security/cve/CVE-2026-27142/"
}
],
"title": "Security update for go1.26",
"tracking": {
"current_release_date": "2026-03-11T18:35:26Z",
"generator": {
"date": "2026-03-11T18:35:26Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:0876-1",
"initial_release_date": "2026-03-11T18:35:26Z",
"revision_history": [
{
"date": "2026-03-11T18:35:26Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "go1.26-1.26.1-150000.1.6.1.aarch64",
"product": {
"name": "go1.26-1.26.1-150000.1.6.1.aarch64",
"product_id": "go1.26-1.26.1-150000.1.6.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"product": {
"name": "go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"product_id": "go1.26-doc-1.26.1-150000.1.6.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.26-race-1.26.1-150000.1.6.1.aarch64",
"product": {
"name": "go1.26-race-1.26.1-150000.1.6.1.aarch64",
"product_id": "go1.26-race-1.26.1-150000.1.6.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.26-1.26.1-150000.1.6.1.i586",
"product": {
"name": "go1.26-1.26.1-150000.1.6.1.i586",
"product_id": "go1.26-1.26.1-150000.1.6.1.i586"
}
},
{
"category": "product_version",
"name": "go1.26-doc-1.26.1-150000.1.6.1.i586",
"product": {
"name": "go1.26-doc-1.26.1-150000.1.6.1.i586",
"product_id": "go1.26-doc-1.26.1-150000.1.6.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.26-1.26.1-150000.1.6.1.ppc64le",
"product": {
"name": "go1.26-1.26.1-150000.1.6.1.ppc64le",
"product_id": "go1.26-1.26.1-150000.1.6.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"product": {
"name": "go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"product_id": "go1.26-doc-1.26.1-150000.1.6.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"product": {
"name": "go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"product_id": "go1.26-race-1.26.1-150000.1.6.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.26-1.26.1-150000.1.6.1.s390x",
"product": {
"name": "go1.26-1.26.1-150000.1.6.1.s390x",
"product_id": "go1.26-1.26.1-150000.1.6.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.26-doc-1.26.1-150000.1.6.1.s390x",
"product": {
"name": "go1.26-doc-1.26.1-150000.1.6.1.s390x",
"product_id": "go1.26-doc-1.26.1-150000.1.6.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.26-race-1.26.1-150000.1.6.1.s390x",
"product": {
"name": "go1.26-race-1.26.1-150000.1.6.1.s390x",
"product_id": "go1.26-race-1.26.1-150000.1.6.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.26-1.26.1-150000.1.6.1.x86_64",
"product": {
"name": "go1.26-1.26.1-150000.1.6.1.x86_64",
"product_id": "go1.26-1.26.1-150000.1.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"product": {
"name": "go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"product_id": "go1.26-doc-1.26.1-150000.1.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.26-race-1.26.1-150000.1.6.1.x86_64",
"product": {
"name": "go1.26-race-1.26.1-150000.1.6.1.x86_64",
"product_id": "go1.26-race-1.26.1-150000.1.6.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-development-tools:15:sp7"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP6-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp6"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp6"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.6",
"product": {
"name": "openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.6"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.1-150000.1.6.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.1-150000.1.6.1.aarch64"
},
"product_reference": "go1.26-1.26.1-150000.1.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.1-150000.1.6.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.1-150000.1.6.1.ppc64le"
},
"product_reference": "go1.26-1.26.1-150000.1.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.1-150000.1.6.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.1-150000.1.6.1.s390x"
},
"product_reference": "go1.26-1.26.1-150000.1.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.1-150000.1.6.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.1-150000.1.6.1.x86_64"
},
"product_reference": "go1.26-1.26.1-150000.1.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.1-150000.1.6.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.1-150000.1.6.1.aarch64"
},
"product_reference": "go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.1-150000.1.6.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.1-150000.1.6.1.ppc64le"
},
"product_reference": "go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.1-150000.1.6.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.1-150000.1.6.1.s390x"
},
"product_reference": "go1.26-doc-1.26.1-150000.1.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.1-150000.1.6.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.1-150000.1.6.1.x86_64"
},
"product_reference": "go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.1-150000.1.6.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.1-150000.1.6.1.aarch64"
},
"product_reference": "go1.26-race-1.26.1-150000.1.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.1-150000.1.6.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.1-150000.1.6.1.ppc64le"
},
"product_reference": "go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.1-150000.1.6.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.1-150000.1.6.1.s390x"
},
"product_reference": "go1.26-race-1.26.1-150000.1.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.1-150000.1.6.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.1-150000.1.6.1.x86_64"
},
"product_reference": "go1.26-race-1.26.1-150000.1.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.1-150000.1.6.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.1-150000.1.6.1.aarch64"
},
"product_reference": "go1.26-1.26.1-150000.1.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.1-150000.1.6.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.1-150000.1.6.1.x86_64"
},
"product_reference": "go1.26-1.26.1-150000.1.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.1-150000.1.6.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.1-150000.1.6.1.aarch64"
},
"product_reference": "go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.1-150000.1.6.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.1-150000.1.6.1.x86_64"
},
"product_reference": "go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.1-150000.1.6.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.1-150000.1.6.1.aarch64"
},
"product_reference": "go1.26-race-1.26.1-150000.1.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.1-150000.1.6.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.1-150000.1.6.1.x86_64"
},
"product_reference": "go1.26-race-1.26.1-150000.1.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.1-150000.1.6.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.1-150000.1.6.1.aarch64"
},
"product_reference": "go1.26-1.26.1-150000.1.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.1-150000.1.6.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.1-150000.1.6.1.x86_64"
},
"product_reference": "go1.26-1.26.1-150000.1.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.1-150000.1.6.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.1-150000.1.6.1.aarch64"
},
"product_reference": "go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.1-150000.1.6.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.1-150000.1.6.1.x86_64"
},
"product_reference": "go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.1-150000.1.6.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.1-150000.1.6.1.aarch64"
},
"product_reference": "go1.26-race-1.26.1-150000.1.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.1-150000.1.6.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.1-150000.1.6.1.x86_64"
},
"product_reference": "go1.26-race-1.26.1-150000.1.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.1-150000.1.6.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.1-150000.1.6.1.aarch64"
},
"product_reference": "go1.26-1.26.1-150000.1.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.1-150000.1.6.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.1-150000.1.6.1.x86_64"
},
"product_reference": "go1.26-1.26.1-150000.1.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.1-150000.1.6.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.1-150000.1.6.1.aarch64"
},
"product_reference": "go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.1-150000.1.6.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.1-150000.1.6.1.x86_64"
},
"product_reference": "go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.1-150000.1.6.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.1-150000.1.6.1.aarch64"
},
"product_reference": "go1.26-race-1.26.1-150000.1.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.1-150000.1.6.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.1-150000.1.6.1.x86_64"
},
"product_reference": "go1.26-race-1.26.1-150000.1.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.1-150000.1.6.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.1-150000.1.6.1.aarch64"
},
"product_reference": "go1.26-1.26.1-150000.1.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.1-150000.1.6.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.1-150000.1.6.1.x86_64"
},
"product_reference": "go1.26-1.26.1-150000.1.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.1-150000.1.6.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.1-150000.1.6.1.aarch64"
},
"product_reference": "go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.1-150000.1.6.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.1-150000.1.6.1.x86_64"
},
"product_reference": "go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.1-150000.1.6.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.1-150000.1.6.1.aarch64"
},
"product_reference": "go1.26-race-1.26.1-150000.1.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.1-150000.1.6.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.1-150000.1.6.1.x86_64"
},
"product_reference": "go1.26-race-1.26.1-150000.1.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.1-150000.1.6.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.1-150000.1.6.1.aarch64"
},
"product_reference": "go1.26-1.26.1-150000.1.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.1-150000.1.6.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.1-150000.1.6.1.ppc64le"
},
"product_reference": "go1.26-1.26.1-150000.1.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.1-150000.1.6.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.1-150000.1.6.1.s390x"
},
"product_reference": "go1.26-1.26.1-150000.1.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.1-150000.1.6.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.1-150000.1.6.1.x86_64"
},
"product_reference": "go1.26-1.26.1-150000.1.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.1-150000.1.6.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.1-150000.1.6.1.aarch64"
},
"product_reference": "go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.1-150000.1.6.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.1-150000.1.6.1.ppc64le"
},
"product_reference": "go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.1-150000.1.6.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.1-150000.1.6.1.s390x"
},
"product_reference": "go1.26-doc-1.26.1-150000.1.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.1-150000.1.6.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.1-150000.1.6.1.x86_64"
},
"product_reference": "go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.1-150000.1.6.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.1-150000.1.6.1.aarch64"
},
"product_reference": "go1.26-race-1.26.1-150000.1.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.1-150000.1.6.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.1-150000.1.6.1.ppc64le"
},
"product_reference": "go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.1-150000.1.6.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.1-150000.1.6.1.s390x"
},
"product_reference": "go1.26-race-1.26.1-150000.1.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.1-150000.1.6.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.1-150000.1.6.1.x86_64"
},
"product_reference": "go1.26-race-1.26.1-150000.1.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.1-150000.1.6.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.1-150000.1.6.1.aarch64"
},
"product_reference": "go1.26-1.26.1-150000.1.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.1-150000.1.6.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.1-150000.1.6.1.ppc64le"
},
"product_reference": "go1.26-1.26.1-150000.1.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.1-150000.1.6.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.1-150000.1.6.1.s390x"
},
"product_reference": "go1.26-1.26.1-150000.1.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.1-150000.1.6.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.1-150000.1.6.1.x86_64"
},
"product_reference": "go1.26-1.26.1-150000.1.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.1-150000.1.6.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.1-150000.1.6.1.aarch64"
},
"product_reference": "go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.1-150000.1.6.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.1-150000.1.6.1.ppc64le"
},
"product_reference": "go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.1-150000.1.6.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.1-150000.1.6.1.s390x"
},
"product_reference": "go1.26-doc-1.26.1-150000.1.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.1-150000.1.6.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.1-150000.1.6.1.x86_64"
},
"product_reference": "go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.1-150000.1.6.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.1-150000.1.6.1.aarch64"
},
"product_reference": "go1.26-race-1.26.1-150000.1.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.1-150000.1.6.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.1-150000.1.6.1.ppc64le"
},
"product_reference": "go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.1-150000.1.6.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.1-150000.1.6.1.s390x"
},
"product_reference": "go1.26-race-1.26.1-150000.1.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.1-150000.1.6.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.1-150000.1.6.1.x86_64"
},
"product_reference": "go1.26-race-1.26.1-150000.1.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.1-150000.1.6.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.1-150000.1.6.1.aarch64"
},
"product_reference": "go1.26-1.26.1-150000.1.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.1-150000.1.6.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.1-150000.1.6.1.ppc64le"
},
"product_reference": "go1.26-1.26.1-150000.1.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.1-150000.1.6.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.1-150000.1.6.1.s390x"
},
"product_reference": "go1.26-1.26.1-150000.1.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.1-150000.1.6.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.1-150000.1.6.1.x86_64"
},
"product_reference": "go1.26-1.26.1-150000.1.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.1-150000.1.6.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.1-150000.1.6.1.aarch64"
},
"product_reference": "go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.1-150000.1.6.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.1-150000.1.6.1.ppc64le"
},
"product_reference": "go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.1-150000.1.6.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.1-150000.1.6.1.s390x"
},
"product_reference": "go1.26-doc-1.26.1-150000.1.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.1-150000.1.6.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.1-150000.1.6.1.x86_64"
},
"product_reference": "go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.1-150000.1.6.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.1-150000.1.6.1.aarch64"
},
"product_reference": "go1.26-race-1.26.1-150000.1.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.1-150000.1.6.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.1-150000.1.6.1.ppc64le"
},
"product_reference": "go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.1-150000.1.6.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.1-150000.1.6.1.s390x"
},
"product_reference": "go1.26-race-1.26.1-150000.1.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.1-150000.1.6.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.1-150000.1.6.1.x86_64"
},
"product_reference": "go1.26-race-1.26.1-150000.1.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.1-150000.1.6.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.1-150000.1.6.1.ppc64le"
},
"product_reference": "go1.26-1.26.1-150000.1.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.1-150000.1.6.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.1-150000.1.6.1.x86_64"
},
"product_reference": "go1.26-1.26.1-150000.1.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.1-150000.1.6.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.1-150000.1.6.1.ppc64le"
},
"product_reference": "go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.1-150000.1.6.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.1-150000.1.6.1.x86_64"
},
"product_reference": "go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.1-150000.1.6.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.1-150000.1.6.1.ppc64le"
},
"product_reference": "go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.1-150000.1.6.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.1-150000.1.6.1.x86_64"
},
"product_reference": "go1.26-race-1.26.1-150000.1.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.1-150000.1.6.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.1-150000.1.6.1.ppc64le"
},
"product_reference": "go1.26-1.26.1-150000.1.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.1-150000.1.6.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.1-150000.1.6.1.x86_64"
},
"product_reference": "go1.26-1.26.1-150000.1.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.1-150000.1.6.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.1-150000.1.6.1.ppc64le"
},
"product_reference": "go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.1-150000.1.6.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.1-150000.1.6.1.x86_64"
},
"product_reference": "go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.1-150000.1.6.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.1-150000.1.6.1.ppc64le"
},
"product_reference": "go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.1-150000.1.6.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.1-150000.1.6.1.x86_64"
},
"product_reference": "go1.26-race-1.26.1-150000.1.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.1-150000.1.6.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.1-150000.1.6.1.ppc64le"
},
"product_reference": "go1.26-1.26.1-150000.1.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.1-150000.1.6.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.1-150000.1.6.1.x86_64"
},
"product_reference": "go1.26-1.26.1-150000.1.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.1-150000.1.6.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.1-150000.1.6.1.ppc64le"
},
"product_reference": "go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.1-150000.1.6.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.1-150000.1.6.1.x86_64"
},
"product_reference": "go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.1-150000.1.6.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.1-150000.1.6.1.ppc64le"
},
"product_reference": "go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.1-150000.1.6.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.1-150000.1.6.1.x86_64"
},
"product_reference": "go1.26-race-1.26.1-150000.1.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.1-150000.1.6.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.26-1.26.1-150000.1.6.1.aarch64"
},
"product_reference": "go1.26-1.26.1-150000.1.6.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.1-150000.1.6.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.26-1.26.1-150000.1.6.1.ppc64le"
},
"product_reference": "go1.26-1.26.1-150000.1.6.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.1-150000.1.6.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.26-1.26.1-150000.1.6.1.s390x"
},
"product_reference": "go1.26-1.26.1-150000.1.6.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.1-150000.1.6.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.26-1.26.1-150000.1.6.1.x86_64"
},
"product_reference": "go1.26-1.26.1-150000.1.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.1-150000.1.6.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.26-doc-1.26.1-150000.1.6.1.aarch64"
},
"product_reference": "go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.1-150000.1.6.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.26-doc-1.26.1-150000.1.6.1.ppc64le"
},
"product_reference": "go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.1-150000.1.6.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.26-doc-1.26.1-150000.1.6.1.s390x"
},
"product_reference": "go1.26-doc-1.26.1-150000.1.6.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.1-150000.1.6.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.26-doc-1.26.1-150000.1.6.1.x86_64"
},
"product_reference": "go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.1-150000.1.6.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.26-race-1.26.1-150000.1.6.1.aarch64"
},
"product_reference": "go1.26-race-1.26.1-150000.1.6.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.1-150000.1.6.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.26-race-1.26.1-150000.1.6.1.ppc64le"
},
"product_reference": "go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.1-150000.1.6.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.26-race-1.26.1-150000.1.6.1.s390x"
},
"product_reference": "go1.26-race-1.26.1-150000.1.6.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.1-150000.1.6.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.26-race-1.26.1-150000.1.6.1.x86_64"
},
"product_reference": "go1.26-race-1.26.1-150000.1.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-25679",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-25679"
}
],
"notes": [
{
"category": "general",
"text": "url.Parse insufficiently validated the host/authority component and accepted some invalid URLs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.6:go1.26-1.26.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.6:go1.26-1.26.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.6:go1.26-1.26.1-150000.1.6.1.s390x",
"openSUSE Leap 15.6:go1.26-1.26.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.6:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.6:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.6:go1.26-doc-1.26.1-150000.1.6.1.s390x",
"openSUSE Leap 15.6:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.6:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.6:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.6:go1.26-race-1.26.1-150000.1.6.1.s390x",
"openSUSE Leap 15.6:go1.26-race-1.26.1-150000.1.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-25679",
"url": "https://www.suse.com/security/cve/CVE-2026-25679"
},
{
"category": "external",
"summary": "SUSE Bug 1259264 for CVE-2026-25679",
"url": "https://bugzilla.suse.com/1259264"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.6:go1.26-1.26.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.6:go1.26-1.26.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.6:go1.26-1.26.1-150000.1.6.1.s390x",
"openSUSE Leap 15.6:go1.26-1.26.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.6:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.6:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.6:go1.26-doc-1.26.1-150000.1.6.1.s390x",
"openSUSE Leap 15.6:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.6:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.6:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.6:go1.26-race-1.26.1-150000.1.6.1.s390x",
"openSUSE Leap 15.6:go1.26-race-1.26.1-150000.1.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.6:go1.26-1.26.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.6:go1.26-1.26.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.6:go1.26-1.26.1-150000.1.6.1.s390x",
"openSUSE Leap 15.6:go1.26-1.26.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.6:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.6:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.6:go1.26-doc-1.26.1-150000.1.6.1.s390x",
"openSUSE Leap 15.6:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.6:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.6:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.6:go1.26-race-1.26.1-150000.1.6.1.s390x",
"openSUSE Leap 15.6:go1.26-race-1.26.1-150000.1.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T18:35:26Z",
"details": "moderate"
}
],
"title": "CVE-2026-25679"
},
{
"cve": "CVE-2026-27137",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-27137"
}
],
"notes": [
{
"category": "general",
"text": "When verifying a certificate chain which contains a certificate containing multiple email address constraints which share common local portions but different domain portions, these constraints will not be properly applied, and only the last constraint will be considered.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.6:go1.26-1.26.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.6:go1.26-1.26.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.6:go1.26-1.26.1-150000.1.6.1.s390x",
"openSUSE Leap 15.6:go1.26-1.26.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.6:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.6:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.6:go1.26-doc-1.26.1-150000.1.6.1.s390x",
"openSUSE Leap 15.6:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.6:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.6:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.6:go1.26-race-1.26.1-150000.1.6.1.s390x",
"openSUSE Leap 15.6:go1.26-race-1.26.1-150000.1.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-27137",
"url": "https://www.suse.com/security/cve/CVE-2026-27137"
},
{
"category": "external",
"summary": "SUSE Bug 1259266 for CVE-2026-27137",
"url": "https://bugzilla.suse.com/1259266"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.6:go1.26-1.26.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.6:go1.26-1.26.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.6:go1.26-1.26.1-150000.1.6.1.s390x",
"openSUSE Leap 15.6:go1.26-1.26.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.6:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.6:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.6:go1.26-doc-1.26.1-150000.1.6.1.s390x",
"openSUSE Leap 15.6:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.6:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.6:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.6:go1.26-race-1.26.1-150000.1.6.1.s390x",
"openSUSE Leap 15.6:go1.26-race-1.26.1-150000.1.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.6:go1.26-1.26.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.6:go1.26-1.26.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.6:go1.26-1.26.1-150000.1.6.1.s390x",
"openSUSE Leap 15.6:go1.26-1.26.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.6:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.6:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.6:go1.26-doc-1.26.1-150000.1.6.1.s390x",
"openSUSE Leap 15.6:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.6:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.6:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.6:go1.26-race-1.26.1-150000.1.6.1.s390x",
"openSUSE Leap 15.6:go1.26-race-1.26.1-150000.1.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T18:35:26Z",
"details": "moderate"
}
],
"title": "CVE-2026-27137"
},
{
"cve": "CVE-2026-27138",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-27138"
}
],
"notes": [
{
"category": "general",
"text": "Certificate verification can panic when a certificate in the chain has an empty DNS name and another certificate in the chain has excluded name constraints. This can crash programs that are either directly verifying X.509 certificate chains, or those that use TLS.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.6:go1.26-1.26.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.6:go1.26-1.26.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.6:go1.26-1.26.1-150000.1.6.1.s390x",
"openSUSE Leap 15.6:go1.26-1.26.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.6:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.6:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.6:go1.26-doc-1.26.1-150000.1.6.1.s390x",
"openSUSE Leap 15.6:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.6:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.6:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.6:go1.26-race-1.26.1-150000.1.6.1.s390x",
"openSUSE Leap 15.6:go1.26-race-1.26.1-150000.1.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-27138",
"url": "https://www.suse.com/security/cve/CVE-2026-27138"
},
{
"category": "external",
"summary": "SUSE Bug 1259267 for CVE-2026-27138",
"url": "https://bugzilla.suse.com/1259267"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.6:go1.26-1.26.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.6:go1.26-1.26.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.6:go1.26-1.26.1-150000.1.6.1.s390x",
"openSUSE Leap 15.6:go1.26-1.26.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.6:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.6:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.6:go1.26-doc-1.26.1-150000.1.6.1.s390x",
"openSUSE Leap 15.6:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.6:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.6:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.6:go1.26-race-1.26.1-150000.1.6.1.s390x",
"openSUSE Leap 15.6:go1.26-race-1.26.1-150000.1.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.6:go1.26-1.26.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.6:go1.26-1.26.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.6:go1.26-1.26.1-150000.1.6.1.s390x",
"openSUSE Leap 15.6:go1.26-1.26.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.6:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.6:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.6:go1.26-doc-1.26.1-150000.1.6.1.s390x",
"openSUSE Leap 15.6:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.6:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.6:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.6:go1.26-race-1.26.1-150000.1.6.1.s390x",
"openSUSE Leap 15.6:go1.26-race-1.26.1-150000.1.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T18:35:26Z",
"details": "important"
}
],
"title": "CVE-2026-27138"
},
{
"cve": "CVE-2026-27139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-27139"
}
],
"notes": [
{
"category": "general",
"text": "On Unix platforms, when listing the contents of a directory using File.ReadDir or File.Readdir the returned FileInfo could reference a file outside of the Root in which the File was opened. The impact of this escape is limited to reading metadata provided by lstat from arbitrary locations on the filesystem without permitting reading or writing files outside the root.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.6:go1.26-1.26.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.6:go1.26-1.26.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.6:go1.26-1.26.1-150000.1.6.1.s390x",
"openSUSE Leap 15.6:go1.26-1.26.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.6:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.6:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.6:go1.26-doc-1.26.1-150000.1.6.1.s390x",
"openSUSE Leap 15.6:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.6:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.6:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.6:go1.26-race-1.26.1-150000.1.6.1.s390x",
"openSUSE Leap 15.6:go1.26-race-1.26.1-150000.1.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-27139",
"url": "https://www.suse.com/security/cve/CVE-2026-27139"
},
{
"category": "external",
"summary": "SUSE Bug 1259268 for CVE-2026-27139",
"url": "https://bugzilla.suse.com/1259268"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.6:go1.26-1.26.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.6:go1.26-1.26.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.6:go1.26-1.26.1-150000.1.6.1.s390x",
"openSUSE Leap 15.6:go1.26-1.26.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.6:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.6:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.6:go1.26-doc-1.26.1-150000.1.6.1.s390x",
"openSUSE Leap 15.6:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.6:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.6:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.6:go1.26-race-1.26.1-150000.1.6.1.s390x",
"openSUSE Leap 15.6:go1.26-race-1.26.1-150000.1.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.6:go1.26-1.26.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.6:go1.26-1.26.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.6:go1.26-1.26.1-150000.1.6.1.s390x",
"openSUSE Leap 15.6:go1.26-1.26.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.6:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.6:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.6:go1.26-doc-1.26.1-150000.1.6.1.s390x",
"openSUSE Leap 15.6:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.6:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.6:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.6:go1.26-race-1.26.1-150000.1.6.1.s390x",
"openSUSE Leap 15.6:go1.26-race-1.26.1-150000.1.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T18:35:26Z",
"details": "moderate"
}
],
"title": "CVE-2026-27139"
},
{
"cve": "CVE-2026-27142",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-27142"
}
],
"notes": [
{
"category": "general",
"text": "Actions which insert URLs into the content attribute of HTML meta tags are not escaped. This can allow XSS if the meta tag also has an http-equiv attribute with the value \"refresh\". A new GODEBUG setting has been added, htmlmetacontenturlescape, which can be used to disable escaping URLs in actions in the meta content attribute which follow \"url=\" by setting htmlmetacontenturlescape=0.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.6:go1.26-1.26.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.6:go1.26-1.26.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.6:go1.26-1.26.1-150000.1.6.1.s390x",
"openSUSE Leap 15.6:go1.26-1.26.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.6:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.6:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.6:go1.26-doc-1.26.1-150000.1.6.1.s390x",
"openSUSE Leap 15.6:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.6:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.6:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.6:go1.26-race-1.26.1-150000.1.6.1.s390x",
"openSUSE Leap 15.6:go1.26-race-1.26.1-150000.1.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-27142",
"url": "https://www.suse.com/security/cve/CVE-2026-27142"
},
{
"category": "external",
"summary": "SUSE Bug 1259265 for CVE-2026-27142",
"url": "https://bugzilla.suse.com/1259265"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.6:go1.26-1.26.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.6:go1.26-1.26.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.6:go1.26-1.26.1-150000.1.6.1.s390x",
"openSUSE Leap 15.6:go1.26-1.26.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.6:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.6:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.6:go1.26-doc-1.26.1-150000.1.6.1.s390x",
"openSUSE Leap 15.6:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.6:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.6:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.6:go1.26-race-1.26.1-150000.1.6.1.s390x",
"openSUSE Leap 15.6:go1.26-race-1.26.1-150000.1.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.1-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.6:go1.26-1.26.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.6:go1.26-1.26.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.6:go1.26-1.26.1-150000.1.6.1.s390x",
"openSUSE Leap 15.6:go1.26-1.26.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.6:go1.26-doc-1.26.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.6:go1.26-doc-1.26.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.6:go1.26-doc-1.26.1-150000.1.6.1.s390x",
"openSUSE Leap 15.6:go1.26-doc-1.26.1-150000.1.6.1.x86_64",
"openSUSE Leap 15.6:go1.26-race-1.26.1-150000.1.6.1.aarch64",
"openSUSE Leap 15.6:go1.26-race-1.26.1-150000.1.6.1.ppc64le",
"openSUSE Leap 15.6:go1.26-race-1.26.1-150000.1.6.1.s390x",
"openSUSE Leap 15.6:go1.26-race-1.26.1-150000.1.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T18:35:26Z",
"details": "moderate"
}
],
"title": "CVE-2026-27142"
}
]
}
SUSE-SU-2026:0976-1
Vulnerability from csaf_suse - Published: 2026-03-23 16:34 - Updated: 2026-03-23 16:34| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for go1.26-openssl",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for go1.26-openssl fixes the following issues:\n\nUpdate to go 1.26.1 (bsc#1255111, jsc#SLE-18320):\n\n- CVE-2026-25679: net/url: reject IPv6 literal not at start of host (bsc#1259264).\n- CVE-2026-27137: crypto/x509: incorrect enforcement of email constraints (bsc#1259266).\n- CVE-2026-27138: crypto/x509: panic in name constraint checking for malformed certificates (bsc#1259267).\n- CVE-2026-27139: os: FileInfo can escape from a Root (bsc#1259268).\n- CVE-2026-27142: html/template: URLs in meta content attribute actions are not escaped (bsc#1259265).\n\nChangelog:\n\n * Fix fips140only test in boring mode\n * Fix fips140 only test\n * Add GODEBUG=fips140=auto mode (#341)\n * go#77252 cmd/compile: miscompile of global array initialization\n * go#77407 os: Go 1.25.x regression on RemoveAll for windows\n * go#77474 cmd/go: CGO compilation fails after upgrading from Go 1.25.5 to 1.25.6 due to --define-variable flag in \n pkg-config\n * go#77529 cmd/fix, x/tools/go/analysis/passes/modernize: stringscut: OOB panic in indexArgValid analyzing \n \u0027buf.Bytes()\u0027 call\n * go#77532 net/smtp: expiry date of localhostCert for testing is too short\n * go#77536 cmd/compile: internal compiler error: \u0027main.func1\u0027: not lowered: v15, Load STRUCT PTR SSA\n * go#77618 strings: HasSuffix doesn\u0027t work correctly for multibyte runes in go 1.26\n * go#77623 cmd/compile: internal compiler error on : \u0027tried to free an already free register\u0027 with generic function \n and type \u003e= 192 bytes\n * go#77624 cmd/fix, x/tools/go/analysis/passes/modernize: stringsbuilder breaks code when combining two \n strings.Builders\n * go#77680 cmd/link: TestFlagW/-w_-linkmode=external fails on illumos\n * go#77766 cmd/fix,x/tools/go/analysis/passes/modernize: rangeint uses target platform\u0027s type in the range \n expression, breaking other platforms\n * go#77780 reflect: breaking change for reflect.Value.Interface behaviour\n * go#77786 cmd/compile: rewriteFixedLoad does not properly sign extend AuxInt\n * go#77803 cmd/fix,x/tools/go/analysis/passes/modernize: reflect.TypeOf(nil) transformed into\n reflect.TypeFor[untyped nil]()\n * go#77804 cmd/fix,x/tools/go/analysis/passes/modernize: minmax breaks select statements\n * go#77805 cmd/fix, x/tools/go/analysis/passes/modernize: waitgroup leads to a compilation error\n * go#77807 cmd/fix,x/tools/go/analysis/passes/modernize: stringsbuilder ignores variables if they are used multiple \n times\n * go#77849 cmd/fix,x/tools/go/analysis/passes/modernize: stringscut rewrite changes behavior\n * go#77860 cmd/go: change go mod init default go directive back to 1.N\n * go#77899 cmd/fix, x/tools/go/analysis/passes/modernize: bad rangeint rewriting\n * go#77904 x/tools/go/analysis/passes/modernize: stringsbuilder breaks code when GenDecl is a block declaration\n \n- go1.26.0 (released 2026-02-10) is a major release of Go.\n go1.26.x minor releases will be provided through February 2027.\n https://github.com/golang/go/wiki/Go-Release-Cycle\n go1.26 arrives six months after Go 1.25. Most of its changes are\n in the implementation of the toolchain, runtime, and\n libraries. As always, the release maintains the Go 1 promise of\n compatibility. We expect almost all Go programs to continue to\n compile and run as before.\n * Language change: The built-in new function, which creates a new\n variable, now allows its operand to be an expression,\n specifying the initial value of the variable.\n * Language change: The restriction that a generic type may not\n refer to itself in its type parameter list has been lifted. It\n is now possible to specify type constraints that refer to the\n generic type being constrained.\n * go command: The venerable go fix command has been completely\n revamped and is now the home of Go\u0027s modernizers. It provides a\n dependable, push-button way to update Go code bases to the\n latest idioms and core library APIs. The initial suite of\n modernizers includes dozens of fixers to make use of modern\n features of the Go language and library, as well a source-level\n inliner that allows users to automate their own API migrations\n using //go:fix inline directives. These fixers should not\n change the behavior of your program, so if you encounter any\n issues with a fix performed by go fix, please report it.\n * go command: The rewritten go fix command builds atop the exact\n same Go analysis framework as go vet. This means the same\n analyzers that provide diagnostics in go vet can be used to\n suggest and apply fixes in go fix. The go fix command\u0027s\n historical fixers, all of which were obsolete, have been\n removed.\n * go command: Two upcoming Go blog posts will go into more detail\n on modernizers, the inliner, and how to get the most out of go\n fix.\n * go command: go mod init now defaults to a lower go version in\n new go.mod files. Running go mod init using a toolchain of\n version 1.N.X will create a go.mod file specifying the Go\n version go 1.(N-1).0. Pre-release versions of 1.N will create\n go.mod files specifying go 1.(N-2).0. For example, the Go 1.26\n release candidates will create go.mod files with go 1.24.0, and\n Go 1.26 and its minor releases will create go.mod files with go\n 1.25.0. This is intended to encourage the creation of modules\n that are compatible with currently supported versions of\n Go. For additional control over the go version in new modules,\n go mod init can be followed up with go get go@version.\n * go command: cmd/doc, and go tool doc have been deleted. go doc\n can be used as a replacement for go tool doc: it takes the same\n flags and arguments and has the same behavior.\n * pprof: The pprof tool web UI, enabled with the -http flag, now\n defaults to the flame graph view. The previous graph view is\n available in the \u0027View -\u003e Graph\u0027 menu, or via /ui/graph.\n * Runtime: The new Green Tea garbage collector, previously\n available as an experiment in Go 1.25, is now enabled by\n default after incorporating feedback. This garbage collector\u0027s\n design improves the performance of marking and scanning small\n objects through better locality and CPU scalability. Benchmark\n results vary, but we expect somewhere between a 10--40%\n reduction in garbage collection overhead in real-world programs\n that heavily use the garbage collector. Further improvements,\n on the order of 10% in garbage collection overhead, are\n expected when running on newer amd64-based CPU platforms (Intel\n Ice Lake or AMD Zen 4 and newer), as the garbage collector now\n leverages vector instructions for scanning small objects when\n possible. The new garbage collector may be disabled by setting\n GOEXPERIMENT=nogreenteagc at build time. This opt-out setting\n is expected to be removed in Go 1.27. If you disable the new\n garbage collector for any reason related to its performance or\n behavior, please file an issue.\n * Runtime: cgo: The baseline runtime overhead of cgo calls has\n been reduced by ~30%.\n * Runtime: Heap base address randomization: On 64-bit platforms,\n the runtime now randomizes the heap base address at\n startup. This is a security enhancement that makes it harder\n for attackers to predict memory addresses and exploit\n vulnerabilities when using cgo. This feature may be disabled by\n setting GOEXPERIMENT=norandomizedheapbase64 at build time. This\n opt-out setting is expected to be removed in a future Go\n release.\n * Runtime: Experimental goroutine leak profile: A new profile\n type that reports leaked goroutines is now available as an\n experiment. The new profile type, named goroutineleak in the\n runtime/pprof package, may be enabled by setting\n GOEXPERIMENT=goroutineleakprofile at build time. Enabling the\n experiment also makes the profile available as a net/http/pprof\n endpoint, /debug/pprof/goroutineleak. A leaked goroutine is a\n goroutine blocked on some concurrency primitive (channels,\n sync.Mutex, sync.Cond, etc) that cannot possibly become\n unblocked. The runtime detects leaked goroutines using the\n garbage collector: if a goroutine G is blocked on concurrency\n primitive P, and P is unreachable from any runnable goroutine\n or any goroutine that those could unblock, then P cannot be\n unblocked, so goroutine G can never wake up. While it is\n impossible to detect permanently blocked goroutines in all\n cases, this approach detects a large class of such\n leaks. Because this technique builds on reachability, the\n runtime may fail to identify leaks caused by blocking on\n concurrency primitives reachable through global variables or\n the local variables of runnable goroutines. Special thanks to\n Vlad Saioc at Uber for contributing this work. The underlying\n theory is presented in detail in a publication by Saioc et\n al. The implementation is production-ready, and is only\n considered an experiment for the purposes of collecting\n feedback on the API, specifically the choice to make it a new\n profile. The feature is also designed to not incur any\n additional run-time overhead unless it is actively in-use. We\n encourage users to try out the new feature in the Go\n playground, in tests, in continuous integration, and in\n production. We welcome additional feedback on the proposal\n issue. We aim to enable goroutine leak profiles by default in\n Go 1.27.\n * Compiler: The compiler can now allocate the backing store for\n slices on the stack in more situations, which improves\n performance. If this change is causing trouble, the bisect tool\n can be used to find the allocation causing trouble using the\n -compile=variablemake flag. All such new stack allocations can\n also be turned off using -gcflags=all=-d=variablemakehash=n. If\n you encounter issues with this optimization, please file an\n issue.\n * Linker: On 64-bit ARM-based Windows (the windows/arm64 port),\n the linker now supports internal linking mode of cgo programs,\n which can be requested with the -ldflags=-linkmode=internal\n flag.\n * Linker: There are several minor changes to executable\n files. These changes do not affect running Go programs. They\n may affect programs that analyze Go executables, and they may\n affect people who use external linking mode with custom linker\n scripts.\n * Linker: The moduledata structure is now in its own section,\n named .go.module.\n * Linker: The moduledata cutab field, which is a slice, now has\n the correct length; previously the length was four times too\n large.\n * Linker: The pcHeader found at the start of the .gopclntab\n section no longer records the start of the text section. That\n field is now always zero.\n * Linker: That pcHeader change was made so that the .gopclntab\n section no longer contains any relocations. On platforms that\n support relro, the section has moved from the relro segment to\n the rodata segment.\n * Linker: The funcdata symbols and the findfunctab have moved\n from the .rodata section to the .gopclntab section.\n * Linker: The .gosymtab section has been removed. It was\n previously always present but empty.\n * Linker: When using internal linking, ELF sections now appear in\n the section header list sorted by address. The previous order\n was somewhat unpredictable.\n * Linker: The references to section names here use the ELF names\n as seen on Linux and other systems. The Mach-O names as seen on\n Darwin start with a double underscore and do not contain any\n dots.\n * Bootstrap: As mentioned in the Go 1.24 release notes, Go 1.26\n now requires Go 1.24.6 or later for bootstrap. We expect that\n Go 1.28 will require a minor release of Go 1.26 or later for\n bootstrap.\n * Standard Library: New crypto/hpke package: The new crypto/hpke\n package implements Hybrid Public Key Encryption (HPKE) as\n specified in RFC 9180, including support for post-quantum\n hybrid KEMs.\n * Standard Library: New experimental simd/archsimd package: Go\n 1.26 introduces a new experimental simd/archsimd package, which\n can be enabled by setting the environment variable\n GOEXPERIMENT=simd at build time. This package provides access\n to architecture-specific SIMD operations. It is currently\n available on the amd64 architecture and supports 128-bit,\n 256-bit, and 512-bit vector types, such as Int8x16 and\n Float64x8, with operations such as Int8x16.Add. The API is not\n yet considered stable. We intend to provide support for other\n architectures in future versions, but the API intentionally\n architecture-specific and thus non-portable. In addition, we\n plan to develop a high-level portable SIMD package in the\n future.\n * Standard Library: New experimental runtime/secret package: The\n new runtime/secret package is available as an experiment, which\n GOEXPERIMENT=runtimesecret at build time. It provides a\n facility for securely erasing temporaries used in code that\n manipulates secret information--typically cryptographic in\n nature--such as registers, stack, new heap allocations. This\n package is intended to make it easier to ensure forward\n secrecy. It currently supports the amd64 and arm64\n architectures on Linux.\n * bytes: The new Buffer.Peek method returns the next n bytes from\n the buffer without advancing it.\n * crypto: The new Encapsulator and Decapsulator interfaces allow\n accepting abstract KEM encapsulation or decapsulation keys.\n * crypto/dsa: The random parameter to GenerateKey is now\n ignored. Instead, it now always uses a secure source of\n cryptographically random bytes. For deterministic testing, use\n the new testing/cryptotest.SetGlobalRandom function. The new\n GODEBUG setting cryptocustomrand=1 temporarily restores the old\n behavior.\n * crypto/ecdh: The random parameter to Curve.GenerateKey is now\n behavior. The new KeyExchanger interface, implemented by\n PrivateKey, makes it possible to accept abstract ECDH private\n keys, e.g. those implemented in hardware.\n * crypto/ecdsa: The big.Int fields of PublicKey and PrivateKey\n are now deprecated. The random parameter to GenerateKey,\n SignASN1, Sign, and PrivateKey.Sign is now ignored. Instead,\n they now always use a secure source of cryptographically random\n bytes. For deterministic testing, use the new\n testing/cryptotest.SetGlobalRandom function. The new GODEBUG\n setting cryptocustomrand=1 temporarily restores the old\n * crypto/ed25519: If the random parameter to GenerateKey is nil,\n GenerateKey now always uses a secure source of\n cryptographically random bytes, instead of crypto/rand.Reader\n (which could have been overridden). The new GODEBUG setting\n cryptocustomrand=1 temporarily restores the old behavior.\n * crypto/fips140: The new WithoutEnforcement and Enforced\n functions now allow running in GODEBUG=fips140=only mode while\n selectively disabling the strict FIPS 140-3 checks. Version\n returns the resolved FIPS 140-3 Go Cryptographic Module version\n when building against a frozen module with GOFIPS140.\n * crypto/mlkem: The new DecapsulationKey768.Encapsulator and\n DecapsulationKey1024.Encapsulator methods implement the new\n crypto.Decapsulator interface.\n * crypto/mlkem/mlkemtest: The new crypto/mlkem/mlkemtest package\n exposes the Encapsulate768 and Encapsulate1024 functions which\n implement derandomized ML-KEM encapsulation, for use with\n known-answer tests.\n * crypto/rand: The random parameter to Prime is now\n * crypto/rsa: The new EncryptOAEPWithOptions function allows\n specifying different hash functions for OAEP padding and MGF1\n mask generation.\n * crypto/rsa: The random parameter to GenerateKey,\n GenerateMultiPrimeKey, and EncryptPKCS1v15 is now\n ignored. Instead, they now always use a secure source of\n * crypto/rsa: If PrivateKey fields are modified after calling\n PrivateKey.Precompute, PrivateKey.Validate now fails.\n * crypto/rsa: PrivateKey.D is now checked for consistency with\n precomputed values, even if it is not used.\n * crypto/rsa: Unsafe PKCS #1 v1.5 encryption padding (implemented\n by EncryptPKCS1v15, DecryptPKCS1v15, and\n DecryptPKCS1v15SessionKey) is now deprecated.\n * crypto/subtle: The WithDataIndependentTiming function no longer\n locks the calling goroutine to the OS thread while executing\n the passed function. Additionally, any goroutines which are\n spawned during the execution of the passed function and their\n descendants now inherit the properties of\n WithDataIndependentTiming for their lifetime. This change also\n affects cgo in the following ways:\n * crypto/subtle: Any C code called via cgo from within the\n function passed to WithDataIndependentTiming, or from a\n goroutine spawned by the function passed to\n WithDataIndependentTiming and its descendants, will also have\n data independent timing enabled for the duration of the\n call. If the C code disables data independent timing, it will\n be re-enabled on return to Go.\n * crypto/subtle: If C code called via cgo, from the function\n passed to WithDataIndependentTiming or elsewhere, enables or\n disables data independent timing then calling into Go will\n preserve that state for the duration of the call.\n * crypto/tls: The hybrid SecP256r1MLKEM768 and SecP384r1MLKEM1024\n post-quantum key exchanges are now enabled by default. They can\n be disabled by setting Config.CurvePreferences or with the\n tlssecpmlkem=0 GODEBUG setting.\n * crypto/tls: The new ClientHelloInfo.HelloRetryRequest field\n indicates if the ClientHello was sent in response to a\n HelloRetryRequest message. The new\n ConnectionState.HelloRetryRequest field indicates if the server\n sent a HelloRetryRequest, or if the client received a\n HelloRetryRequest, depending on connection role.\n * crypto/tls: The QUICConn type used by QUIC implementations\n includes a new event for reporting TLS handshake errors.\n * crypto/tls: If Certificate.PrivateKey implements\n crypto.MessageSigner, its SignMessage method is used instead of\n Sign in TLS 1.2 and later.\n * crypto/tls: The following GODEBUG settings introduced in Go\n 1.22 and Go 1.23 will be removed in the next major Go\n release. Starting in Go 1.27, the new behavior will apply\n regardless of GODEBUG setting or go.mod language version.\n * crypto/tls: GODEBUG tlsunsafeekm:\n ConnectionState.ExportKeyingMaterial will require TLS 1.3 or\n Extended Master Secret.\n * crypto/tls: GODEBUG tlsrsakex: legacy RSA-only key exchanges\n without ECDH won\u0027t be enabled by default.\n * crypto/tls: GODEBUG tls10server: the default minimum TLS\n version for both clients and servers will be TLS 1.2.\n * crypto/tls: GODEBUG tls3des: the default cipher suites will not\n include 3DES.\n * crypto/tls: GODEBUG x509keypairleaf: X509KeyPair and\n LoadX509KeyPair will always populate the Certificate.Leaf\n field.\n * crypto/x509: The ExtKeyUsage and KeyUsage types now have String\n methods that return the corresponding OID names as defined in\n RFC 5280 and other registries.\n * crypto/x509: The ExtKeyUsage type now has an OID method that\n returns the corresponding OID for the EKU.\n * crypto/x509: The new OIDFromASN1OID function allows converting\n an encoding/asn1.ObjectIdentifier into an OID.\n * debug/elf: Additional R_LARCH_* constants from LoongArch ELF\n psABI v20250521 (global version v2.40) are defined for use with\n LoongArch systems.\n * errors: The new AsType function is a generic version of As. It\n is type-safe, faster, and, in most cases, easier to use.\n * fmt: For unformatted strings, fmt.Errorf(\u0027x\u0027) now allocates\n less and generally matches the allocations for errors.New(\u0027x\u0027).\n * go/ast: The new ParseDirective function parses directive\n comments, which are comments such as //go:generate. Source code\n tools can support their own directive comments and this new API\n should help them implement the conventional syntax.\n * go/ast: The new BasicLit.ValueEnd field records the precise end\n position of a literal so that the BasicLit.End method can now\n always return the correct answer. (Previously it was computed\n using a heuristic that was incorrect for multi-line raw string\n literals in Windows source files, due to removal of carriage\n returns.)\n * go/ast: Programs that update the ValuePos field of BasicLits\n produced by the parser may need to also update or clear the\n ValueEnd field to avoid minor differences in formatted output.\n * go/token: The new File.End convenience method returns the\n file\u0027s end position.\n * go/types: The gotypesalias GODEBUG setting introduced in Go\n 1.22 will be removed in the next major Go release. Starting in\n Go 1.27, the go/types package will always produce an Alias type\n for the representation of type aliases regardless of GODEBUG\n setting or go.mod language version.\n * image/jpeg: The JPEG encoder and decoder have been replaced\n with new, faster, more accurate implementations. Code that\n expects specific bit-for-bit outputs from the encoder or\n decoder may need to be updated.\n * io: ReadAll now allocates less intermediate memory and returns\n a minimally sized final slice. It is often about two times\n faster while typically allocating around half as much total\n memory, with more benefit for larger inputs.\n * log/slog: The NewMultiHandler function creates a MultiHandler\n that invokes all the given Handlers. Its Enabled method reports\n whether any of the handlers\u0027 Enabled methods return true. Its\n Handle, WithAttrs and WithGroup methods call the corresponding\n method on each of the enabled handlers.\n * net: The new Dialer methods DialIP, DialTCP, DialUDP, and\n DialUnix permit dialing specific network types with context\n values.\n * net/http: The new HTTP2Config.StrictMaxConcurrentRequests field\n controls whether a new connection should be opened if an\n existing HTTP/2 connection has exceeded its stream limit.\n * net/http: The new Transport.NewClientConn method returns a\n client connection to an HTTP server. Most users should continue\n to use Transport.RoundTrip to make requests, which manages a\n pool of connections. NewClientConn is useful for users who need\n to implement their own connection management.\n * net/http: Client now uses and sets cookies scoped to URLs with\n the host portion matching Request.Host when\n available. Previously, the connection address host was always\n used.\n * net/http/httptest: The HTTP client returned by Server.Client\n will now redirect requests for example.com and any subdomains\n to the server being tested.\n * net/http/httputil: The ReverseProxy.Director configuration\n field is deprecated in favor of ReverseProxy.Rewrite.\n * net/http/httputil: A malicious client can remove headers added\n by a Director function by designating those headers as\n hop-by-hop. Since there is no way to address this problem\n within the scope of the Director API, we added a new Rewrite\n hook in Go 1.20. Rewrite hooks are provided with both the\n unmodified inbound request received by the proxy and the\n outbound request which will be sent by the proxy. Since the\n Director hook is fundamentally unsafe, we are now deprecating\n it.\n * net/netip: The new Prefix.Compare method compares two prefixes.\n * net/url: Parse now rejects malformed URLs containing colons in\n the host subcomponent, such as http://::1/ or\n http://localhost:80:80/. URLs containing bracketed IPv6\n addresses, such as http://[::1]/ are still accepted. The new\n GODEBUG setting urlstrictcolons=0 restores the old behavior.\n * os: The new Process.WithHandle method provides access to an\n internal process handle on supported platforms (pidfd on Linux\n 5.4 or later, Handle on Windows).\n * os: On Windows, the OpenFile flag parameter can now contain any\n combination of Windows-specific file flags, such as\n FILE_FLAG_OVERLAPPED and FILE_FLAG_SEQUENTIAL_SCAN, for control\n of file or device caching behavior, access modes, and other\n special-purpose flags.\n * os/signal: NotifyContext now cancels the returned context with\n context.CancelCauseFunc and an error indicating which signal\n was received.\n * reflect: The new methods Type.Fields, Type.Methods, Type.Ins\n and Type.Outs return iterators for a type\u0027s fields (for a\n struct type), methods, inputs and outputs parameters (for a\n function type), respectively. Similarly, the new methods\n Value.Fields and Value.Methods return iterators over a value\u0027s\n fields or methods, respectively. Each iteration yields the type\n information (StructField or Method) of a field or method, along\n with the field or method Value.\n * runtime/metrics: Several new scheduler metrics have been added,\n including counts of goroutines in various states (waiting,\n runnable, etc.) under the /sched/goroutines prefix, the number\n of OS threads the runtime is aware of with\n /sched/threads:threads, and the total number of goroutines\n created by the program with\n /sched/goroutines-created:goroutines.\n * testing: The new methods T.ArtifactDir, B.ArtifactDir, and\n F.ArtifactDir return a directory in which to write test output\n files (artifacts).\n * testing: When the -artifacts flag is provided to go test, this\n directory will be located under the output directory (specified\n with -outputdir, or the current directory by\n default). Otherwise, artifacts are stored in a temporary\n directory which is removed after the test completes.\n * testing: The first call to ArtifactDir when -artifacts is\n provided writes the location of the directory to the test log.\n * testing: The B.Loop method no longer prevents inlining in the\n loop body, which could lead to unanticipated allocation and\n slower benchmarks. With this fix, we expect that all benchmarks\n can be converted from the old B.N style to the new B.Loop style\n with no ill effects. Within the body of a for b.Loop() { ... }\n loop, function call parameters, results, and assigned variables\n are still kept alive, preventing the compiler from optimizing\n away entire parts of the benchmark.\n * testing/cryptotest: The new SetGlobalRandom function configures\n a global, deterministic cryptographic randomness source for the\n duration of the test. It affects crypto/rand, and all implicit\n sources of cryptographic randomness in the crypto/... packages.\n * time: The asynctimerchan GODEBUG setting introduced in Go 1.23\n will be removed in the next major Go release. Starting in Go\n 1.27, the time package will always use unbuffered (synchronous)\n channels for timers regardless of GODEBUG setting or go.mod\n language version.\n * Ports: Darwin: Go 1.26 is the last release that will run on\n macOS 12 Monterey. Go 1.27 will require macOS 13 Ventura or\n later.\n * Ports: FreeBSD: The freebsd/riscv64 port (GOOS=freebsd\n GOARCH=riscv64) has been marked broken. See issue 76475 for\n details.\n * Ports: Windows: As announced in the Go 1.25 release notes, the\n broken 32-bit windows/arm port (GOOS=windows GOARCH=arm) has\n been removed.\n * Ports: PowerPC: Go 1.26 is the last release that supports the\n ELFv1 ABI on the big-endian 64-bit PowerPC port on Linux\n (GOOS=linux GOARCH=ppc64). It will switch to the ELFv2 ABI in\n Go 1.27. As the port does not currently support linking against\n other ELF objects, we expect this change to be transparent to\n users.\n * Ports: RISC-V: The linux/riscv64 port now supports the race\n detector.\n * Ports: S390X: The s390x port now supports passing function\n arguments and results using registers.\n * Ports: WebAssembly: The compiler now unconditionally makes use\n of the sign extension and non-trapping floating-point to\n integer conversion instructions. These features have been\n standardized since at least Wasm 2.0. The corresponding GOWASM\n settings, signext and satconv, are now ignored.\n * Ports: WebAssembly: For WebAssembly applications, the runtime\n now manages chunks of heap memory in much smaller increments,\n leading to significantly reduced memory usage for applications\n with heaps less than around 16 MiB in size.\n- go1.26rc3 (released 2026-02-04) is a release candidate version of\n go1.26 cut from the master branch at the revision tagged\n go1.26rc3.\n- go1.26rc2 (released 2026-01-15) is a release candidate version of\n go1.26rc2.\n * go1.26 requires go1.24.6 or later for bootstrap.\n- go1.26rc1 (released 2025-12-16) is a release candidate version of\n go1.26rc1.\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2026-976,SUSE-SLE-Module-Development-Tools-15-SP7-2026-976,SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-976,SUSE-SLE-Product-SLES_SAP-15-SP6-2026-976,openSUSE-SLE-15.6-2026-976",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_0976-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:0976-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260976-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:0976-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024821.html"
},
{
"category": "self",
"summary": "SUSE Bug 1255111",
"url": "https://bugzilla.suse.com/1255111"
},
{
"category": "self",
"summary": "SUSE Bug 1259264",
"url": "https://bugzilla.suse.com/1259264"
},
{
"category": "self",
"summary": "SUSE Bug 1259265",
"url": "https://bugzilla.suse.com/1259265"
},
{
"category": "self",
"summary": "SUSE Bug 1259266",
"url": "https://bugzilla.suse.com/1259266"
},
{
"category": "self",
"summary": "SUSE Bug 1259267",
"url": "https://bugzilla.suse.com/1259267"
},
{
"category": "self",
"summary": "SUSE Bug 1259268",
"url": "https://bugzilla.suse.com/1259268"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-25679 page",
"url": "https://www.suse.com/security/cve/CVE-2026-25679/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-27137 page",
"url": "https://www.suse.com/security/cve/CVE-2026-27137/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-27138 page",
"url": "https://www.suse.com/security/cve/CVE-2026-27138/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-27139 page",
"url": "https://www.suse.com/security/cve/CVE-2026-27139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-27142 page",
"url": "https://www.suse.com/security/cve/CVE-2026-27142/"
}
],
"title": "Security update for go1.26-openssl",
"tracking": {
"current_release_date": "2026-03-23T16:34:53Z",
"generator": {
"date": "2026-03-23T16:34:53Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:0976-1",
"initial_release_date": "2026-03-23T16:34:53Z",
"revision_history": [
{
"date": "2026-03-23T16:34:53Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "go1.26-openssl-1.26.1-150600.13.3.1.aarch64",
"product": {
"name": "go1.26-openssl-1.26.1-150600.13.3.1.aarch64",
"product_id": "go1.26-openssl-1.26.1-150600.13.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.26-openssl-doc-1.26.1-150600.13.3.1.aarch64",
"product": {
"name": "go1.26-openssl-doc-1.26.1-150600.13.3.1.aarch64",
"product_id": "go1.26-openssl-doc-1.26.1-150600.13.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.26-openssl-race-1.26.1-150600.13.3.1.aarch64",
"product": {
"name": "go1.26-openssl-race-1.26.1-150600.13.3.1.aarch64",
"product_id": "go1.26-openssl-race-1.26.1-150600.13.3.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.26-openssl-1.26.1-150600.13.3.1.i586",
"product": {
"name": "go1.26-openssl-1.26.1-150600.13.3.1.i586",
"product_id": "go1.26-openssl-1.26.1-150600.13.3.1.i586"
}
},
{
"category": "product_version",
"name": "go1.26-openssl-doc-1.26.1-150600.13.3.1.i586",
"product": {
"name": "go1.26-openssl-doc-1.26.1-150600.13.3.1.i586",
"product_id": "go1.26-openssl-doc-1.26.1-150600.13.3.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.26-openssl-1.26.1-150600.13.3.1.ppc64le",
"product": {
"name": "go1.26-openssl-1.26.1-150600.13.3.1.ppc64le",
"product_id": "go1.26-openssl-1.26.1-150600.13.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.26-openssl-doc-1.26.1-150600.13.3.1.ppc64le",
"product": {
"name": "go1.26-openssl-doc-1.26.1-150600.13.3.1.ppc64le",
"product_id": "go1.26-openssl-doc-1.26.1-150600.13.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.26-openssl-race-1.26.1-150600.13.3.1.ppc64le",
"product": {
"name": "go1.26-openssl-race-1.26.1-150600.13.3.1.ppc64le",
"product_id": "go1.26-openssl-race-1.26.1-150600.13.3.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.26-openssl-1.26.1-150600.13.3.1.s390x",
"product": {
"name": "go1.26-openssl-1.26.1-150600.13.3.1.s390x",
"product_id": "go1.26-openssl-1.26.1-150600.13.3.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.26-openssl-doc-1.26.1-150600.13.3.1.s390x",
"product": {
"name": "go1.26-openssl-doc-1.26.1-150600.13.3.1.s390x",
"product_id": "go1.26-openssl-doc-1.26.1-150600.13.3.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.26-openssl-race-1.26.1-150600.13.3.1.s390x",
"product": {
"name": "go1.26-openssl-race-1.26.1-150600.13.3.1.s390x",
"product_id": "go1.26-openssl-race-1.26.1-150600.13.3.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.26-openssl-1.26.1-150600.13.3.1.x86_64",
"product": {
"name": "go1.26-openssl-1.26.1-150600.13.3.1.x86_64",
"product_id": "go1.26-openssl-1.26.1-150600.13.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.26-openssl-doc-1.26.1-150600.13.3.1.x86_64",
"product": {
"name": "go1.26-openssl-doc-1.26.1-150600.13.3.1.x86_64",
"product_id": "go1.26-openssl-doc-1.26.1-150600.13.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.26-openssl-race-1.26.1-150600.13.3.1.x86_64",
"product": {
"name": "go1.26-openssl-race-1.26.1-150600.13.3.1.x86_64",
"product_id": "go1.26-openssl-race-1.26.1-150600.13.3.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-development-tools:15:sp7"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP6-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp6"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp6"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.6",
"product": {
"name": "openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.6"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-1.26.1-150600.13.3.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-1.26.1-150600.13.3.1.aarch64"
},
"product_reference": "go1.26-openssl-1.26.1-150600.13.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-1.26.1-150600.13.3.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-1.26.1-150600.13.3.1.ppc64le"
},
"product_reference": "go1.26-openssl-1.26.1-150600.13.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-1.26.1-150600.13.3.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-1.26.1-150600.13.3.1.s390x"
},
"product_reference": "go1.26-openssl-1.26.1-150600.13.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-1.26.1-150600.13.3.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-1.26.1-150600.13.3.1.x86_64"
},
"product_reference": "go1.26-openssl-1.26.1-150600.13.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-doc-1.26.1-150600.13.3.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-doc-1.26.1-150600.13.3.1.aarch64"
},
"product_reference": "go1.26-openssl-doc-1.26.1-150600.13.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-doc-1.26.1-150600.13.3.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-doc-1.26.1-150600.13.3.1.ppc64le"
},
"product_reference": "go1.26-openssl-doc-1.26.1-150600.13.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-doc-1.26.1-150600.13.3.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-doc-1.26.1-150600.13.3.1.s390x"
},
"product_reference": "go1.26-openssl-doc-1.26.1-150600.13.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-doc-1.26.1-150600.13.3.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-doc-1.26.1-150600.13.3.1.x86_64"
},
"product_reference": "go1.26-openssl-doc-1.26.1-150600.13.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-race-1.26.1-150600.13.3.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-race-1.26.1-150600.13.3.1.aarch64"
},
"product_reference": "go1.26-openssl-race-1.26.1-150600.13.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-race-1.26.1-150600.13.3.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-race-1.26.1-150600.13.3.1.ppc64le"
},
"product_reference": "go1.26-openssl-race-1.26.1-150600.13.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-race-1.26.1-150600.13.3.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-race-1.26.1-150600.13.3.1.s390x"
},
"product_reference": "go1.26-openssl-race-1.26.1-150600.13.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-race-1.26.1-150600.13.3.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-race-1.26.1-150600.13.3.1.x86_64"
},
"product_reference": "go1.26-openssl-race-1.26.1-150600.13.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-1.26.1-150600.13.3.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-1.26.1-150600.13.3.1.aarch64"
},
"product_reference": "go1.26-openssl-1.26.1-150600.13.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-1.26.1-150600.13.3.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-1.26.1-150600.13.3.1.ppc64le"
},
"product_reference": "go1.26-openssl-1.26.1-150600.13.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-1.26.1-150600.13.3.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-1.26.1-150600.13.3.1.s390x"
},
"product_reference": "go1.26-openssl-1.26.1-150600.13.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-1.26.1-150600.13.3.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-1.26.1-150600.13.3.1.x86_64"
},
"product_reference": "go1.26-openssl-1.26.1-150600.13.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-doc-1.26.1-150600.13.3.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-doc-1.26.1-150600.13.3.1.aarch64"
},
"product_reference": "go1.26-openssl-doc-1.26.1-150600.13.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-doc-1.26.1-150600.13.3.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-doc-1.26.1-150600.13.3.1.ppc64le"
},
"product_reference": "go1.26-openssl-doc-1.26.1-150600.13.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-doc-1.26.1-150600.13.3.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-doc-1.26.1-150600.13.3.1.s390x"
},
"product_reference": "go1.26-openssl-doc-1.26.1-150600.13.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-doc-1.26.1-150600.13.3.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-doc-1.26.1-150600.13.3.1.x86_64"
},
"product_reference": "go1.26-openssl-doc-1.26.1-150600.13.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-race-1.26.1-150600.13.3.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-race-1.26.1-150600.13.3.1.aarch64"
},
"product_reference": "go1.26-openssl-race-1.26.1-150600.13.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-race-1.26.1-150600.13.3.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-race-1.26.1-150600.13.3.1.ppc64le"
},
"product_reference": "go1.26-openssl-race-1.26.1-150600.13.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-race-1.26.1-150600.13.3.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-race-1.26.1-150600.13.3.1.s390x"
},
"product_reference": "go1.26-openssl-race-1.26.1-150600.13.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-race-1.26.1-150600.13.3.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-race-1.26.1-150600.13.3.1.x86_64"
},
"product_reference": "go1.26-openssl-race-1.26.1-150600.13.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-1.26.1-150600.13.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-openssl-1.26.1-150600.13.3.1.ppc64le"
},
"product_reference": "go1.26-openssl-1.26.1-150600.13.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-1.26.1-150600.13.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-openssl-1.26.1-150600.13.3.1.x86_64"
},
"product_reference": "go1.26-openssl-1.26.1-150600.13.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-doc-1.26.1-150600.13.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-openssl-doc-1.26.1-150600.13.3.1.ppc64le"
},
"product_reference": "go1.26-openssl-doc-1.26.1-150600.13.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-doc-1.26.1-150600.13.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-openssl-doc-1.26.1-150600.13.3.1.x86_64"
},
"product_reference": "go1.26-openssl-doc-1.26.1-150600.13.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-race-1.26.1-150600.13.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-openssl-race-1.26.1-150600.13.3.1.ppc64le"
},
"product_reference": "go1.26-openssl-race-1.26.1-150600.13.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-race-1.26.1-150600.13.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-openssl-race-1.26.1-150600.13.3.1.x86_64"
},
"product_reference": "go1.26-openssl-race-1.26.1-150600.13.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-1.26.1-150600.13.3.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.26-openssl-1.26.1-150600.13.3.1.aarch64"
},
"product_reference": "go1.26-openssl-1.26.1-150600.13.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-1.26.1-150600.13.3.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.26-openssl-1.26.1-150600.13.3.1.ppc64le"
},
"product_reference": "go1.26-openssl-1.26.1-150600.13.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-1.26.1-150600.13.3.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.26-openssl-1.26.1-150600.13.3.1.s390x"
},
"product_reference": "go1.26-openssl-1.26.1-150600.13.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-1.26.1-150600.13.3.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.26-openssl-1.26.1-150600.13.3.1.x86_64"
},
"product_reference": "go1.26-openssl-1.26.1-150600.13.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-doc-1.26.1-150600.13.3.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.26-openssl-doc-1.26.1-150600.13.3.1.aarch64"
},
"product_reference": "go1.26-openssl-doc-1.26.1-150600.13.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-doc-1.26.1-150600.13.3.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.26-openssl-doc-1.26.1-150600.13.3.1.ppc64le"
},
"product_reference": "go1.26-openssl-doc-1.26.1-150600.13.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-doc-1.26.1-150600.13.3.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.26-openssl-doc-1.26.1-150600.13.3.1.s390x"
},
"product_reference": "go1.26-openssl-doc-1.26.1-150600.13.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-doc-1.26.1-150600.13.3.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.26-openssl-doc-1.26.1-150600.13.3.1.x86_64"
},
"product_reference": "go1.26-openssl-doc-1.26.1-150600.13.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-race-1.26.1-150600.13.3.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.26-openssl-race-1.26.1-150600.13.3.1.aarch64"
},
"product_reference": "go1.26-openssl-race-1.26.1-150600.13.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-race-1.26.1-150600.13.3.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.26-openssl-race-1.26.1-150600.13.3.1.ppc64le"
},
"product_reference": "go1.26-openssl-race-1.26.1-150600.13.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-race-1.26.1-150600.13.3.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.26-openssl-race-1.26.1-150600.13.3.1.s390x"
},
"product_reference": "go1.26-openssl-race-1.26.1-150600.13.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-race-1.26.1-150600.13.3.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.26-openssl-race-1.26.1-150600.13.3.1.x86_64"
},
"product_reference": "go1.26-openssl-race-1.26.1-150600.13.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-25679",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-25679"
}
],
"notes": [
{
"category": "general",
"text": "url.Parse insufficiently validated the host/authority component and accepted some invalid URLs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-1.26.1-150600.13.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-1.26.1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-doc-1.26.1-150600.13.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-doc-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-doc-1.26.1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-doc-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-race-1.26.1-150600.13.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-race-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-race-1.26.1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-race-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-1.26.1-150600.13.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-1.26.1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-doc-1.26.1-150600.13.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-doc-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-doc-1.26.1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-doc-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-race-1.26.1-150600.13.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-race-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-race-1.26.1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-race-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-openssl-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-openssl-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-openssl-doc-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-openssl-doc-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-openssl-race-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-openssl-race-1.26.1-150600.13.3.1.x86_64",
"openSUSE Leap 15.6:go1.26-openssl-1.26.1-150600.13.3.1.aarch64",
"openSUSE Leap 15.6:go1.26-openssl-1.26.1-150600.13.3.1.ppc64le",
"openSUSE Leap 15.6:go1.26-openssl-1.26.1-150600.13.3.1.s390x",
"openSUSE Leap 15.6:go1.26-openssl-1.26.1-150600.13.3.1.x86_64",
"openSUSE Leap 15.6:go1.26-openssl-doc-1.26.1-150600.13.3.1.aarch64",
"openSUSE Leap 15.6:go1.26-openssl-doc-1.26.1-150600.13.3.1.ppc64le",
"openSUSE Leap 15.6:go1.26-openssl-doc-1.26.1-150600.13.3.1.s390x",
"openSUSE Leap 15.6:go1.26-openssl-doc-1.26.1-150600.13.3.1.x86_64",
"openSUSE Leap 15.6:go1.26-openssl-race-1.26.1-150600.13.3.1.aarch64",
"openSUSE Leap 15.6:go1.26-openssl-race-1.26.1-150600.13.3.1.ppc64le",
"openSUSE Leap 15.6:go1.26-openssl-race-1.26.1-150600.13.3.1.s390x",
"openSUSE Leap 15.6:go1.26-openssl-race-1.26.1-150600.13.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-25679",
"url": "https://www.suse.com/security/cve/CVE-2026-25679"
},
{
"category": "external",
"summary": "SUSE Bug 1259264 for CVE-2026-25679",
"url": "https://bugzilla.suse.com/1259264"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-1.26.1-150600.13.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-1.26.1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-doc-1.26.1-150600.13.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-doc-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-doc-1.26.1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-doc-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-race-1.26.1-150600.13.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-race-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-race-1.26.1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-race-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-1.26.1-150600.13.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-1.26.1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-doc-1.26.1-150600.13.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-doc-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-doc-1.26.1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-doc-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-race-1.26.1-150600.13.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-race-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-race-1.26.1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-race-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-openssl-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-openssl-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-openssl-doc-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-openssl-doc-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-openssl-race-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-openssl-race-1.26.1-150600.13.3.1.x86_64",
"openSUSE Leap 15.6:go1.26-openssl-1.26.1-150600.13.3.1.aarch64",
"openSUSE Leap 15.6:go1.26-openssl-1.26.1-150600.13.3.1.ppc64le",
"openSUSE Leap 15.6:go1.26-openssl-1.26.1-150600.13.3.1.s390x",
"openSUSE Leap 15.6:go1.26-openssl-1.26.1-150600.13.3.1.x86_64",
"openSUSE Leap 15.6:go1.26-openssl-doc-1.26.1-150600.13.3.1.aarch64",
"openSUSE Leap 15.6:go1.26-openssl-doc-1.26.1-150600.13.3.1.ppc64le",
"openSUSE Leap 15.6:go1.26-openssl-doc-1.26.1-150600.13.3.1.s390x",
"openSUSE Leap 15.6:go1.26-openssl-doc-1.26.1-150600.13.3.1.x86_64",
"openSUSE Leap 15.6:go1.26-openssl-race-1.26.1-150600.13.3.1.aarch64",
"openSUSE Leap 15.6:go1.26-openssl-race-1.26.1-150600.13.3.1.ppc64le",
"openSUSE Leap 15.6:go1.26-openssl-race-1.26.1-150600.13.3.1.s390x",
"openSUSE Leap 15.6:go1.26-openssl-race-1.26.1-150600.13.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-1.26.1-150600.13.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-1.26.1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-doc-1.26.1-150600.13.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-doc-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-doc-1.26.1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-doc-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-race-1.26.1-150600.13.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-race-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-race-1.26.1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-race-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-1.26.1-150600.13.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-1.26.1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-doc-1.26.1-150600.13.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-doc-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-doc-1.26.1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-doc-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-race-1.26.1-150600.13.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-race-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-race-1.26.1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-race-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-openssl-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-openssl-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-openssl-doc-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-openssl-doc-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-openssl-race-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-openssl-race-1.26.1-150600.13.3.1.x86_64",
"openSUSE Leap 15.6:go1.26-openssl-1.26.1-150600.13.3.1.aarch64",
"openSUSE Leap 15.6:go1.26-openssl-1.26.1-150600.13.3.1.ppc64le",
"openSUSE Leap 15.6:go1.26-openssl-1.26.1-150600.13.3.1.s390x",
"openSUSE Leap 15.6:go1.26-openssl-1.26.1-150600.13.3.1.x86_64",
"openSUSE Leap 15.6:go1.26-openssl-doc-1.26.1-150600.13.3.1.aarch64",
"openSUSE Leap 15.6:go1.26-openssl-doc-1.26.1-150600.13.3.1.ppc64le",
"openSUSE Leap 15.6:go1.26-openssl-doc-1.26.1-150600.13.3.1.s390x",
"openSUSE Leap 15.6:go1.26-openssl-doc-1.26.1-150600.13.3.1.x86_64",
"openSUSE Leap 15.6:go1.26-openssl-race-1.26.1-150600.13.3.1.aarch64",
"openSUSE Leap 15.6:go1.26-openssl-race-1.26.1-150600.13.3.1.ppc64le",
"openSUSE Leap 15.6:go1.26-openssl-race-1.26.1-150600.13.3.1.s390x",
"openSUSE Leap 15.6:go1.26-openssl-race-1.26.1-150600.13.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T16:34:53Z",
"details": "moderate"
}
],
"title": "CVE-2026-25679"
},
{
"cve": "CVE-2026-27137",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-27137"
}
],
"notes": [
{
"category": "general",
"text": "When verifying a certificate chain which contains a certificate containing multiple email address constraints which share common local portions but different domain portions, these constraints will not be properly applied, and only the last constraint will be considered.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-1.26.1-150600.13.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-1.26.1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-doc-1.26.1-150600.13.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-doc-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-doc-1.26.1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-doc-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-race-1.26.1-150600.13.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-race-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-race-1.26.1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-race-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-1.26.1-150600.13.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-1.26.1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-doc-1.26.1-150600.13.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-doc-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-doc-1.26.1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-doc-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-race-1.26.1-150600.13.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-race-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-race-1.26.1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-race-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-openssl-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-openssl-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-openssl-doc-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-openssl-doc-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-openssl-race-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-openssl-race-1.26.1-150600.13.3.1.x86_64",
"openSUSE Leap 15.6:go1.26-openssl-1.26.1-150600.13.3.1.aarch64",
"openSUSE Leap 15.6:go1.26-openssl-1.26.1-150600.13.3.1.ppc64le",
"openSUSE Leap 15.6:go1.26-openssl-1.26.1-150600.13.3.1.s390x",
"openSUSE Leap 15.6:go1.26-openssl-1.26.1-150600.13.3.1.x86_64",
"openSUSE Leap 15.6:go1.26-openssl-doc-1.26.1-150600.13.3.1.aarch64",
"openSUSE Leap 15.6:go1.26-openssl-doc-1.26.1-150600.13.3.1.ppc64le",
"openSUSE Leap 15.6:go1.26-openssl-doc-1.26.1-150600.13.3.1.s390x",
"openSUSE Leap 15.6:go1.26-openssl-doc-1.26.1-150600.13.3.1.x86_64",
"openSUSE Leap 15.6:go1.26-openssl-race-1.26.1-150600.13.3.1.aarch64",
"openSUSE Leap 15.6:go1.26-openssl-race-1.26.1-150600.13.3.1.ppc64le",
"openSUSE Leap 15.6:go1.26-openssl-race-1.26.1-150600.13.3.1.s390x",
"openSUSE Leap 15.6:go1.26-openssl-race-1.26.1-150600.13.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-27137",
"url": "https://www.suse.com/security/cve/CVE-2026-27137"
},
{
"category": "external",
"summary": "SUSE Bug 1259266 for CVE-2026-27137",
"url": "https://bugzilla.suse.com/1259266"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-1.26.1-150600.13.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-1.26.1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-doc-1.26.1-150600.13.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-doc-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-doc-1.26.1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-doc-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-race-1.26.1-150600.13.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-race-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-race-1.26.1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-race-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-1.26.1-150600.13.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-1.26.1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-doc-1.26.1-150600.13.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-doc-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-doc-1.26.1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-doc-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-race-1.26.1-150600.13.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-race-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-race-1.26.1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-race-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-openssl-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-openssl-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-openssl-doc-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-openssl-doc-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-openssl-race-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-openssl-race-1.26.1-150600.13.3.1.x86_64",
"openSUSE Leap 15.6:go1.26-openssl-1.26.1-150600.13.3.1.aarch64",
"openSUSE Leap 15.6:go1.26-openssl-1.26.1-150600.13.3.1.ppc64le",
"openSUSE Leap 15.6:go1.26-openssl-1.26.1-150600.13.3.1.s390x",
"openSUSE Leap 15.6:go1.26-openssl-1.26.1-150600.13.3.1.x86_64",
"openSUSE Leap 15.6:go1.26-openssl-doc-1.26.1-150600.13.3.1.aarch64",
"openSUSE Leap 15.6:go1.26-openssl-doc-1.26.1-150600.13.3.1.ppc64le",
"openSUSE Leap 15.6:go1.26-openssl-doc-1.26.1-150600.13.3.1.s390x",
"openSUSE Leap 15.6:go1.26-openssl-doc-1.26.1-150600.13.3.1.x86_64",
"openSUSE Leap 15.6:go1.26-openssl-race-1.26.1-150600.13.3.1.aarch64",
"openSUSE Leap 15.6:go1.26-openssl-race-1.26.1-150600.13.3.1.ppc64le",
"openSUSE Leap 15.6:go1.26-openssl-race-1.26.1-150600.13.3.1.s390x",
"openSUSE Leap 15.6:go1.26-openssl-race-1.26.1-150600.13.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-1.26.1-150600.13.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-1.26.1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-doc-1.26.1-150600.13.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-doc-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-doc-1.26.1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-doc-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-race-1.26.1-150600.13.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-race-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-race-1.26.1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-race-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-1.26.1-150600.13.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-1.26.1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-doc-1.26.1-150600.13.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-doc-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-doc-1.26.1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-doc-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-race-1.26.1-150600.13.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-race-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-race-1.26.1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-race-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-openssl-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-openssl-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-openssl-doc-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-openssl-doc-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-openssl-race-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-openssl-race-1.26.1-150600.13.3.1.x86_64",
"openSUSE Leap 15.6:go1.26-openssl-1.26.1-150600.13.3.1.aarch64",
"openSUSE Leap 15.6:go1.26-openssl-1.26.1-150600.13.3.1.ppc64le",
"openSUSE Leap 15.6:go1.26-openssl-1.26.1-150600.13.3.1.s390x",
"openSUSE Leap 15.6:go1.26-openssl-1.26.1-150600.13.3.1.x86_64",
"openSUSE Leap 15.6:go1.26-openssl-doc-1.26.1-150600.13.3.1.aarch64",
"openSUSE Leap 15.6:go1.26-openssl-doc-1.26.1-150600.13.3.1.ppc64le",
"openSUSE Leap 15.6:go1.26-openssl-doc-1.26.1-150600.13.3.1.s390x",
"openSUSE Leap 15.6:go1.26-openssl-doc-1.26.1-150600.13.3.1.x86_64",
"openSUSE Leap 15.6:go1.26-openssl-race-1.26.1-150600.13.3.1.aarch64",
"openSUSE Leap 15.6:go1.26-openssl-race-1.26.1-150600.13.3.1.ppc64le",
"openSUSE Leap 15.6:go1.26-openssl-race-1.26.1-150600.13.3.1.s390x",
"openSUSE Leap 15.6:go1.26-openssl-race-1.26.1-150600.13.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T16:34:53Z",
"details": "moderate"
}
],
"title": "CVE-2026-27137"
},
{
"cve": "CVE-2026-27138",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-27138"
}
],
"notes": [
{
"category": "general",
"text": "Certificate verification can panic when a certificate in the chain has an empty DNS name and another certificate in the chain has excluded name constraints. This can crash programs that are either directly verifying X.509 certificate chains, or those that use TLS.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-1.26.1-150600.13.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-1.26.1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-doc-1.26.1-150600.13.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-doc-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-doc-1.26.1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-doc-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-race-1.26.1-150600.13.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-race-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-race-1.26.1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-race-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-1.26.1-150600.13.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-1.26.1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-doc-1.26.1-150600.13.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-doc-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-doc-1.26.1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-doc-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-race-1.26.1-150600.13.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-race-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-race-1.26.1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-race-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-openssl-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-openssl-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-openssl-doc-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-openssl-doc-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-openssl-race-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-openssl-race-1.26.1-150600.13.3.1.x86_64",
"openSUSE Leap 15.6:go1.26-openssl-1.26.1-150600.13.3.1.aarch64",
"openSUSE Leap 15.6:go1.26-openssl-1.26.1-150600.13.3.1.ppc64le",
"openSUSE Leap 15.6:go1.26-openssl-1.26.1-150600.13.3.1.s390x",
"openSUSE Leap 15.6:go1.26-openssl-1.26.1-150600.13.3.1.x86_64",
"openSUSE Leap 15.6:go1.26-openssl-doc-1.26.1-150600.13.3.1.aarch64",
"openSUSE Leap 15.6:go1.26-openssl-doc-1.26.1-150600.13.3.1.ppc64le",
"openSUSE Leap 15.6:go1.26-openssl-doc-1.26.1-150600.13.3.1.s390x",
"openSUSE Leap 15.6:go1.26-openssl-doc-1.26.1-150600.13.3.1.x86_64",
"openSUSE Leap 15.6:go1.26-openssl-race-1.26.1-150600.13.3.1.aarch64",
"openSUSE Leap 15.6:go1.26-openssl-race-1.26.1-150600.13.3.1.ppc64le",
"openSUSE Leap 15.6:go1.26-openssl-race-1.26.1-150600.13.3.1.s390x",
"openSUSE Leap 15.6:go1.26-openssl-race-1.26.1-150600.13.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-27138",
"url": "https://www.suse.com/security/cve/CVE-2026-27138"
},
{
"category": "external",
"summary": "SUSE Bug 1259267 for CVE-2026-27138",
"url": "https://bugzilla.suse.com/1259267"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-1.26.1-150600.13.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-1.26.1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-doc-1.26.1-150600.13.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-doc-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-doc-1.26.1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-doc-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-race-1.26.1-150600.13.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-race-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-race-1.26.1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-race-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-1.26.1-150600.13.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-1.26.1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-doc-1.26.1-150600.13.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-doc-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-doc-1.26.1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-doc-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-race-1.26.1-150600.13.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-race-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-race-1.26.1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-race-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-openssl-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-openssl-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-openssl-doc-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-openssl-doc-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-openssl-race-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-openssl-race-1.26.1-150600.13.3.1.x86_64",
"openSUSE Leap 15.6:go1.26-openssl-1.26.1-150600.13.3.1.aarch64",
"openSUSE Leap 15.6:go1.26-openssl-1.26.1-150600.13.3.1.ppc64le",
"openSUSE Leap 15.6:go1.26-openssl-1.26.1-150600.13.3.1.s390x",
"openSUSE Leap 15.6:go1.26-openssl-1.26.1-150600.13.3.1.x86_64",
"openSUSE Leap 15.6:go1.26-openssl-doc-1.26.1-150600.13.3.1.aarch64",
"openSUSE Leap 15.6:go1.26-openssl-doc-1.26.1-150600.13.3.1.ppc64le",
"openSUSE Leap 15.6:go1.26-openssl-doc-1.26.1-150600.13.3.1.s390x",
"openSUSE Leap 15.6:go1.26-openssl-doc-1.26.1-150600.13.3.1.x86_64",
"openSUSE Leap 15.6:go1.26-openssl-race-1.26.1-150600.13.3.1.aarch64",
"openSUSE Leap 15.6:go1.26-openssl-race-1.26.1-150600.13.3.1.ppc64le",
"openSUSE Leap 15.6:go1.26-openssl-race-1.26.1-150600.13.3.1.s390x",
"openSUSE Leap 15.6:go1.26-openssl-race-1.26.1-150600.13.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-1.26.1-150600.13.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-1.26.1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-doc-1.26.1-150600.13.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-doc-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-doc-1.26.1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-doc-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-race-1.26.1-150600.13.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-race-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-race-1.26.1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-race-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-1.26.1-150600.13.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-1.26.1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-doc-1.26.1-150600.13.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-doc-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-doc-1.26.1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-doc-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-race-1.26.1-150600.13.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-race-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-race-1.26.1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-race-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-openssl-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-openssl-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-openssl-doc-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-openssl-doc-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-openssl-race-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-openssl-race-1.26.1-150600.13.3.1.x86_64",
"openSUSE Leap 15.6:go1.26-openssl-1.26.1-150600.13.3.1.aarch64",
"openSUSE Leap 15.6:go1.26-openssl-1.26.1-150600.13.3.1.ppc64le",
"openSUSE Leap 15.6:go1.26-openssl-1.26.1-150600.13.3.1.s390x",
"openSUSE Leap 15.6:go1.26-openssl-1.26.1-150600.13.3.1.x86_64",
"openSUSE Leap 15.6:go1.26-openssl-doc-1.26.1-150600.13.3.1.aarch64",
"openSUSE Leap 15.6:go1.26-openssl-doc-1.26.1-150600.13.3.1.ppc64le",
"openSUSE Leap 15.6:go1.26-openssl-doc-1.26.1-150600.13.3.1.s390x",
"openSUSE Leap 15.6:go1.26-openssl-doc-1.26.1-150600.13.3.1.x86_64",
"openSUSE Leap 15.6:go1.26-openssl-race-1.26.1-150600.13.3.1.aarch64",
"openSUSE Leap 15.6:go1.26-openssl-race-1.26.1-150600.13.3.1.ppc64le",
"openSUSE Leap 15.6:go1.26-openssl-race-1.26.1-150600.13.3.1.s390x",
"openSUSE Leap 15.6:go1.26-openssl-race-1.26.1-150600.13.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T16:34:53Z",
"details": "important"
}
],
"title": "CVE-2026-27138"
},
{
"cve": "CVE-2026-27139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-27139"
}
],
"notes": [
{
"category": "general",
"text": "On Unix platforms, when listing the contents of a directory using File.ReadDir or File.Readdir the returned FileInfo could reference a file outside of the Root in which the File was opened. The impact of this escape is limited to reading metadata provided by lstat from arbitrary locations on the filesystem without permitting reading or writing files outside the root.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-1.26.1-150600.13.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-1.26.1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-doc-1.26.1-150600.13.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-doc-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-doc-1.26.1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-doc-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-race-1.26.1-150600.13.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-race-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-race-1.26.1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-race-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-1.26.1-150600.13.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-1.26.1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-doc-1.26.1-150600.13.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-doc-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-doc-1.26.1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-doc-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-race-1.26.1-150600.13.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-race-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-race-1.26.1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-race-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-openssl-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-openssl-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-openssl-doc-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-openssl-doc-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-openssl-race-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-openssl-race-1.26.1-150600.13.3.1.x86_64",
"openSUSE Leap 15.6:go1.26-openssl-1.26.1-150600.13.3.1.aarch64",
"openSUSE Leap 15.6:go1.26-openssl-1.26.1-150600.13.3.1.ppc64le",
"openSUSE Leap 15.6:go1.26-openssl-1.26.1-150600.13.3.1.s390x",
"openSUSE Leap 15.6:go1.26-openssl-1.26.1-150600.13.3.1.x86_64",
"openSUSE Leap 15.6:go1.26-openssl-doc-1.26.1-150600.13.3.1.aarch64",
"openSUSE Leap 15.6:go1.26-openssl-doc-1.26.1-150600.13.3.1.ppc64le",
"openSUSE Leap 15.6:go1.26-openssl-doc-1.26.1-150600.13.3.1.s390x",
"openSUSE Leap 15.6:go1.26-openssl-doc-1.26.1-150600.13.3.1.x86_64",
"openSUSE Leap 15.6:go1.26-openssl-race-1.26.1-150600.13.3.1.aarch64",
"openSUSE Leap 15.6:go1.26-openssl-race-1.26.1-150600.13.3.1.ppc64le",
"openSUSE Leap 15.6:go1.26-openssl-race-1.26.1-150600.13.3.1.s390x",
"openSUSE Leap 15.6:go1.26-openssl-race-1.26.1-150600.13.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-27139",
"url": "https://www.suse.com/security/cve/CVE-2026-27139"
},
{
"category": "external",
"summary": "SUSE Bug 1259268 for CVE-2026-27139",
"url": "https://bugzilla.suse.com/1259268"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-1.26.1-150600.13.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-1.26.1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-doc-1.26.1-150600.13.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-doc-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-doc-1.26.1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-doc-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-race-1.26.1-150600.13.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-race-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-race-1.26.1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-race-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-1.26.1-150600.13.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-1.26.1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-doc-1.26.1-150600.13.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-doc-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-doc-1.26.1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-doc-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-race-1.26.1-150600.13.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-race-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-race-1.26.1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-race-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-openssl-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-openssl-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-openssl-doc-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-openssl-doc-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-openssl-race-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-openssl-race-1.26.1-150600.13.3.1.x86_64",
"openSUSE Leap 15.6:go1.26-openssl-1.26.1-150600.13.3.1.aarch64",
"openSUSE Leap 15.6:go1.26-openssl-1.26.1-150600.13.3.1.ppc64le",
"openSUSE Leap 15.6:go1.26-openssl-1.26.1-150600.13.3.1.s390x",
"openSUSE Leap 15.6:go1.26-openssl-1.26.1-150600.13.3.1.x86_64",
"openSUSE Leap 15.6:go1.26-openssl-doc-1.26.1-150600.13.3.1.aarch64",
"openSUSE Leap 15.6:go1.26-openssl-doc-1.26.1-150600.13.3.1.ppc64le",
"openSUSE Leap 15.6:go1.26-openssl-doc-1.26.1-150600.13.3.1.s390x",
"openSUSE Leap 15.6:go1.26-openssl-doc-1.26.1-150600.13.3.1.x86_64",
"openSUSE Leap 15.6:go1.26-openssl-race-1.26.1-150600.13.3.1.aarch64",
"openSUSE Leap 15.6:go1.26-openssl-race-1.26.1-150600.13.3.1.ppc64le",
"openSUSE Leap 15.6:go1.26-openssl-race-1.26.1-150600.13.3.1.s390x",
"openSUSE Leap 15.6:go1.26-openssl-race-1.26.1-150600.13.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-1.26.1-150600.13.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-1.26.1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-doc-1.26.1-150600.13.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-doc-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-doc-1.26.1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-doc-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-race-1.26.1-150600.13.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-race-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-race-1.26.1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-race-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-1.26.1-150600.13.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-1.26.1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-doc-1.26.1-150600.13.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-doc-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-doc-1.26.1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-doc-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-race-1.26.1-150600.13.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-race-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-race-1.26.1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-race-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-openssl-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-openssl-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-openssl-doc-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-openssl-doc-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-openssl-race-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-openssl-race-1.26.1-150600.13.3.1.x86_64",
"openSUSE Leap 15.6:go1.26-openssl-1.26.1-150600.13.3.1.aarch64",
"openSUSE Leap 15.6:go1.26-openssl-1.26.1-150600.13.3.1.ppc64le",
"openSUSE Leap 15.6:go1.26-openssl-1.26.1-150600.13.3.1.s390x",
"openSUSE Leap 15.6:go1.26-openssl-1.26.1-150600.13.3.1.x86_64",
"openSUSE Leap 15.6:go1.26-openssl-doc-1.26.1-150600.13.3.1.aarch64",
"openSUSE Leap 15.6:go1.26-openssl-doc-1.26.1-150600.13.3.1.ppc64le",
"openSUSE Leap 15.6:go1.26-openssl-doc-1.26.1-150600.13.3.1.s390x",
"openSUSE Leap 15.6:go1.26-openssl-doc-1.26.1-150600.13.3.1.x86_64",
"openSUSE Leap 15.6:go1.26-openssl-race-1.26.1-150600.13.3.1.aarch64",
"openSUSE Leap 15.6:go1.26-openssl-race-1.26.1-150600.13.3.1.ppc64le",
"openSUSE Leap 15.6:go1.26-openssl-race-1.26.1-150600.13.3.1.s390x",
"openSUSE Leap 15.6:go1.26-openssl-race-1.26.1-150600.13.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T16:34:53Z",
"details": "moderate"
}
],
"title": "CVE-2026-27139"
},
{
"cve": "CVE-2026-27142",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-27142"
}
],
"notes": [
{
"category": "general",
"text": "Actions which insert URLs into the content attribute of HTML meta tags are not escaped. This can allow XSS if the meta tag also has an http-equiv attribute with the value \"refresh\". A new GODEBUG setting has been added, htmlmetacontenturlescape, which can be used to disable escaping URLs in actions in the meta content attribute which follow \"url=\" by setting htmlmetacontenturlescape=0.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-1.26.1-150600.13.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-1.26.1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-doc-1.26.1-150600.13.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-doc-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-doc-1.26.1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-doc-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-race-1.26.1-150600.13.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-race-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-race-1.26.1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-race-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-1.26.1-150600.13.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-1.26.1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-doc-1.26.1-150600.13.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-doc-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-doc-1.26.1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-doc-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-race-1.26.1-150600.13.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-race-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-race-1.26.1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-race-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-openssl-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-openssl-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-openssl-doc-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-openssl-doc-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-openssl-race-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-openssl-race-1.26.1-150600.13.3.1.x86_64",
"openSUSE Leap 15.6:go1.26-openssl-1.26.1-150600.13.3.1.aarch64",
"openSUSE Leap 15.6:go1.26-openssl-1.26.1-150600.13.3.1.ppc64le",
"openSUSE Leap 15.6:go1.26-openssl-1.26.1-150600.13.3.1.s390x",
"openSUSE Leap 15.6:go1.26-openssl-1.26.1-150600.13.3.1.x86_64",
"openSUSE Leap 15.6:go1.26-openssl-doc-1.26.1-150600.13.3.1.aarch64",
"openSUSE Leap 15.6:go1.26-openssl-doc-1.26.1-150600.13.3.1.ppc64le",
"openSUSE Leap 15.6:go1.26-openssl-doc-1.26.1-150600.13.3.1.s390x",
"openSUSE Leap 15.6:go1.26-openssl-doc-1.26.1-150600.13.3.1.x86_64",
"openSUSE Leap 15.6:go1.26-openssl-race-1.26.1-150600.13.3.1.aarch64",
"openSUSE Leap 15.6:go1.26-openssl-race-1.26.1-150600.13.3.1.ppc64le",
"openSUSE Leap 15.6:go1.26-openssl-race-1.26.1-150600.13.3.1.s390x",
"openSUSE Leap 15.6:go1.26-openssl-race-1.26.1-150600.13.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-27142",
"url": "https://www.suse.com/security/cve/CVE-2026-27142"
},
{
"category": "external",
"summary": "SUSE Bug 1259265 for CVE-2026-27142",
"url": "https://bugzilla.suse.com/1259265"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-1.26.1-150600.13.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-1.26.1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-doc-1.26.1-150600.13.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-doc-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-doc-1.26.1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-doc-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-race-1.26.1-150600.13.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-race-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-race-1.26.1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-race-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-1.26.1-150600.13.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-1.26.1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-doc-1.26.1-150600.13.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-doc-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-doc-1.26.1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-doc-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-race-1.26.1-150600.13.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-race-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-race-1.26.1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-race-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-openssl-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-openssl-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-openssl-doc-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-openssl-doc-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-openssl-race-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-openssl-race-1.26.1-150600.13.3.1.x86_64",
"openSUSE Leap 15.6:go1.26-openssl-1.26.1-150600.13.3.1.aarch64",
"openSUSE Leap 15.6:go1.26-openssl-1.26.1-150600.13.3.1.ppc64le",
"openSUSE Leap 15.6:go1.26-openssl-1.26.1-150600.13.3.1.s390x",
"openSUSE Leap 15.6:go1.26-openssl-1.26.1-150600.13.3.1.x86_64",
"openSUSE Leap 15.6:go1.26-openssl-doc-1.26.1-150600.13.3.1.aarch64",
"openSUSE Leap 15.6:go1.26-openssl-doc-1.26.1-150600.13.3.1.ppc64le",
"openSUSE Leap 15.6:go1.26-openssl-doc-1.26.1-150600.13.3.1.s390x",
"openSUSE Leap 15.6:go1.26-openssl-doc-1.26.1-150600.13.3.1.x86_64",
"openSUSE Leap 15.6:go1.26-openssl-race-1.26.1-150600.13.3.1.aarch64",
"openSUSE Leap 15.6:go1.26-openssl-race-1.26.1-150600.13.3.1.ppc64le",
"openSUSE Leap 15.6:go1.26-openssl-race-1.26.1-150600.13.3.1.s390x",
"openSUSE Leap 15.6:go1.26-openssl-race-1.26.1-150600.13.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-1.26.1-150600.13.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-1.26.1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-doc-1.26.1-150600.13.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-doc-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-doc-1.26.1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-doc-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-race-1.26.1-150600.13.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-race-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-race-1.26.1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-openssl-race-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-1.26.1-150600.13.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-1.26.1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-doc-1.26.1-150600.13.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-doc-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-doc-1.26.1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-doc-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-race-1.26.1-150600.13.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-race-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-race-1.26.1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-openssl-race-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-openssl-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-openssl-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-openssl-doc-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-openssl-doc-1.26.1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-openssl-race-1.26.1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-openssl-race-1.26.1-150600.13.3.1.x86_64",
"openSUSE Leap 15.6:go1.26-openssl-1.26.1-150600.13.3.1.aarch64",
"openSUSE Leap 15.6:go1.26-openssl-1.26.1-150600.13.3.1.ppc64le",
"openSUSE Leap 15.6:go1.26-openssl-1.26.1-150600.13.3.1.s390x",
"openSUSE Leap 15.6:go1.26-openssl-1.26.1-150600.13.3.1.x86_64",
"openSUSE Leap 15.6:go1.26-openssl-doc-1.26.1-150600.13.3.1.aarch64",
"openSUSE Leap 15.6:go1.26-openssl-doc-1.26.1-150600.13.3.1.ppc64le",
"openSUSE Leap 15.6:go1.26-openssl-doc-1.26.1-150600.13.3.1.s390x",
"openSUSE Leap 15.6:go1.26-openssl-doc-1.26.1-150600.13.3.1.x86_64",
"openSUSE Leap 15.6:go1.26-openssl-race-1.26.1-150600.13.3.1.aarch64",
"openSUSE Leap 15.6:go1.26-openssl-race-1.26.1-150600.13.3.1.ppc64le",
"openSUSE Leap 15.6:go1.26-openssl-race-1.26.1-150600.13.3.1.s390x",
"openSUSE Leap 15.6:go1.26-openssl-race-1.26.1-150600.13.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T16:34:53Z",
"details": "moderate"
}
],
"title": "CVE-2026-27142"
}
]
}
SUSE-SU-2026:21195-1
Vulnerability from csaf_suse - Published: 2026-04-14 15:41 - Updated: 2026-04-14 15:41| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for go1.26-openssl",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for go1.26-openssl fixes the following issues:\n\nUpdate to go 1.26.1 (bsc#1255111, jsc#SLE-18320):\n\n- CVE-2026-25679: net/url: reject IPv6 literal not at start of host (bsc#1259264).\n- CVE-2026-27137: crypto/x509: incorrect enforcement of email constraints (bsc#1259266).\n- CVE-2026-27138: crypto/x509: panic in name constraint checking for malformed certificates (bsc#1259267).\n- CVE-2026-27139: os: FileInfo can escape from a Root (bsc#1259268).\n- CVE-2026-27142: html/template: URLs in meta content attribute actions are not escaped (bsc#1259265).\n\nChangelog:\n\n * Fix fips140only test in boring mode\n * Fix fips140 only test\n * Add GODEBUG=fips140=auto mode (#341)\n * go#77252 cmd/compile: miscompile of global array initialization\n * go#77407 os: Go 1.25.x regression on RemoveAll for windows\n * go#77474 cmd/go: CGO compilation fails after upgrading from Go 1.25.5 to 1.25.6 due to --define-variable flag in \n pkg-config\n * go#77529 cmd/fix, x/tools/go/analysis/passes/modernize: stringscut: OOB panic in indexArgValid analyzing \n \"buf.Bytes()\" call\n * go#77532 net/smtp: expiry date of localhostCert for testing is too short\n * go#77536 cmd/compile: internal compiler error: \u0027main.func1\u0027: not lowered: v15, Load STRUCT PTR SSA\n * go#77618 strings: HasSuffix doesn\u0027t work correctly for multibyte runes in go 1.26\n * go#77623 cmd/compile: internal compiler error on : \"tried to free an already free register\" with generic function \n and type \u003e= 192 bytes\n * go#77624 cmd/fix, x/tools/go/analysis/passes/modernize: stringsbuilder breaks code when combining two \n strings.Builders\n * go#77680 cmd/link: TestFlagW/-w_-linkmode=external fails on illumos\n * go#77766 cmd/fix,x/tools/go/analysis/passes/modernize: rangeint uses target platform\u0027s type in the range \n expression, breaking other platforms\n * go#77780 reflect: breaking change for reflect.Value.Interface behaviour\n * go#77786 cmd/compile: rewriteFixedLoad does not properly sign extend AuxInt\n * go#77803 cmd/fix,x/tools/go/analysis/passes/modernize: reflect.TypeOf(nil) transformed into\n reflect.TypeFor[untyped nil]()\n * go#77804 cmd/fix,x/tools/go/analysis/passes/modernize: minmax breaks select statements\n * go#77805 cmd/fix, x/tools/go/analysis/passes/modernize: waitgroup leads to a compilation error\n * go#77807 cmd/fix,x/tools/go/analysis/passes/modernize: stringsbuilder ignores variables if they are used multiple \n times\n * go#77849 cmd/fix,x/tools/go/analysis/passes/modernize: stringscut rewrite changes behavior\n * go#77860 cmd/go: change go mod init default go directive back to 1.N\n * go#77899 cmd/fix, x/tools/go/analysis/passes/modernize: bad rangeint rewriting\n * go#77904 x/tools/go/analysis/passes/modernize: stringsbuilder breaks code when GenDecl is a block declaration\n \n- go1.26.0 (released 2026-02-10) is a major release of Go.\n go1.26.x minor releases will be provided through February 2027.\n https://github.com/golang/go/wiki/Go-Release-Cycle\n go1.26 arrives six months after Go 1.25. Most of its changes are\n in the implementation of the toolchain, runtime, and\n libraries. As always, the release maintains the Go 1 promise of\n compatibility. We expect almost all Go programs to continue to\n compile and run as before.\n * Language change: The built-in new function, which creates a new\n variable, now allows its operand to be an expression,\n specifying the initial value of the variable.\n * Language change: The restriction that a generic type may not\n refer to itself in its type parameter list has been lifted. It\n is now possible to specify type constraints that refer to the\n generic type being constrained.\n * go command: The venerable go fix command has been completely\n revamped and is now the home of Go\u0027s modernizers. It provides a\n dependable, push-button way to update Go code bases to the\n latest idioms and core library APIs. The initial suite of\n modernizers includes dozens of fixers to make use of modern\n features of the Go language and library, as well a source-level\n inliner that allows users to automate their own API migrations\n using //go:fix inline directives. These fixers should not\n change the behavior of your program, so if you encounter any\n issues with a fix performed by go fix, please report it.\n * go command: The rewritten go fix command builds atop the exact\n same Go analysis framework as go vet. This means the same\n analyzers that provide diagnostics in go vet can be used to\n suggest and apply fixes in go fix. The go fix command\u0027s\n historical fixers, all of which were obsolete, have been\n removed.\n * go command: Two upcoming Go blog posts will go into more detail\n on modernizers, the inliner, and how to get the most out of go\n fix.\n * go command: go mod init now defaults to a lower go version in\n new go.mod files. Running go mod init using a toolchain of\n version 1.N.X will create a go.mod file specifying the Go\n version go 1.(N-1).0. Pre-release versions of 1.N will create\n go.mod files specifying go 1.(N-2).0. For example, the Go 1.26\n release candidates will create go.mod files with go 1.24.0, and\n Go 1.26 and its minor releases will create go.mod files with go\n 1.25.0. This is intended to encourage the creation of modules\n that are compatible with currently supported versions of\n Go. For additional control over the go version in new modules,\n go mod init can be followed up with go get go@version.\n * go command: cmd/doc, and go tool doc have been deleted. go doc\n can be used as a replacement for go tool doc: it takes the same\n flags and arguments and has the same behavior.\n * pprof: The pprof tool web UI, enabled with the -http flag, now\n defaults to the flame graph view. The previous graph view is\n available in the \"View -\u003e Graph\" menu, or via /ui/graph.\n * Runtime: The new Green Tea garbage collector, previously\n available as an experiment in Go 1.25, is now enabled by\n default after incorporating feedback. This garbage collector\u0027s\n design improves the performance of marking and scanning small\n objects through better locality and CPU scalability. Benchmark\n results vary, but we expect somewhere between a 10--40%\n reduction in garbage collection overhead in real-world programs\n that heavily use the garbage collector. Further improvements,\n on the order of 10% in garbage collection overhead, are\n expected when running on newer amd64-based CPU platforms (Intel\n Ice Lake or AMD Zen 4 and newer), as the garbage collector now\n leverages vector instructions for scanning small objects when\n possible. The new garbage collector may be disabled by setting\n GOEXPERIMENT=nogreenteagc at build time. This opt-out setting\n is expected to be removed in Go 1.27. If you disable the new\n garbage collector for any reason related to its performance or\n behavior, please file an issue.\n * Runtime: cgo: The baseline runtime overhead of cgo calls has\n been reduced by ~30%.\n * Runtime: Heap base address randomization: On 64-bit platforms,\n the runtime now randomizes the heap base address at\n startup. This is a security enhancement that makes it harder\n for attackers to predict memory addresses and exploit\n vulnerabilities when using cgo. This feature may be disabled by\n setting GOEXPERIMENT=norandomizedheapbase64 at build time. This\n opt-out setting is expected to be removed in a future Go\n release.\n * Runtime: Experimental goroutine leak profile: A new profile\n type that reports leaked goroutines is now available as an\n experiment. The new profile type, named goroutineleak in the\n runtime/pprof package, may be enabled by setting\n GOEXPERIMENT=goroutineleakprofile at build time. Enabling the\n experiment also makes the profile available as a net/http/pprof\n endpoint, /debug/pprof/goroutineleak. A leaked goroutine is a\n goroutine blocked on some concurrency primitive (channels,\n sync.Mutex, sync.Cond, etc) that cannot possibly become\n unblocked. The runtime detects leaked goroutines using the\n garbage collector: if a goroutine G is blocked on concurrency\n primitive P, and P is unreachable from any runnable goroutine\n or any goroutine that those could unblock, then P cannot be\n unblocked, so goroutine G can never wake up. While it is\n impossible to detect permanently blocked goroutines in all\n cases, this approach detects a large class of such\n leaks. Because this technique builds on reachability, the\n runtime may fail to identify leaks caused by blocking on\n concurrency primitives reachable through global variables or\n the local variables of runnable goroutines. Special thanks to\n Vlad Saioc at Uber for contributing this work. The underlying\n theory is presented in detail in a publication by Saioc et\n al. The implementation is production-ready, and is only\n considered an experiment for the purposes of collecting\n feedback on the API, specifically the choice to make it a new\n profile. The feature is also designed to not incur any\n additional run-time overhead unless it is actively in-use. We\n encourage users to try out the new feature in the Go\n playground, in tests, in continuous integration, and in\n production. We welcome additional feedback on the proposal\n issue. We aim to enable goroutine leak profiles by default in\n Go 1.27.\n * Compiler: The compiler can now allocate the backing store for\n slices on the stack in more situations, which improves\n performance. If this change is causing trouble, the bisect tool\n can be used to find the allocation causing trouble using the\n -compile=variablemake flag. All such new stack allocations can\n also be turned off using -gcflags=all=-d=variablemakehash=n. If\n you encounter issues with this optimization, please file an\n issue.\n * Linker: On 64-bit ARM-based Windows (the windows/arm64 port),\n the linker now supports internal linking mode of cgo programs,\n which can be requested with the -ldflags=-linkmode=internal\n flag.\n * Linker: There are several minor changes to executable\n files. These changes do not affect running Go programs. They\n may affect programs that analyze Go executables, and they may\n affect people who use external linking mode with custom linker\n scripts.\n * Linker: The moduledata structure is now in its own section,\n named .go.module.\n * Linker: The moduledata cutab field, which is a slice, now has\n the correct length; previously the length was four times too\n large.\n * Linker: The pcHeader found at the start of the .gopclntab\n section no longer records the start of the text section. That\n field is now always zero.\n * Linker: That pcHeader change was made so that the .gopclntab\n section no longer contains any relocations. On platforms that\n support relro, the section has moved from the relro segment to\n the rodata segment.\n * Linker: The funcdata symbols and the findfunctab have moved\n from the .rodata section to the .gopclntab section.\n * Linker: The .gosymtab section has been removed. It was\n previously always present but empty.\n * Linker: When using internal linking, ELF sections now appear in\n the section header list sorted by address. The previous order\n was somewhat unpredictable.\n * Linker: The references to section names here use the ELF names\n as seen on Linux and other systems. The Mach-O names as seen on\n Darwin start with a double underscore and do not contain any\n dots.\n * Bootstrap: As mentioned in the Go 1.24 release notes, Go 1.26\n now requires Go 1.24.6 or later for bootstrap. We expect that\n Go 1.28 will require a minor release of Go 1.26 or later for\n bootstrap.\n * Standard Library: New crypto/hpke package: The new crypto/hpke\n package implements Hybrid Public Key Encryption (HPKE) as\n specified in RFC 9180, including support for post-quantum\n hybrid KEMs.\n * Standard Library: New experimental simd/archsimd package: Go\n 1.26 introduces a new experimental simd/archsimd package, which\n can be enabled by setting the environment variable\n GOEXPERIMENT=simd at build time. This package provides access\n to architecture-specific SIMD operations. It is currently\n available on the amd64 architecture and supports 128-bit,\n 256-bit, and 512-bit vector types, such as Int8x16 and\n Float64x8, with operations such as Int8x16.Add. The API is not\n yet considered stable. We intend to provide support for other\n architectures in future versions, but the API intentionally\n architecture-specific and thus non-portable. In addition, we\n plan to develop a high-level portable SIMD package in the\n future.\n * Standard Library: New experimental runtime/secret package: The\n new runtime/secret package is available as an experiment, which\n GOEXPERIMENT=runtimesecret at build time. It provides a\n facility for securely erasing temporaries used in code that\n manipulates secret information--typically cryptographic in\n nature--such as registers, stack, new heap allocations. This\n package is intended to make it easier to ensure forward\n secrecy. It currently supports the amd64 and arm64\n architectures on Linux.\n * bytes: The new Buffer.Peek method returns the next n bytes from\n the buffer without advancing it.\n * crypto: The new Encapsulator and Decapsulator interfaces allow\n accepting abstract KEM encapsulation or decapsulation keys.\n * crypto/dsa: The random parameter to GenerateKey is now\n ignored. Instead, it now always uses a secure source of\n cryptographically random bytes. For deterministic testing, use\n the new testing/cryptotest.SetGlobalRandom function. The new\n GODEBUG setting cryptocustomrand=1 temporarily restores the old\n behavior.\n * crypto/ecdh: The random parameter to Curve.GenerateKey is now\n behavior. The new KeyExchanger interface, implemented by\n PrivateKey, makes it possible to accept abstract ECDH private\n keys, e.g. those implemented in hardware.\n * crypto/ecdsa: The big.Int fields of PublicKey and PrivateKey\n are now deprecated. The random parameter to GenerateKey,\n SignASN1, Sign, and PrivateKey.Sign is now ignored. Instead,\n they now always use a secure source of cryptographically random\n bytes. For deterministic testing, use the new\n testing/cryptotest.SetGlobalRandom function. The new GODEBUG\n setting cryptocustomrand=1 temporarily restores the old\n * crypto/ed25519: If the random parameter to GenerateKey is nil,\n GenerateKey now always uses a secure source of\n cryptographically random bytes, instead of crypto/rand.Reader\n (which could have been overridden). The new GODEBUG setting\n cryptocustomrand=1 temporarily restores the old behavior.\n * crypto/fips140: The new WithoutEnforcement and Enforced\n functions now allow running in GODEBUG=fips140=only mode while\n selectively disabling the strict FIPS 140-3 checks. Version\n returns the resolved FIPS 140-3 Go Cryptographic Module version\n when building against a frozen module with GOFIPS140.\n * crypto/mlkem: The new DecapsulationKey768.Encapsulator and\n DecapsulationKey1024.Encapsulator methods implement the new\n crypto.Decapsulator interface.\n * crypto/mlkem/mlkemtest: The new crypto/mlkem/mlkemtest package\n exposes the Encapsulate768 and Encapsulate1024 functions which\n implement derandomized ML-KEM encapsulation, for use with\n known-answer tests.\n * crypto/rand: The random parameter to Prime is now\n * crypto/rsa: The new EncryptOAEPWithOptions function allows\n specifying different hash functions for OAEP padding and MGF1\n mask generation.\n * crypto/rsa: The random parameter to GenerateKey,\n GenerateMultiPrimeKey, and EncryptPKCS1v15 is now\n ignored. Instead, they now always use a secure source of\n * crypto/rsa: If PrivateKey fields are modified after calling\n PrivateKey.Precompute, PrivateKey.Validate now fails.\n * crypto/rsa: PrivateKey.D is now checked for consistency with\n precomputed values, even if it is not used.\n * crypto/rsa: Unsafe PKCS #1 v1.5 encryption padding (implemented\n by EncryptPKCS1v15, DecryptPKCS1v15, and\n DecryptPKCS1v15SessionKey) is now deprecated.\n * crypto/subtle: The WithDataIndependentTiming function no longer\n locks the calling goroutine to the OS thread while executing\n the passed function. Additionally, any goroutines which are\n spawned during the execution of the passed function and their\n descendants now inherit the properties of\n WithDataIndependentTiming for their lifetime. This change also\n affects cgo in the following ways:\n * crypto/subtle: Any C code called via cgo from within the\n function passed to WithDataIndependentTiming, or from a\n goroutine spawned by the function passed to\n WithDataIndependentTiming and its descendants, will also have\n data independent timing enabled for the duration of the\n call. If the C code disables data independent timing, it will\n be re-enabled on return to Go.\n * crypto/subtle: If C code called via cgo, from the function\n passed to WithDataIndependentTiming or elsewhere, enables or\n disables data independent timing then calling into Go will\n preserve that state for the duration of the call.\n * crypto/tls: The hybrid SecP256r1MLKEM768 and SecP384r1MLKEM1024\n post-quantum key exchanges are now enabled by default. They can\n be disabled by setting Config.CurvePreferences or with the\n tlssecpmlkem=0 GODEBUG setting.\n * crypto/tls: The new ClientHelloInfo.HelloRetryRequest field\n indicates if the ClientHello was sent in response to a\n HelloRetryRequest message. The new\n ConnectionState.HelloRetryRequest field indicates if the server\n sent a HelloRetryRequest, or if the client received a\n HelloRetryRequest, depending on connection role.\n * crypto/tls: The QUICConn type used by QUIC implementations\n includes a new event for reporting TLS handshake errors.\n * crypto/tls: If Certificate.PrivateKey implements\n crypto.MessageSigner, its SignMessage method is used instead of\n Sign in TLS 1.2 and later.\n * crypto/tls: The following GODEBUG settings introduced in Go\n 1.22 and Go 1.23 will be removed in the next major Go\n release. Starting in Go 1.27, the new behavior will apply\n regardless of GODEBUG setting or go.mod language version.\n * crypto/tls: GODEBUG tlsunsafeekm:\n ConnectionState.ExportKeyingMaterial will require TLS 1.3 or\n Extended Master Secret.\n * crypto/tls: GODEBUG tlsrsakex: legacy RSA-only key exchanges\n without ECDH won\u0027t be enabled by default.\n * crypto/tls: GODEBUG tls10server: the default minimum TLS\n version for both clients and servers will be TLS 1.2.\n * crypto/tls: GODEBUG tls3des: the default cipher suites will not\n include 3DES.\n * crypto/tls: GODEBUG x509keypairleaf: X509KeyPair and\n LoadX509KeyPair will always populate the Certificate.Leaf\n field.\n * crypto/x509: The ExtKeyUsage and KeyUsage types now have String\n methods that return the corresponding OID names as defined in\n RFC 5280 and other registries.\n * crypto/x509: The ExtKeyUsage type now has an OID method that\n returns the corresponding OID for the EKU.\n * crypto/x509: The new OIDFromASN1OID function allows converting\n an encoding/asn1.ObjectIdentifier into an OID.\n * debug/elf: Additional R_LARCH_* constants from LoongArch ELF\n psABI v20250521 (global version v2.40) are defined for use with\n LoongArch systems.\n * errors: The new AsType function is a generic version of As. It\n is type-safe, faster, and, in most cases, easier to use.\n * fmt: For unformatted strings, fmt.Errorf(\"x\") now allocates\n less and generally matches the allocations for errors.New(\"x\").\n * go/ast: The new ParseDirective function parses directive\n comments, which are comments such as //go:generate. Source code\n tools can support their own directive comments and this new API\n should help them implement the conventional syntax.\n * go/ast: The new BasicLit.ValueEnd field records the precise end\n position of a literal so that the BasicLit.End method can now\n always return the correct answer. (Previously it was computed\n using a heuristic that was incorrect for multi-line raw string\n literals in Windows source files, due to removal of carriage\n returns.)\n * go/ast: Programs that update the ValuePos field of BasicLits\n produced by the parser may need to also update or clear the\n ValueEnd field to avoid minor differences in formatted output.\n * go/token: The new File.End convenience method returns the\n file\u0027s end position.\n * go/types: The gotypesalias GODEBUG setting introduced in Go\n 1.22 will be removed in the next major Go release. Starting in\n Go 1.27, the go/types package will always produce an Alias type\n for the representation of type aliases regardless of GODEBUG\n setting or go.mod language version.\n * image/jpeg: The JPEG encoder and decoder have been replaced\n with new, faster, more accurate implementations. Code that\n expects specific bit-for-bit outputs from the encoder or\n decoder may need to be updated.\n * io: ReadAll now allocates less intermediate memory and returns\n a minimally sized final slice. It is often about two times\n faster while typically allocating around half as much total\n memory, with more benefit for larger inputs.\n * log/slog: The NewMultiHandler function creates a MultiHandler\n that invokes all the given Handlers. Its Enabled method reports\n whether any of the handlers\u0027 Enabled methods return true. Its\n Handle, WithAttrs and WithGroup methods call the corresponding\n method on each of the enabled handlers.\n * net: The new Dialer methods DialIP, DialTCP, DialUDP, and\n DialUnix permit dialing specific network types with context\n values.\n * net/http: The new HTTP2Config.StrictMaxConcurrentRequests field\n controls whether a new connection should be opened if an\n existing HTTP/2 connection has exceeded its stream limit.\n * net/http: The new Transport.NewClientConn method returns a\n client connection to an HTTP server. Most users should continue\n to use Transport.RoundTrip to make requests, which manages a\n pool of connections. NewClientConn is useful for users who need\n to implement their own connection management.\n * net/http: Client now uses and sets cookies scoped to URLs with\n the host portion matching Request.Host when\n available. Previously, the connection address host was always\n used.\n * net/http/httptest: The HTTP client returned by Server.Client\n will now redirect requests for example.com and any subdomains\n to the server being tested.\n * net/http/httputil: The ReverseProxy.Director configuration\n field is deprecated in favor of ReverseProxy.Rewrite.\n * net/http/httputil: A malicious client can remove headers added\n by a Director function by designating those headers as\n hop-by-hop. Since there is no way to address this problem\n within the scope of the Director API, we added a new Rewrite\n hook in Go 1.20. Rewrite hooks are provided with both the\n unmodified inbound request received by the proxy and the\n outbound request which will be sent by the proxy. Since the\n Director hook is fundamentally unsafe, we are now deprecating\n it.\n * net/netip: The new Prefix.Compare method compares two prefixes.\n * net/url: Parse now rejects malformed URLs containing colons in\n the host subcomponent, such as http://::1/ or\n http://localhost:80:80/. URLs containing bracketed IPv6\n addresses, such as http://[::1]/ are still accepted. The new\n GODEBUG setting urlstrictcolons=0 restores the old behavior.\n * os: The new Process.WithHandle method provides access to an\n internal process handle on supported platforms (pidfd on Linux\n 5.4 or later, Handle on Windows).\n * os: On Windows, the OpenFile flag parameter can now contain any\n combination of Windows-specific file flags, such as\n FILE_FLAG_OVERLAPPED and FILE_FLAG_SEQUENTIAL_SCAN, for control\n of file or device caching behavior, access modes, and other\n special-purpose flags.\n * os/signal: NotifyContext now cancels the returned context with\n context.CancelCauseFunc and an error indicating which signal\n was received.\n * reflect: The new methods Type.Fields, Type.Methods, Type.Ins\n and Type.Outs return iterators for a type\u0027s fields (for a\n struct type), methods, inputs and outputs parameters (for a\n function type), respectively. Similarly, the new methods\n Value.Fields and Value.Methods return iterators over a value\u0027s\n fields or methods, respectively. Each iteration yields the type\n information (StructField or Method) of a field or method, along\n with the field or method Value.\n * runtime/metrics: Several new scheduler metrics have been added,\n including counts of goroutines in various states (waiting,\n runnable, etc.) under the /sched/goroutines prefix, the number\n of OS threads the runtime is aware of with\n /sched/threads:threads, and the total number of goroutines\n created by the program with\n /sched/goroutines-created:goroutines.\n * testing: The new methods T.ArtifactDir, B.ArtifactDir, and\n F.ArtifactDir return a directory in which to write test output\n files (artifacts).\n * testing: When the -artifacts flag is provided to go test, this\n directory will be located under the output directory (specified\n with -outputdir, or the current directory by\n default). Otherwise, artifacts are stored in a temporary\n directory which is removed after the test completes.\n * testing: The first call to ArtifactDir when -artifacts is\n provided writes the location of the directory to the test log.\n * testing: The B.Loop method no longer prevents inlining in the\n loop body, which could lead to unanticipated allocation and\n slower benchmarks. With this fix, we expect that all benchmarks\n can be converted from the old B.N style to the new B.Loop style\n with no ill effects. Within the body of a for b.Loop() { ... }\n loop, function call parameters, results, and assigned variables\n are still kept alive, preventing the compiler from optimizing\n away entire parts of the benchmark.\n * testing/cryptotest: The new SetGlobalRandom function configures\n a global, deterministic cryptographic randomness source for the\n duration of the test. It affects crypto/rand, and all implicit\n sources of cryptographic randomness in the crypto/... packages.\n * time: The asynctimerchan GODEBUG setting introduced in Go 1.23\n will be removed in the next major Go release. Starting in Go\n 1.27, the time package will always use unbuffered (synchronous)\n channels for timers regardless of GODEBUG setting or go.mod\n language version.\n * Ports: Darwin: Go 1.26 is the last release that will run on\n macOS 12 Monterey. Go 1.27 will require macOS 13 Ventura or\n later.\n * Ports: FreeBSD: The freebsd/riscv64 port (GOOS=freebsd\n GOARCH=riscv64) has been marked broken. See issue 76475 for\n details.\n * Ports: Windows: As announced in the Go 1.25 release notes, the\n broken 32-bit windows/arm port (GOOS=windows GOARCH=arm) has\n been removed.\n * Ports: PowerPC: Go 1.26 is the last release that supports the\n ELFv1 ABI on the big-endian 64-bit PowerPC port on Linux\n (GOOS=linux GOARCH=ppc64). It will switch to the ELFv2 ABI in\n Go 1.27. As the port does not currently support linking against\n other ELF objects, we expect this change to be transparent to\n users.\n * Ports: RISC-V: The linux/riscv64 port now supports the race\n detector.\n * Ports: S390X: The s390x port now supports passing function\n arguments and results using registers.\n * Ports: WebAssembly: The compiler now unconditionally makes use\n of the sign extension and non-trapping floating-point to\n integer conversion instructions. These features have been\n standardized since at least Wasm 2.0. The corresponding GOWASM\n settings, signext and satconv, are now ignored.\n * Ports: WebAssembly: For WebAssembly applications, the runtime\n now manages chunks of heap memory in much smaller increments,\n leading to significantly reduced memory usage for applications\n with heaps less than around 16 MiB in size.\n- go1.26rc3 (released 2026-02-04) is a release candidate version of\n go1.26 cut from the master branch at the revision tagged\n go1.26rc3.\n- go1.26rc2 (released 2026-01-15) is a release candidate version of\n go1.26rc2.\n * go1.26 requires go1.24.6 or later for bootstrap.\n- go1.26rc1 (released 2025-12-16) is a release candidate version of\n go1.26rc1.\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLES-16.0-560",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_21195-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:21195-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202621195-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:21195-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-April/025499.html"
},
{
"category": "self",
"summary": "SUSE Bug 1255111",
"url": "https://bugzilla.suse.com/1255111"
},
{
"category": "self",
"summary": "SUSE Bug 1259264",
"url": "https://bugzilla.suse.com/1259264"
},
{
"category": "self",
"summary": "SUSE Bug 1259265",
"url": "https://bugzilla.suse.com/1259265"
},
{
"category": "self",
"summary": "SUSE Bug 1259266",
"url": "https://bugzilla.suse.com/1259266"
},
{
"category": "self",
"summary": "SUSE Bug 1259267",
"url": "https://bugzilla.suse.com/1259267"
},
{
"category": "self",
"summary": "SUSE Bug 1259268",
"url": "https://bugzilla.suse.com/1259268"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-25679 page",
"url": "https://www.suse.com/security/cve/CVE-2026-25679/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-27137 page",
"url": "https://www.suse.com/security/cve/CVE-2026-27137/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-27138 page",
"url": "https://www.suse.com/security/cve/CVE-2026-27138/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-27139 page",
"url": "https://www.suse.com/security/cve/CVE-2026-27139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-27142 page",
"url": "https://www.suse.com/security/cve/CVE-2026-27142/"
}
],
"title": "Security update for go1.26-openssl",
"tracking": {
"current_release_date": "2026-04-14T15:41:55Z",
"generator": {
"date": "2026-04-14T15:41:55Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:21195-1",
"initial_release_date": "2026-04-14T15:41:55Z",
"revision_history": [
{
"date": "2026-04-14T15:41:55Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "go1.26-openssl-1.26.1-160000.1.1.aarch64",
"product": {
"name": "go1.26-openssl-1.26.1-160000.1.1.aarch64",
"product_id": "go1.26-openssl-1.26.1-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.26-openssl-doc-1.26.1-160000.1.1.aarch64",
"product": {
"name": "go1.26-openssl-doc-1.26.1-160000.1.1.aarch64",
"product_id": "go1.26-openssl-doc-1.26.1-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.26-openssl-race-1.26.1-160000.1.1.aarch64",
"product": {
"name": "go1.26-openssl-race-1.26.1-160000.1.1.aarch64",
"product_id": "go1.26-openssl-race-1.26.1-160000.1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.26-openssl-1.26.1-160000.1.1.ppc64le",
"product": {
"name": "go1.26-openssl-1.26.1-160000.1.1.ppc64le",
"product_id": "go1.26-openssl-1.26.1-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.26-openssl-doc-1.26.1-160000.1.1.ppc64le",
"product": {
"name": "go1.26-openssl-doc-1.26.1-160000.1.1.ppc64le",
"product_id": "go1.26-openssl-doc-1.26.1-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.26-openssl-race-1.26.1-160000.1.1.ppc64le",
"product": {
"name": "go1.26-openssl-race-1.26.1-160000.1.1.ppc64le",
"product_id": "go1.26-openssl-race-1.26.1-160000.1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.26-openssl-1.26.1-160000.1.1.s390x",
"product": {
"name": "go1.26-openssl-1.26.1-160000.1.1.s390x",
"product_id": "go1.26-openssl-1.26.1-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.26-openssl-doc-1.26.1-160000.1.1.s390x",
"product": {
"name": "go1.26-openssl-doc-1.26.1-160000.1.1.s390x",
"product_id": "go1.26-openssl-doc-1.26.1-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.26-openssl-race-1.26.1-160000.1.1.s390x",
"product": {
"name": "go1.26-openssl-race-1.26.1-160000.1.1.s390x",
"product_id": "go1.26-openssl-race-1.26.1-160000.1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.26-openssl-1.26.1-160000.1.1.x86_64",
"product": {
"name": "go1.26-openssl-1.26.1-160000.1.1.x86_64",
"product_id": "go1.26-openssl-1.26.1-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.26-openssl-doc-1.26.1-160000.1.1.x86_64",
"product": {
"name": "go1.26-openssl-doc-1.26.1-160000.1.1.x86_64",
"product_id": "go1.26-openssl-doc-1.26.1-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.26-openssl-race-1.26.1-160000.1.1.x86_64",
"product": {
"name": "go1.26-openssl-race-1.26.1-160000.1.1.x86_64",
"product_id": "go1.26-openssl-race-1.26.1-160000.1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 16.0",
"product": {
"name": "SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:16.0"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP applications 16.0",
"product": {
"name": "SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:16:16.0:server-sap"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-1.26.1-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.26-openssl-1.26.1-160000.1.1.aarch64"
},
"product_reference": "go1.26-openssl-1.26.1-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-1.26.1-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.26-openssl-1.26.1-160000.1.1.ppc64le"
},
"product_reference": "go1.26-openssl-1.26.1-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-1.26.1-160000.1.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.26-openssl-1.26.1-160000.1.1.s390x"
},
"product_reference": "go1.26-openssl-1.26.1-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-1.26.1-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.26-openssl-1.26.1-160000.1.1.x86_64"
},
"product_reference": "go1.26-openssl-1.26.1-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-doc-1.26.1-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.aarch64"
},
"product_reference": "go1.26-openssl-doc-1.26.1-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-doc-1.26.1-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.ppc64le"
},
"product_reference": "go1.26-openssl-doc-1.26.1-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-doc-1.26.1-160000.1.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.s390x"
},
"product_reference": "go1.26-openssl-doc-1.26.1-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-doc-1.26.1-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.x86_64"
},
"product_reference": "go1.26-openssl-doc-1.26.1-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-race-1.26.1-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.26-openssl-race-1.26.1-160000.1.1.aarch64"
},
"product_reference": "go1.26-openssl-race-1.26.1-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-race-1.26.1-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.26-openssl-race-1.26.1-160000.1.1.ppc64le"
},
"product_reference": "go1.26-openssl-race-1.26.1-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-race-1.26.1-160000.1.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.26-openssl-race-1.26.1-160000.1.1.s390x"
},
"product_reference": "go1.26-openssl-race-1.26.1-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-race-1.26.1-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.26-openssl-race-1.26.1-160000.1.1.x86_64"
},
"product_reference": "go1.26-openssl-race-1.26.1-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-1.26.1-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-1.26.1-160000.1.1.aarch64"
},
"product_reference": "go1.26-openssl-1.26.1-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-1.26.1-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-1.26.1-160000.1.1.ppc64le"
},
"product_reference": "go1.26-openssl-1.26.1-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-1.26.1-160000.1.1.s390x as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-1.26.1-160000.1.1.s390x"
},
"product_reference": "go1.26-openssl-1.26.1-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-1.26.1-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-1.26.1-160000.1.1.x86_64"
},
"product_reference": "go1.26-openssl-1.26.1-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-doc-1.26.1-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.aarch64"
},
"product_reference": "go1.26-openssl-doc-1.26.1-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-doc-1.26.1-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.ppc64le"
},
"product_reference": "go1.26-openssl-doc-1.26.1-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-doc-1.26.1-160000.1.1.s390x as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.s390x"
},
"product_reference": "go1.26-openssl-doc-1.26.1-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-doc-1.26.1-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.x86_64"
},
"product_reference": "go1.26-openssl-doc-1.26.1-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-race-1.26.1-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-race-1.26.1-160000.1.1.aarch64"
},
"product_reference": "go1.26-openssl-race-1.26.1-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-race-1.26.1-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-race-1.26.1-160000.1.1.ppc64le"
},
"product_reference": "go1.26-openssl-race-1.26.1-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-race-1.26.1-160000.1.1.s390x as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-race-1.26.1-160000.1.1.s390x"
},
"product_reference": "go1.26-openssl-race-1.26.1-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-race-1.26.1-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-race-1.26.1-160000.1.1.x86_64"
},
"product_reference": "go1.26-openssl-race-1.26.1-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-25679",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-25679"
}
],
"notes": [
{
"category": "general",
"text": "url.Parse insufficiently validated the host/authority component and accepted some invalid URLs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-1.26.1-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-1.26.1-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-1.26.1-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-1.26.1-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-race-1.26.1-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-race-1.26.1-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-race-1.26.1-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-race-1.26.1-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-1.26.1-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-1.26.1-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-1.26.1-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-1.26.1-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-race-1.26.1-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-race-1.26.1-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-race-1.26.1-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-race-1.26.1-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-25679",
"url": "https://www.suse.com/security/cve/CVE-2026-25679"
},
{
"category": "external",
"summary": "SUSE Bug 1259264 for CVE-2026-25679",
"url": "https://bugzilla.suse.com/1259264"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-1.26.1-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-1.26.1-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-1.26.1-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-1.26.1-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-race-1.26.1-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-race-1.26.1-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-race-1.26.1-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-race-1.26.1-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-1.26.1-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-1.26.1-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-1.26.1-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-1.26.1-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-race-1.26.1-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-race-1.26.1-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-race-1.26.1-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-race-1.26.1-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-1.26.1-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-1.26.1-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-1.26.1-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-1.26.1-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-race-1.26.1-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-race-1.26.1-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-race-1.26.1-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-race-1.26.1-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-1.26.1-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-1.26.1-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-1.26.1-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-1.26.1-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-race-1.26.1-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-race-1.26.1-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-race-1.26.1-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-race-1.26.1-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-14T15:41:55Z",
"details": "moderate"
}
],
"title": "CVE-2026-25679"
},
{
"cve": "CVE-2026-27137",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-27137"
}
],
"notes": [
{
"category": "general",
"text": "When verifying a certificate chain which contains a certificate containing multiple email address constraints which share common local portions but different domain portions, these constraints will not be properly applied, and only the last constraint will be considered.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-1.26.1-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-1.26.1-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-1.26.1-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-1.26.1-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-race-1.26.1-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-race-1.26.1-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-race-1.26.1-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-race-1.26.1-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-1.26.1-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-1.26.1-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-1.26.1-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-1.26.1-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-race-1.26.1-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-race-1.26.1-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-race-1.26.1-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-race-1.26.1-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-27137",
"url": "https://www.suse.com/security/cve/CVE-2026-27137"
},
{
"category": "external",
"summary": "SUSE Bug 1259266 for CVE-2026-27137",
"url": "https://bugzilla.suse.com/1259266"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-1.26.1-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-1.26.1-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-1.26.1-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-1.26.1-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-race-1.26.1-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-race-1.26.1-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-race-1.26.1-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-race-1.26.1-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-1.26.1-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-1.26.1-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-1.26.1-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-1.26.1-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-race-1.26.1-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-race-1.26.1-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-race-1.26.1-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-race-1.26.1-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-1.26.1-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-1.26.1-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-1.26.1-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-1.26.1-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-race-1.26.1-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-race-1.26.1-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-race-1.26.1-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-race-1.26.1-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-1.26.1-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-1.26.1-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-1.26.1-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-1.26.1-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-race-1.26.1-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-race-1.26.1-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-race-1.26.1-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-race-1.26.1-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-14T15:41:55Z",
"details": "moderate"
}
],
"title": "CVE-2026-27137"
},
{
"cve": "CVE-2026-27138",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-27138"
}
],
"notes": [
{
"category": "general",
"text": "Certificate verification can panic when a certificate in the chain has an empty DNS name and another certificate in the chain has excluded name constraints. This can crash programs that are either directly verifying X.509 certificate chains, or those that use TLS.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-1.26.1-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-1.26.1-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-1.26.1-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-1.26.1-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-race-1.26.1-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-race-1.26.1-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-race-1.26.1-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-race-1.26.1-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-1.26.1-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-1.26.1-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-1.26.1-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-1.26.1-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-race-1.26.1-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-race-1.26.1-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-race-1.26.1-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-race-1.26.1-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-27138",
"url": "https://www.suse.com/security/cve/CVE-2026-27138"
},
{
"category": "external",
"summary": "SUSE Bug 1259267 for CVE-2026-27138",
"url": "https://bugzilla.suse.com/1259267"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-1.26.1-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-1.26.1-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-1.26.1-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-1.26.1-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-race-1.26.1-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-race-1.26.1-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-race-1.26.1-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-race-1.26.1-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-1.26.1-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-1.26.1-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-1.26.1-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-1.26.1-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-race-1.26.1-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-race-1.26.1-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-race-1.26.1-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-race-1.26.1-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-1.26.1-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-1.26.1-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-1.26.1-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-1.26.1-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-race-1.26.1-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-race-1.26.1-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-race-1.26.1-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-race-1.26.1-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-1.26.1-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-1.26.1-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-1.26.1-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-1.26.1-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-race-1.26.1-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-race-1.26.1-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-race-1.26.1-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-race-1.26.1-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-14T15:41:55Z",
"details": "important"
}
],
"title": "CVE-2026-27138"
},
{
"cve": "CVE-2026-27139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-27139"
}
],
"notes": [
{
"category": "general",
"text": "On Unix platforms, when listing the contents of a directory using File.ReadDir or File.Readdir the returned FileInfo could reference a file outside of the Root in which the File was opened. The impact of this escape is limited to reading metadata provided by lstat from arbitrary locations on the filesystem without permitting reading or writing files outside the root.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-1.26.1-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-1.26.1-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-1.26.1-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-1.26.1-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-race-1.26.1-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-race-1.26.1-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-race-1.26.1-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-race-1.26.1-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-1.26.1-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-1.26.1-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-1.26.1-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-1.26.1-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-race-1.26.1-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-race-1.26.1-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-race-1.26.1-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-race-1.26.1-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-27139",
"url": "https://www.suse.com/security/cve/CVE-2026-27139"
},
{
"category": "external",
"summary": "SUSE Bug 1259268 for CVE-2026-27139",
"url": "https://bugzilla.suse.com/1259268"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-1.26.1-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-1.26.1-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-1.26.1-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-1.26.1-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-race-1.26.1-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-race-1.26.1-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-race-1.26.1-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-race-1.26.1-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-1.26.1-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-1.26.1-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-1.26.1-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-1.26.1-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-race-1.26.1-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-race-1.26.1-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-race-1.26.1-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-race-1.26.1-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-1.26.1-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-1.26.1-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-1.26.1-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-1.26.1-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-race-1.26.1-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-race-1.26.1-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-race-1.26.1-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-race-1.26.1-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-1.26.1-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-1.26.1-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-1.26.1-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-1.26.1-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-race-1.26.1-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-race-1.26.1-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-race-1.26.1-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-race-1.26.1-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-14T15:41:55Z",
"details": "moderate"
}
],
"title": "CVE-2026-27139"
},
{
"cve": "CVE-2026-27142",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-27142"
}
],
"notes": [
{
"category": "general",
"text": "Actions which insert URLs into the content attribute of HTML meta tags are not escaped. This can allow XSS if the meta tag also has an http-equiv attribute with the value \"refresh\". A new GODEBUG setting has been added, htmlmetacontenturlescape, which can be used to disable escaping URLs in actions in the meta content attribute which follow \"url=\" by setting htmlmetacontenturlescape=0.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-1.26.1-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-1.26.1-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-1.26.1-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-1.26.1-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-race-1.26.1-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-race-1.26.1-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-race-1.26.1-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-race-1.26.1-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-1.26.1-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-1.26.1-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-1.26.1-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-1.26.1-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-race-1.26.1-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-race-1.26.1-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-race-1.26.1-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-race-1.26.1-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-27142",
"url": "https://www.suse.com/security/cve/CVE-2026-27142"
},
{
"category": "external",
"summary": "SUSE Bug 1259265 for CVE-2026-27142",
"url": "https://bugzilla.suse.com/1259265"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-1.26.1-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-1.26.1-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-1.26.1-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-1.26.1-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-race-1.26.1-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-race-1.26.1-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-race-1.26.1-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-race-1.26.1-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-1.26.1-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-1.26.1-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-1.26.1-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-1.26.1-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-race-1.26.1-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-race-1.26.1-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-race-1.26.1-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-race-1.26.1-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-1.26.1-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-1.26.1-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-1.26.1-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-1.26.1-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-race-1.26.1-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-race-1.26.1-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-race-1.26.1-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-openssl-race-1.26.1-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-1.26.1-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-1.26.1-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-1.26.1-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-1.26.1-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-doc-1.26.1-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-race-1.26.1-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-race-1.26.1-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-race-1.26.1-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-openssl-race-1.26.1-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-14T15:41:55Z",
"details": "moderate"
}
],
"title": "CVE-2026-27142"
}
]
}
SUSE-SU-2026:0993-1
Vulnerability from csaf_suse - Published: 2026-03-24 08:54 - Updated: 2026-03-24 08:54| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for go1.26-openssl",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for go1.26-openssl fixes the following issues:\n\nUpdate to go 1.26.1 (bsc#1255111, jsc#SLE-18320):\n\n- CVE-2026-25679: net/url: reject IPv6 literal not at start of host (bsc#1259264).\n- CVE-2026-27137: crypto/x509: incorrect enforcement of email constraints (bsc#1259266).\n- CVE-2026-27138: crypto/x509: panic in name constraint checking for malformed certificates (bsc#1259267).\n- CVE-2026-27139: os: FileInfo can escape from a Root (bsc#1259268).\n- CVE-2026-27142: html/template: URLs in meta content attribute actions are not escaped (bsc#1259265).\n\nChangelog:\n\n * Fix fips140only test in boring mode\n * Fix fips140 only test\n * Add GODEBUG=fips140=auto mode (#341)\n * go#77252 cmd/compile: miscompile of global array initialization\n * go#77407 os: Go 1.25.x regression on RemoveAll for windows\n * go#77474 cmd/go: CGO compilation fails after upgrading from Go 1.25.5 to 1.25.6 due to --define-variable flag in \n pkg-config\n * go#77529 cmd/fix, x/tools/go/analysis/passes/modernize: stringscut: OOB panic in indexArgValid analyzing \n \u0027buf.Bytes()\u0027 call\n * go#77532 net/smtp: expiry date of localhostCert for testing is too short\n * go#77536 cmd/compile: internal compiler error: \u0027main.func1\u0027: not lowered: v15, Load STRUCT PTR SSA\n * go#77618 strings: HasSuffix doesn\u0027t work correctly for multibyte runes in go 1.26\n * go#77623 cmd/compile: internal compiler error on : \u0027tried to free an already free register\u0027 with generic function \n and type \u003e= 192 bytes\n * go#77624 cmd/fix, x/tools/go/analysis/passes/modernize: stringsbuilder breaks code when combining two \n strings.Builders\n * go#77680 cmd/link: TestFlagW/-w_-linkmode=external fails on illumos\n * go#77766 cmd/fix,x/tools/go/analysis/passes/modernize: rangeint uses target platform\u0027s type in the range \n expression, breaking other platforms\n * go#77780 reflect: breaking change for reflect.Value.Interface behaviour\n * go#77786 cmd/compile: rewriteFixedLoad does not properly sign extend AuxInt\n * go#77803 cmd/fix,x/tools/go/analysis/passes/modernize: reflect.TypeOf(nil) transformed into\n reflect.TypeFor[untyped nil]()\n * go#77804 cmd/fix,x/tools/go/analysis/passes/modernize: minmax breaks select statements\n * go#77805 cmd/fix, x/tools/go/analysis/passes/modernize: waitgroup leads to a compilation error\n * go#77807 cmd/fix,x/tools/go/analysis/passes/modernize: stringsbuilder ignores variables if they are used multiple \n times\n * go#77849 cmd/fix,x/tools/go/analysis/passes/modernize: stringscut rewrite changes behavior\n * go#77860 cmd/go: change go mod init default go directive back to 1.N\n * go#77899 cmd/fix, x/tools/go/analysis/passes/modernize: bad rangeint rewriting\n * go#77904 x/tools/go/analysis/passes/modernize: stringsbuilder breaks code when GenDecl is a block declaration\n \n- go1.26.0 (released 2026-02-10) is a major release of Go.\n go1.26.x minor releases will be provided through February 2027.\n https://github.com/golang/go/wiki/Go-Release-Cycle\n go1.26 arrives six months after Go 1.25. Most of its changes are\n in the implementation of the toolchain, runtime, and\n libraries. As always, the release maintains the Go 1 promise of\n compatibility. We expect almost all Go programs to continue to\n compile and run as before.\n * Language change: The built-in new function, which creates a new\n variable, now allows its operand to be an expression,\n specifying the initial value of the variable.\n * Language change: The restriction that a generic type may not\n refer to itself in its type parameter list has been lifted. It\n is now possible to specify type constraints that refer to the\n generic type being constrained.\n * go command: The venerable go fix command has been completely\n revamped and is now the home of Go\u0027s modernizers. It provides a\n dependable, push-button way to update Go code bases to the\n latest idioms and core library APIs. The initial suite of\n modernizers includes dozens of fixers to make use of modern\n features of the Go language and library, as well a source-level\n inliner that allows users to automate their own API migrations\n using //go:fix inline directives. These fixers should not\n change the behavior of your program, so if you encounter any\n issues with a fix performed by go fix, please report it.\n * go command: The rewritten go fix command builds atop the exact\n same Go analysis framework as go vet. This means the same\n analyzers that provide diagnostics in go vet can be used to\n suggest and apply fixes in go fix. The go fix command\u0027s\n historical fixers, all of which were obsolete, have been\n removed.\n * go command: Two upcoming Go blog posts will go into more detail\n on modernizers, the inliner, and how to get the most out of go\n fix.\n * go command: go mod init now defaults to a lower go version in\n new go.mod files. Running go mod init using a toolchain of\n version 1.N.X will create a go.mod file specifying the Go\n version go 1.(N-1).0. Pre-release versions of 1.N will create\n go.mod files specifying go 1.(N-2).0. For example, the Go 1.26\n release candidates will create go.mod files with go 1.24.0, and\n Go 1.26 and its minor releases will create go.mod files with go\n 1.25.0. This is intended to encourage the creation of modules\n that are compatible with currently supported versions of\n Go. For additional control over the go version in new modules,\n go mod init can be followed up with go get go@version.\n * go command: cmd/doc, and go tool doc have been deleted. go doc\n can be used as a replacement for go tool doc: it takes the same\n flags and arguments and has the same behavior.\n * pprof: The pprof tool web UI, enabled with the -http flag, now\n defaults to the flame graph view. The previous graph view is\n available in the \u0027View -\u003e Graph\u0027 menu, or via /ui/graph.\n * Runtime: The new Green Tea garbage collector, previously\n available as an experiment in Go 1.25, is now enabled by\n default after incorporating feedback. This garbage collector\u0027s\n design improves the performance of marking and scanning small\n objects through better locality and CPU scalability. Benchmark\n results vary, but we expect somewhere between a 10--40%\n reduction in garbage collection overhead in real-world programs\n that heavily use the garbage collector. Further improvements,\n on the order of 10% in garbage collection overhead, are\n expected when running on newer amd64-based CPU platforms (Intel\n Ice Lake or AMD Zen 4 and newer), as the garbage collector now\n leverages vector instructions for scanning small objects when\n possible. The new garbage collector may be disabled by setting\n GOEXPERIMENT=nogreenteagc at build time. This opt-out setting\n is expected to be removed in Go 1.27. If you disable the new\n garbage collector for any reason related to its performance or\n behavior, please file an issue.\n * Runtime: cgo: The baseline runtime overhead of cgo calls has\n been reduced by ~30%.\n * Runtime: Heap base address randomization: On 64-bit platforms,\n the runtime now randomizes the heap base address at\n startup. This is a security enhancement that makes it harder\n for attackers to predict memory addresses and exploit\n vulnerabilities when using cgo. This feature may be disabled by\n setting GOEXPERIMENT=norandomizedheapbase64 at build time. This\n opt-out setting is expected to be removed in a future Go\n release.\n * Runtime: Experimental goroutine leak profile: A new profile\n type that reports leaked goroutines is now available as an\n experiment. The new profile type, named goroutineleak in the\n runtime/pprof package, may be enabled by setting\n GOEXPERIMENT=goroutineleakprofile at build time. Enabling the\n experiment also makes the profile available as a net/http/pprof\n endpoint, /debug/pprof/goroutineleak. A leaked goroutine is a\n goroutine blocked on some concurrency primitive (channels,\n sync.Mutex, sync.Cond, etc) that cannot possibly become\n unblocked. The runtime detects leaked goroutines using the\n garbage collector: if a goroutine G is blocked on concurrency\n primitive P, and P is unreachable from any runnable goroutine\n or any goroutine that those could unblock, then P cannot be\n unblocked, so goroutine G can never wake up. While it is\n impossible to detect permanently blocked goroutines in all\n cases, this approach detects a large class of such\n leaks. Because this technique builds on reachability, the\n runtime may fail to identify leaks caused by blocking on\n concurrency primitives reachable through global variables or\n the local variables of runnable goroutines. Special thanks to\n Vlad Saioc at Uber for contributing this work. The underlying\n theory is presented in detail in a publication by Saioc et\n al. The implementation is production-ready, and is only\n considered an experiment for the purposes of collecting\n feedback on the API, specifically the choice to make it a new\n profile. The feature is also designed to not incur any\n additional run-time overhead unless it is actively in-use. We\n encourage users to try out the new feature in the Go\n playground, in tests, in continuous integration, and in\n production. We welcome additional feedback on the proposal\n issue. We aim to enable goroutine leak profiles by default in\n Go 1.27.\n * Compiler: The compiler can now allocate the backing store for\n slices on the stack in more situations, which improves\n performance. If this change is causing trouble, the bisect tool\n can be used to find the allocation causing trouble using the\n -compile=variablemake flag. All such new stack allocations can\n also be turned off using -gcflags=all=-d=variablemakehash=n. If\n you encounter issues with this optimization, please file an\n issue.\n * Linker: On 64-bit ARM-based Windows (the windows/arm64 port),\n the linker now supports internal linking mode of cgo programs,\n which can be requested with the -ldflags=-linkmode=internal\n flag.\n * Linker: There are several minor changes to executable\n files. These changes do not affect running Go programs. They\n may affect programs that analyze Go executables, and they may\n affect people who use external linking mode with custom linker\n scripts.\n * Linker: The moduledata structure is now in its own section,\n named .go.module.\n * Linker: The moduledata cutab field, which is a slice, now has\n the correct length; previously the length was four times too\n large.\n * Linker: The pcHeader found at the start of the .gopclntab\n section no longer records the start of the text section. That\n field is now always zero.\n * Linker: That pcHeader change was made so that the .gopclntab\n section no longer contains any relocations. On platforms that\n support relro, the section has moved from the relro segment to\n the rodata segment.\n * Linker: The funcdata symbols and the findfunctab have moved\n from the .rodata section to the .gopclntab section.\n * Linker: The .gosymtab section has been removed. It was\n previously always present but empty.\n * Linker: When using internal linking, ELF sections now appear in\n the section header list sorted by address. The previous order\n was somewhat unpredictable.\n * Linker: The references to section names here use the ELF names\n as seen on Linux and other systems. The Mach-O names as seen on\n Darwin start with a double underscore and do not contain any\n dots.\n * Bootstrap: As mentioned in the Go 1.24 release notes, Go 1.26\n now requires Go 1.24.6 or later for bootstrap. We expect that\n Go 1.28 will require a minor release of Go 1.26 or later for\n bootstrap.\n * Standard Library: New crypto/hpke package: The new crypto/hpke\n package implements Hybrid Public Key Encryption (HPKE) as\n specified in RFC 9180, including support for post-quantum\n hybrid KEMs.\n * Standard Library: New experimental simd/archsimd package: Go\n 1.26 introduces a new experimental simd/archsimd package, which\n can be enabled by setting the environment variable\n GOEXPERIMENT=simd at build time. This package provides access\n to architecture-specific SIMD operations. It is currently\n available on the amd64 architecture and supports 128-bit,\n 256-bit, and 512-bit vector types, such as Int8x16 and\n Float64x8, with operations such as Int8x16.Add. The API is not\n yet considered stable. We intend to provide support for other\n architectures in future versions, but the API intentionally\n architecture-specific and thus non-portable. In addition, we\n plan to develop a high-level portable SIMD package in the\n future.\n * Standard Library: New experimental runtime/secret package: The\n new runtime/secret package is available as an experiment, which\n GOEXPERIMENT=runtimesecret at build time. It provides a\n facility for securely erasing temporaries used in code that\n manipulates secret information--typically cryptographic in\n nature--such as registers, stack, new heap allocations. This\n package is intended to make it easier to ensure forward\n secrecy. It currently supports the amd64 and arm64\n architectures on Linux.\n * bytes: The new Buffer.Peek method returns the next n bytes from\n the buffer without advancing it.\n * crypto: The new Encapsulator and Decapsulator interfaces allow\n accepting abstract KEM encapsulation or decapsulation keys.\n * crypto/dsa: The random parameter to GenerateKey is now\n ignored. Instead, it now always uses a secure source of\n cryptographically random bytes. For deterministic testing, use\n the new testing/cryptotest.SetGlobalRandom function. The new\n GODEBUG setting cryptocustomrand=1 temporarily restores the old\n behavior.\n * crypto/ecdh: The random parameter to Curve.GenerateKey is now\n behavior. The new KeyExchanger interface, implemented by\n PrivateKey, makes it possible to accept abstract ECDH private\n keys, e.g. those implemented in hardware.\n * crypto/ecdsa: The big.Int fields of PublicKey and PrivateKey\n are now deprecated. The random parameter to GenerateKey,\n SignASN1, Sign, and PrivateKey.Sign is now ignored. Instead,\n they now always use a secure source of cryptographically random\n bytes. For deterministic testing, use the new\n testing/cryptotest.SetGlobalRandom function. The new GODEBUG\n setting cryptocustomrand=1 temporarily restores the old\n * crypto/ed25519: If the random parameter to GenerateKey is nil,\n GenerateKey now always uses a secure source of\n cryptographically random bytes, instead of crypto/rand.Reader\n (which could have been overridden). The new GODEBUG setting\n cryptocustomrand=1 temporarily restores the old behavior.\n * crypto/fips140: The new WithoutEnforcement and Enforced\n functions now allow running in GODEBUG=fips140=only mode while\n selectively disabling the strict FIPS 140-3 checks. Version\n returns the resolved FIPS 140-3 Go Cryptographic Module version\n when building against a frozen module with GOFIPS140.\n * crypto/mlkem: The new DecapsulationKey768.Encapsulator and\n DecapsulationKey1024.Encapsulator methods implement the new\n crypto.Decapsulator interface.\n * crypto/mlkem/mlkemtest: The new crypto/mlkem/mlkemtest package\n exposes the Encapsulate768 and Encapsulate1024 functions which\n implement derandomized ML-KEM encapsulation, for use with\n known-answer tests.\n * crypto/rand: The random parameter to Prime is now\n * crypto/rsa: The new EncryptOAEPWithOptions function allows\n specifying different hash functions for OAEP padding and MGF1\n mask generation.\n * crypto/rsa: The random parameter to GenerateKey,\n GenerateMultiPrimeKey, and EncryptPKCS1v15 is now\n ignored. Instead, they now always use a secure source of\n * crypto/rsa: If PrivateKey fields are modified after calling\n PrivateKey.Precompute, PrivateKey.Validate now fails.\n * crypto/rsa: PrivateKey.D is now checked for consistency with\n precomputed values, even if it is not used.\n * crypto/rsa: Unsafe PKCS #1 v1.5 encryption padding (implemented\n by EncryptPKCS1v15, DecryptPKCS1v15, and\n DecryptPKCS1v15SessionKey) is now deprecated.\n * crypto/subtle: The WithDataIndependentTiming function no longer\n locks the calling goroutine to the OS thread while executing\n the passed function. Additionally, any goroutines which are\n spawned during the execution of the passed function and their\n descendants now inherit the properties of\n WithDataIndependentTiming for their lifetime. This change also\n affects cgo in the following ways:\n * crypto/subtle: Any C code called via cgo from within the\n function passed to WithDataIndependentTiming, or from a\n goroutine spawned by the function passed to\n WithDataIndependentTiming and its descendants, will also have\n data independent timing enabled for the duration of the\n call. If the C code disables data independent timing, it will\n be re-enabled on return to Go.\n * crypto/subtle: If C code called via cgo, from the function\n passed to WithDataIndependentTiming or elsewhere, enables or\n disables data independent timing then calling into Go will\n preserve that state for the duration of the call.\n * crypto/tls: The hybrid SecP256r1MLKEM768 and SecP384r1MLKEM1024\n post-quantum key exchanges are now enabled by default. They can\n be disabled by setting Config.CurvePreferences or with the\n tlssecpmlkem=0 GODEBUG setting.\n * crypto/tls: The new ClientHelloInfo.HelloRetryRequest field\n indicates if the ClientHello was sent in response to a\n HelloRetryRequest message. The new\n ConnectionState.HelloRetryRequest field indicates if the server\n sent a HelloRetryRequest, or if the client received a\n HelloRetryRequest, depending on connection role.\n * crypto/tls: The QUICConn type used by QUIC implementations\n includes a new event for reporting TLS handshake errors.\n * crypto/tls: If Certificate.PrivateKey implements\n crypto.MessageSigner, its SignMessage method is used instead of\n Sign in TLS 1.2 and later.\n * crypto/tls: The following GODEBUG settings introduced in Go\n 1.22 and Go 1.23 will be removed in the next major Go\n release. Starting in Go 1.27, the new behavior will apply\n regardless of GODEBUG setting or go.mod language version.\n * crypto/tls: GODEBUG tlsunsafeekm:\n ConnectionState.ExportKeyingMaterial will require TLS 1.3 or\n Extended Master Secret.\n * crypto/tls: GODEBUG tlsrsakex: legacy RSA-only key exchanges\n without ECDH won\u0027t be enabled by default.\n * crypto/tls: GODEBUG tls10server: the default minimum TLS\n version for both clients and servers will be TLS 1.2.\n * crypto/tls: GODEBUG tls3des: the default cipher suites will not\n include 3DES.\n * crypto/tls: GODEBUG x509keypairleaf: X509KeyPair and\n LoadX509KeyPair will always populate the Certificate.Leaf\n field.\n * crypto/x509: The ExtKeyUsage and KeyUsage types now have String\n methods that return the corresponding OID names as defined in\n RFC 5280 and other registries.\n * crypto/x509: The ExtKeyUsage type now has an OID method that\n returns the corresponding OID for the EKU.\n * crypto/x509: The new OIDFromASN1OID function allows converting\n an encoding/asn1.ObjectIdentifier into an OID.\n * debug/elf: Additional R_LARCH_* constants from LoongArch ELF\n psABI v20250521 (global version v2.40) are defined for use with\n LoongArch systems.\n * errors: The new AsType function is a generic version of As. It\n is type-safe, faster, and, in most cases, easier to use.\n * fmt: For unformatted strings, fmt.Errorf(\u0027x\u0027) now allocates\n less and generally matches the allocations for errors.New(\u0027x\u0027).\n * go/ast: The new ParseDirective function parses directive\n comments, which are comments such as //go:generate. Source code\n tools can support their own directive comments and this new API\n should help them implement the conventional syntax.\n * go/ast: The new BasicLit.ValueEnd field records the precise end\n position of a literal so that the BasicLit.End method can now\n always return the correct answer. (Previously it was computed\n using a heuristic that was incorrect for multi-line raw string\n literals in Windows source files, due to removal of carriage\n returns.)\n * go/ast: Programs that update the ValuePos field of BasicLits\n produced by the parser may need to also update or clear the\n ValueEnd field to avoid minor differences in formatted output.\n * go/token: The new File.End convenience method returns the\n file\u0027s end position.\n * go/types: The gotypesalias GODEBUG setting introduced in Go\n 1.22 will be removed in the next major Go release. Starting in\n Go 1.27, the go/types package will always produce an Alias type\n for the representation of type aliases regardless of GODEBUG\n setting or go.mod language version.\n * image/jpeg: The JPEG encoder and decoder have been replaced\n with new, faster, more accurate implementations. Code that\n expects specific bit-for-bit outputs from the encoder or\n decoder may need to be updated.\n * io: ReadAll now allocates less intermediate memory and returns\n a minimally sized final slice. It is often about two times\n faster while typically allocating around half as much total\n memory, with more benefit for larger inputs.\n * log/slog: The NewMultiHandler function creates a MultiHandler\n that invokes all the given Handlers. Its Enabled method reports\n whether any of the handlers\u0027 Enabled methods return true. Its\n Handle, WithAttrs and WithGroup methods call the corresponding\n method on each of the enabled handlers.\n * net: The new Dialer methods DialIP, DialTCP, DialUDP, and\n DialUnix permit dialing specific network types with context\n values.\n * net/http: The new HTTP2Config.StrictMaxConcurrentRequests field\n controls whether a new connection should be opened if an\n existing HTTP/2 connection has exceeded its stream limit.\n * net/http: The new Transport.NewClientConn method returns a\n client connection to an HTTP server. Most users should continue\n to use Transport.RoundTrip to make requests, which manages a\n pool of connections. NewClientConn is useful for users who need\n to implement their own connection management.\n * net/http: Client now uses and sets cookies scoped to URLs with\n the host portion matching Request.Host when\n available. Previously, the connection address host was always\n used.\n * net/http/httptest: The HTTP client returned by Server.Client\n will now redirect requests for example.com and any subdomains\n to the server being tested.\n * net/http/httputil: The ReverseProxy.Director configuration\n field is deprecated in favor of ReverseProxy.Rewrite.\n * net/http/httputil: A malicious client can remove headers added\n by a Director function by designating those headers as\n hop-by-hop. Since there is no way to address this problem\n within the scope of the Director API, we added a new Rewrite\n hook in Go 1.20. Rewrite hooks are provided with both the\n unmodified inbound request received by the proxy and the\n outbound request which will be sent by the proxy. Since the\n Director hook is fundamentally unsafe, we are now deprecating\n it.\n * net/netip: The new Prefix.Compare method compares two prefixes.\n * net/url: Parse now rejects malformed URLs containing colons in\n the host subcomponent, such as http://::1/ or\n http://localhost:80:80/. URLs containing bracketed IPv6\n addresses, such as http://[::1]/ are still accepted. The new\n GODEBUG setting urlstrictcolons=0 restores the old behavior.\n * os: The new Process.WithHandle method provides access to an\n internal process handle on supported platforms (pidfd on Linux\n 5.4 or later, Handle on Windows).\n * os: On Windows, the OpenFile flag parameter can now contain any\n combination of Windows-specific file flags, such as\n FILE_FLAG_OVERLAPPED and FILE_FLAG_SEQUENTIAL_SCAN, for control\n of file or device caching behavior, access modes, and other\n special-purpose flags.\n * os/signal: NotifyContext now cancels the returned context with\n context.CancelCauseFunc and an error indicating which signal\n was received.\n * reflect: The new methods Type.Fields, Type.Methods, Type.Ins\n and Type.Outs return iterators for a type\u0027s fields (for a\n struct type), methods, inputs and outputs parameters (for a\n function type), respectively. Similarly, the new methods\n Value.Fields and Value.Methods return iterators over a value\u0027s\n fields or methods, respectively. Each iteration yields the type\n information (StructField or Method) of a field or method, along\n with the field or method Value.\n * runtime/metrics: Several new scheduler metrics have been added,\n including counts of goroutines in various states (waiting,\n runnable, etc.) under the /sched/goroutines prefix, the number\n of OS threads the runtime is aware of with\n /sched/threads:threads, and the total number of goroutines\n created by the program with\n /sched/goroutines-created:goroutines.\n * testing: The new methods T.ArtifactDir, B.ArtifactDir, and\n F.ArtifactDir return a directory in which to write test output\n files (artifacts).\n * testing: When the -artifacts flag is provided to go test, this\n directory will be located under the output directory (specified\n with -outputdir, or the current directory by\n default). Otherwise, artifacts are stored in a temporary\n directory which is removed after the test completes.\n * testing: The first call to ArtifactDir when -artifacts is\n provided writes the location of the directory to the test log.\n * testing: The B.Loop method no longer prevents inlining in the\n loop body, which could lead to unanticipated allocation and\n slower benchmarks. With this fix, we expect that all benchmarks\n can be converted from the old B.N style to the new B.Loop style\n with no ill effects. Within the body of a for b.Loop() { ... }\n loop, function call parameters, results, and assigned variables\n are still kept alive, preventing the compiler from optimizing\n away entire parts of the benchmark.\n * testing/cryptotest: The new SetGlobalRandom function configures\n a global, deterministic cryptographic randomness source for the\n duration of the test. It affects crypto/rand, and all implicit\n sources of cryptographic randomness in the crypto/... packages.\n * time: The asynctimerchan GODEBUG setting introduced in Go 1.23\n will be removed in the next major Go release. Starting in Go\n 1.27, the time package will always use unbuffered (synchronous)\n channels for timers regardless of GODEBUG setting or go.mod\n language version.\n * Ports: Darwin: Go 1.26 is the last release that will run on\n macOS 12 Monterey. Go 1.27 will require macOS 13 Ventura or\n later.\n * Ports: FreeBSD: The freebsd/riscv64 port (GOOS=freebsd\n GOARCH=riscv64) has been marked broken. See issue 76475 for\n details.\n * Ports: Windows: As announced in the Go 1.25 release notes, the\n broken 32-bit windows/arm port (GOOS=windows GOARCH=arm) has\n been removed.\n * Ports: PowerPC: Go 1.26 is the last release that supports the\n ELFv1 ABI on the big-endian 64-bit PowerPC port on Linux\n (GOOS=linux GOARCH=ppc64). It will switch to the ELFv2 ABI in\n Go 1.27. As the port does not currently support linking against\n other ELF objects, we expect this change to be transparent to\n users.\n * Ports: RISC-V: The linux/riscv64 port now supports the race\n detector.\n * Ports: S390X: The s390x port now supports passing function\n arguments and results using registers.\n * Ports: WebAssembly: The compiler now unconditionally makes use\n of the sign extension and non-trapping floating-point to\n integer conversion instructions. These features have been\n standardized since at least Wasm 2.0. The corresponding GOWASM\n settings, signext and satconv, are now ignored.\n * Ports: WebAssembly: For WebAssembly applications, the runtime\n now manages chunks of heap memory in much smaller increments,\n leading to significantly reduced memory usage for applications\n with heaps less than around 16 MiB in size.\n- go1.26rc3 (released 2026-02-04) is a release candidate version of\n go1.26 cut from the master branch at the revision tagged\n go1.26rc3.\n- go1.26rc2 (released 2026-01-15) is a release candidate version of\n go1.26rc2.\n * go1.26 requires go1.24.6 or later for bootstrap.\n- go1.26rc1 (released 2025-12-16) is a release candidate version of\n go1.26rc1.\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2026-993,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-993,SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-993,SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-993,SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-993,SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-993,SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-993,SUSE-SLE-Product-SLES_SAP-15-SP4-2026-993,SUSE-SLE-Product-SLES_SAP-15-SP5-2026-993",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_0993-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:0993-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260993-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:0993-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024870.html"
},
{
"category": "self",
"summary": "SUSE Bug 1255111",
"url": "https://bugzilla.suse.com/1255111"
},
{
"category": "self",
"summary": "SUSE Bug 1259264",
"url": "https://bugzilla.suse.com/1259264"
},
{
"category": "self",
"summary": "SUSE Bug 1259265",
"url": "https://bugzilla.suse.com/1259265"
},
{
"category": "self",
"summary": "SUSE Bug 1259266",
"url": "https://bugzilla.suse.com/1259266"
},
{
"category": "self",
"summary": "SUSE Bug 1259267",
"url": "https://bugzilla.suse.com/1259267"
},
{
"category": "self",
"summary": "SUSE Bug 1259268",
"url": "https://bugzilla.suse.com/1259268"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-25679 page",
"url": "https://www.suse.com/security/cve/CVE-2026-25679/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-27137 page",
"url": "https://www.suse.com/security/cve/CVE-2026-27137/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-27138 page",
"url": "https://www.suse.com/security/cve/CVE-2026-27138/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-27139 page",
"url": "https://www.suse.com/security/cve/CVE-2026-27139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-27142 page",
"url": "https://www.suse.com/security/cve/CVE-2026-27142/"
}
],
"title": "Security update for go1.26-openssl",
"tracking": {
"current_release_date": "2026-03-24T08:54:50Z",
"generator": {
"date": "2026-03-24T08:54:50Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:0993-1",
"initial_release_date": "2026-03-24T08:54:50Z",
"revision_history": [
{
"date": "2026-03-24T08:54:50Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "go1.26-openssl-1.26.1-150000.1.3.1.aarch64",
"product": {
"name": "go1.26-openssl-1.26.1-150000.1.3.1.aarch64",
"product_id": "go1.26-openssl-1.26.1-150000.1.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.26-openssl-doc-1.26.1-150000.1.3.1.aarch64",
"product": {
"name": "go1.26-openssl-doc-1.26.1-150000.1.3.1.aarch64",
"product_id": "go1.26-openssl-doc-1.26.1-150000.1.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.26-openssl-race-1.26.1-150000.1.3.1.aarch64",
"product": {
"name": "go1.26-openssl-race-1.26.1-150000.1.3.1.aarch64",
"product_id": "go1.26-openssl-race-1.26.1-150000.1.3.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.26-openssl-1.26.1-150000.1.3.1.i586",
"product": {
"name": "go1.26-openssl-1.26.1-150000.1.3.1.i586",
"product_id": "go1.26-openssl-1.26.1-150000.1.3.1.i586"
}
},
{
"category": "product_version",
"name": "go1.26-openssl-doc-1.26.1-150000.1.3.1.i586",
"product": {
"name": "go1.26-openssl-doc-1.26.1-150000.1.3.1.i586",
"product_id": "go1.26-openssl-doc-1.26.1-150000.1.3.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.26-openssl-1.26.1-150000.1.3.1.ppc64le",
"product": {
"name": "go1.26-openssl-1.26.1-150000.1.3.1.ppc64le",
"product_id": "go1.26-openssl-1.26.1-150000.1.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.26-openssl-doc-1.26.1-150000.1.3.1.ppc64le",
"product": {
"name": "go1.26-openssl-doc-1.26.1-150000.1.3.1.ppc64le",
"product_id": "go1.26-openssl-doc-1.26.1-150000.1.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.26-openssl-race-1.26.1-150000.1.3.1.ppc64le",
"product": {
"name": "go1.26-openssl-race-1.26.1-150000.1.3.1.ppc64le",
"product_id": "go1.26-openssl-race-1.26.1-150000.1.3.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.26-openssl-1.26.1-150000.1.3.1.s390x",
"product": {
"name": "go1.26-openssl-1.26.1-150000.1.3.1.s390x",
"product_id": "go1.26-openssl-1.26.1-150000.1.3.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.26-openssl-doc-1.26.1-150000.1.3.1.s390x",
"product": {
"name": "go1.26-openssl-doc-1.26.1-150000.1.3.1.s390x",
"product_id": "go1.26-openssl-doc-1.26.1-150000.1.3.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.26-openssl-race-1.26.1-150000.1.3.1.s390x",
"product": {
"name": "go1.26-openssl-race-1.26.1-150000.1.3.1.s390x",
"product_id": "go1.26-openssl-race-1.26.1-150000.1.3.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"product": {
"name": "go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"product_id": "go1.26-openssl-1.26.1-150000.1.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"product": {
"name": "go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"product_id": "go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"product": {
"name": "go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"product_id": "go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-1.26.1-150000.1.3.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.1-150000.1.3.1.aarch64"
},
"product_reference": "go1.26-openssl-1.26.1-150000.1.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-1.26.1-150000.1.3.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.1-150000.1.3.1.x86_64"
},
"product_reference": "go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-doc-1.26.1-150000.1.3.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.1-150000.1.3.1.aarch64"
},
"product_reference": "go1.26-openssl-doc-1.26.1-150000.1.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64"
},
"product_reference": "go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-race-1.26.1-150000.1.3.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.1-150000.1.3.1.aarch64"
},
"product_reference": "go1.26-openssl-race-1.26.1-150000.1.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64"
},
"product_reference": "go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-1.26.1-150000.1.3.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.aarch64"
},
"product_reference": "go1.26-openssl-1.26.1-150000.1.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-1.26.1-150000.1.3.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.x86_64"
},
"product_reference": "go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-doc-1.26.1-150000.1.3.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.aarch64"
},
"product_reference": "go1.26-openssl-doc-1.26.1-150000.1.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64"
},
"product_reference": "go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-race-1.26.1-150000.1.3.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.aarch64"
},
"product_reference": "go1.26-openssl-race-1.26.1-150000.1.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64"
},
"product_reference": "go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-1.26.1-150000.1.3.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.1-150000.1.3.1.aarch64"
},
"product_reference": "go1.26-openssl-1.26.1-150000.1.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-1.26.1-150000.1.3.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.1-150000.1.3.1.x86_64"
},
"product_reference": "go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-doc-1.26.1-150000.1.3.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.1-150000.1.3.1.aarch64"
},
"product_reference": "go1.26-openssl-doc-1.26.1-150000.1.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64"
},
"product_reference": "go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-race-1.26.1-150000.1.3.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.1-150000.1.3.1.aarch64"
},
"product_reference": "go1.26-openssl-race-1.26.1-150000.1.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64"
},
"product_reference": "go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-1.26.1-150000.1.3.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.aarch64"
},
"product_reference": "go1.26-openssl-1.26.1-150000.1.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-1.26.1-150000.1.3.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.x86_64"
},
"product_reference": "go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-doc-1.26.1-150000.1.3.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.aarch64"
},
"product_reference": "go1.26-openssl-doc-1.26.1-150000.1.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64"
},
"product_reference": "go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-race-1.26.1-150000.1.3.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.aarch64"
},
"product_reference": "go1.26-openssl-race-1.26.1-150000.1.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64"
},
"product_reference": "go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-1.26.1-150000.1.3.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.aarch64"
},
"product_reference": "go1.26-openssl-1.26.1-150000.1.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-1.26.1-150000.1.3.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.ppc64le"
},
"product_reference": "go1.26-openssl-1.26.1-150000.1.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-1.26.1-150000.1.3.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.s390x"
},
"product_reference": "go1.26-openssl-1.26.1-150000.1.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-1.26.1-150000.1.3.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.x86_64"
},
"product_reference": "go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-doc-1.26.1-150000.1.3.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.aarch64"
},
"product_reference": "go1.26-openssl-doc-1.26.1-150000.1.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-doc-1.26.1-150000.1.3.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.ppc64le"
},
"product_reference": "go1.26-openssl-doc-1.26.1-150000.1.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-doc-1.26.1-150000.1.3.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.s390x"
},
"product_reference": "go1.26-openssl-doc-1.26.1-150000.1.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64"
},
"product_reference": "go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-race-1.26.1-150000.1.3.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.aarch64"
},
"product_reference": "go1.26-openssl-race-1.26.1-150000.1.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-race-1.26.1-150000.1.3.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.ppc64le"
},
"product_reference": "go1.26-openssl-race-1.26.1-150000.1.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-race-1.26.1-150000.1.3.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.s390x"
},
"product_reference": "go1.26-openssl-race-1.26.1-150000.1.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64"
},
"product_reference": "go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-1.26.1-150000.1.3.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.aarch64"
},
"product_reference": "go1.26-openssl-1.26.1-150000.1.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-1.26.1-150000.1.3.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.ppc64le"
},
"product_reference": "go1.26-openssl-1.26.1-150000.1.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-1.26.1-150000.1.3.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.s390x"
},
"product_reference": "go1.26-openssl-1.26.1-150000.1.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-1.26.1-150000.1.3.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.x86_64"
},
"product_reference": "go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-doc-1.26.1-150000.1.3.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.aarch64"
},
"product_reference": "go1.26-openssl-doc-1.26.1-150000.1.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-doc-1.26.1-150000.1.3.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.ppc64le"
},
"product_reference": "go1.26-openssl-doc-1.26.1-150000.1.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-doc-1.26.1-150000.1.3.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.s390x"
},
"product_reference": "go1.26-openssl-doc-1.26.1-150000.1.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64"
},
"product_reference": "go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-race-1.26.1-150000.1.3.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.aarch64"
},
"product_reference": "go1.26-openssl-race-1.26.1-150000.1.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-race-1.26.1-150000.1.3.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.ppc64le"
},
"product_reference": "go1.26-openssl-race-1.26.1-150000.1.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-race-1.26.1-150000.1.3.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.s390x"
},
"product_reference": "go1.26-openssl-race-1.26.1-150000.1.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64"
},
"product_reference": "go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-1.26.1-150000.1.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.1-150000.1.3.1.ppc64le"
},
"product_reference": "go1.26-openssl-1.26.1-150000.1.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-1.26.1-150000.1.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.1-150000.1.3.1.x86_64"
},
"product_reference": "go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-doc-1.26.1-150000.1.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.1-150000.1.3.1.ppc64le"
},
"product_reference": "go1.26-openssl-doc-1.26.1-150000.1.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64"
},
"product_reference": "go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-race-1.26.1-150000.1.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.1-150000.1.3.1.ppc64le"
},
"product_reference": "go1.26-openssl-race-1.26.1-150000.1.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64"
},
"product_reference": "go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-1.26.1-150000.1.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.1-150000.1.3.1.ppc64le"
},
"product_reference": "go1.26-openssl-1.26.1-150000.1.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-1.26.1-150000.1.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.1-150000.1.3.1.x86_64"
},
"product_reference": "go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-doc-1.26.1-150000.1.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.1-150000.1.3.1.ppc64le"
},
"product_reference": "go1.26-openssl-doc-1.26.1-150000.1.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64"
},
"product_reference": "go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-race-1.26.1-150000.1.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.1-150000.1.3.1.ppc64le"
},
"product_reference": "go1.26-openssl-race-1.26.1-150000.1.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64"
},
"product_reference": "go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-25679",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-25679"
}
],
"notes": [
{
"category": "general",
"text": "url.Parse insufficiently validated the host/authority component and accepted some invalid URLs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-25679",
"url": "https://www.suse.com/security/cve/CVE-2026-25679"
},
{
"category": "external",
"summary": "SUSE Bug 1259264 for CVE-2026-25679",
"url": "https://bugzilla.suse.com/1259264"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-24T08:54:50Z",
"details": "moderate"
}
],
"title": "CVE-2026-25679"
},
{
"cve": "CVE-2026-27137",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-27137"
}
],
"notes": [
{
"category": "general",
"text": "When verifying a certificate chain which contains a certificate containing multiple email address constraints which share common local portions but different domain portions, these constraints will not be properly applied, and only the last constraint will be considered.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-27137",
"url": "https://www.suse.com/security/cve/CVE-2026-27137"
},
{
"category": "external",
"summary": "SUSE Bug 1259266 for CVE-2026-27137",
"url": "https://bugzilla.suse.com/1259266"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-24T08:54:50Z",
"details": "moderate"
}
],
"title": "CVE-2026-27137"
},
{
"cve": "CVE-2026-27138",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-27138"
}
],
"notes": [
{
"category": "general",
"text": "Certificate verification can panic when a certificate in the chain has an empty DNS name and another certificate in the chain has excluded name constraints. This can crash programs that are either directly verifying X.509 certificate chains, or those that use TLS.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-27138",
"url": "https://www.suse.com/security/cve/CVE-2026-27138"
},
{
"category": "external",
"summary": "SUSE Bug 1259267 for CVE-2026-27138",
"url": "https://bugzilla.suse.com/1259267"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-24T08:54:50Z",
"details": "important"
}
],
"title": "CVE-2026-27138"
},
{
"cve": "CVE-2026-27139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-27139"
}
],
"notes": [
{
"category": "general",
"text": "On Unix platforms, when listing the contents of a directory using File.ReadDir or File.Readdir the returned FileInfo could reference a file outside of the Root in which the File was opened. The impact of this escape is limited to reading metadata provided by lstat from arbitrary locations on the filesystem without permitting reading or writing files outside the root.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-27139",
"url": "https://www.suse.com/security/cve/CVE-2026-27139"
},
{
"category": "external",
"summary": "SUSE Bug 1259268 for CVE-2026-27139",
"url": "https://bugzilla.suse.com/1259268"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-24T08:54:50Z",
"details": "moderate"
}
],
"title": "CVE-2026-27139"
},
{
"cve": "CVE-2026-27142",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-27142"
}
],
"notes": [
{
"category": "general",
"text": "Actions which insert URLs into the content attribute of HTML meta tags are not escaped. This can allow XSS if the meta tag also has an http-equiv attribute with the value \"refresh\". A new GODEBUG setting has been added, htmlmetacontenturlescape, which can be used to disable escaping URLs in actions in the meta content attribute which follow \"url=\" by setting htmlmetacontenturlescape=0.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-27142",
"url": "https://www.suse.com/security/cve/CVE-2026-27142"
},
{
"category": "external",
"summary": "SUSE Bug 1259265 for CVE-2026-27142",
"url": "https://bugzilla.suse.com/1259265"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.1-150000.1.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.1-150000.1.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.1-150000.1.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-24T08:54:50Z",
"details": "moderate"
}
],
"title": "CVE-2026-27142"
}
]
}
CERTFR-2026-AVI-0326
Vulnerability from certfr_avis - Published: 2026-03-20 - Updated: 2026-03-20
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Platform | Isolation Segmentation pour VMware Tanzu Platform versions antérieures à 6.0.26+LTS-T | ||
| VMware | Tanzu Platform | Isolation Segmentation pour VMware Tanzu Platform versions antérieures à 10.3.6 | ||
| VMware | Tanzu Platform | App Autoscaler CLI Plugin pour VMware Tanzu Platform versions antérieures à 250.6.9 | ||
| VMware | N/A | Python Buildpack versions antérieures à 1.8.83 | ||
| VMware | Tanzu Platform | Tanzu Platform versions antérieures à 3.1.9 | ||
| VMware | Tanzu Platform | Tanzu RabbitMQ sur Tanzu Platform versions antérieures à 2.4.4 | ||
| VMware | N/A | PHP Buildpack versions antérieures à 4.6.69 | ||
| VMware | Tanzu Platform | Tanzu Platform versions antérieures à 3.2.5 | ||
| VMware | Tanzu Platform | Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions antérieures à 10.2.9+LTS-T | ||
| VMware | Tanzu Platform | App Autoscaler CLI Plugin pour VMware Tanzu Platform versions antérieures à 250.5.17 | ||
| VMware | Tanzu Platform | Tanzu RabbitMQ pour Tanzu Platform versions antérieures à 10.1.2 | ||
| VMware | Tanzu Platform | Tanzu Platform versions antérieures à 2.4.6 | ||
| VMware | Tanzu Platform | Tanzu Platform versions antérieures à 1.16.18 | ||
| VMware | Tanzu Platform | Tanzu for Valkey sur Tanzu Platform versions antérieures à 10.2.2 | ||
| VMware | Tanzu Platform | Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions antérieures à 6.0.26+LTS-T | ||
| VMware | Tanzu Platform | Isolation Segmentation pour VMware Tanzu Platform versions antérieures à 10.2.9+LTS-T | ||
| VMware | Tanzu Platform | Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions antérieures à 10.3.6 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Isolation Segmentation pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 6.0.26+LTS-T",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Isolation Segmentation pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.3.6",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "App Autoscaler CLI Plugin pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 250.6.9",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Python Buildpack versions ant\u00e9rieures \u00e0 1.8.83",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions ant\u00e9rieures \u00e0 3.1.9",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu RabbitMQ sur Tanzu Platform versions ant\u00e9rieures \u00e0 2.4.4",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "PHP Buildpack versions ant\u00e9rieures \u00e0 4.6.69",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions ant\u00e9rieures \u00e0 3.2.5",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.2.9+LTS-T",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "App Autoscaler CLI Plugin pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 250.5.17",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu RabbitMQ pour Tanzu Platform versions ant\u00e9rieures \u00e0 10.1.2",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions ant\u00e9rieures \u00e0 2.4.6",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions ant\u00e9rieures \u00e0 1.16.18",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu for Valkey sur Tanzu Platform versions ant\u00e9rieures \u00e0 10.2.2",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 6.0.26+LTS-T",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Isolation Segmentation pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.2.9+LTS-T",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.3.6",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2026-28422",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28422"
},
{
"name": "CVE-2024-36903",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36903"
},
{
"name": "CVE-2024-35875",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35875"
},
{
"name": "CVE-2022-50759",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50759"
},
{
"name": "CVE-2026-26007",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26007"
},
{
"name": "CVE-2025-71075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71075"
},
{
"name": "CVE-2024-49912",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49912"
},
{
"name": "CVE-2024-36026",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36026"
},
{
"name": "CVE-2026-23198",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23198"
},
{
"name": "CVE-2023-3640",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3640"
},
{
"name": "CVE-2024-27435",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27435"
},
{
"name": "CVE-2025-40273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40273"
},
{
"name": "CVE-2023-53714",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53714"
},
{
"name": "CVE-2024-42122",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42122"
},
{
"name": "CVE-2025-68230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68230"
},
{
"name": "CVE-2026-28420",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28420"
},
{
"name": "CVE-2022-49069",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49069"
},
{
"name": "CVE-2024-57875",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57875"
},
{
"name": "CVE-2022-27943",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27943"
},
{
"name": "CVE-2025-40064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40064"
},
{
"name": "CVE-2023-54129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54129"
},
{
"name": "CVE-2025-66865",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66865"
},
{
"name": "CVE-2024-41031",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41031"
},
{
"name": "CVE-2025-39992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39992"
},
{
"name": "CVE-2025-69534",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69534"
},
{
"name": "CVE-2025-61730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61730"
},
{
"name": "CVE-2022-49543",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49543"
},
{
"name": "CVE-2026-23202",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23202"
},
{
"name": "CVE-2025-38485",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38485"
},
{
"name": "CVE-2023-53562",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53562"
},
{
"name": "CVE-2025-68324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68324"
},
{
"name": "CVE-2025-22026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22026"
},
{
"name": "CVE-2023-54149",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54149"
},
{
"name": "CVE-2025-71086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71086"
},
{
"name": "CVE-2024-50063",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50063"
},
{
"name": "CVE-2023-33875",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33875"
},
{
"name": "CVE-2024-41001",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41001"
},
{
"name": "CVE-2024-42155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42155"
},
{
"name": "CVE-2026-23167",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23167"
},
{
"name": "CVE-2025-36353",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36353"
},
{
"name": "CVE-2025-68196",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68196"
},
{
"name": "CVE-2024-46770",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46770"
},
{
"name": "CVE-2023-53247",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53247"
},
{
"name": "CVE-2025-38042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38042"
},
{
"name": "CVE-2025-22083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22083"
},
{
"name": "CVE-2023-53829",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53829"
},
{
"name": "CVE-2025-58183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58183"
},
{
"name": "CVE-2025-59830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59830"
},
{
"name": "CVE-2023-54002",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54002"
},
{
"name": "CVE-2022-50550",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50550"
},
{
"name": "CVE-2022-0400",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0400"
},
{
"name": "CVE-2022-49138",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49138"
},
{
"name": "CVE-2025-66199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66199"
},
{
"name": "CVE-2024-42239",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42239"
},
{
"name": "CVE-2022-49359",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49359"
},
{
"name": "CVE-2025-68342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68342"
},
{
"name": "CVE-2022-48673",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48673"
},
{
"name": "CVE-2022-50425",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50425"
},
{
"name": "CVE-2025-38201",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38201"
},
{
"name": "CVE-2024-39293",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39293"
},
{
"name": "CVE-2023-53008",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53008"
},
{
"name": "CVE-2025-38669",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38669"
},
{
"name": "CVE-2025-40137",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40137"
},
{
"name": "CVE-2023-54052",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54052"
},
{
"name": "CVE-2025-22107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22107"
},
{
"name": "CVE-2024-38306",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38306"
},
{
"name": "CVE-2023-53733",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53733"
},
{
"name": "CVE-2025-37775",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37775"
},
{
"name": "CVE-2025-21682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21682"
},
{
"name": "CVE-2023-1386",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1386"
},
{
"name": "CVE-2024-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35939"
},
{
"name": "CVE-2024-39298",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39298"
},
{
"name": "CVE-2024-56703",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56703"
},
{
"name": "CVE-2026-23098",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23098"
},
{
"name": "CVE-2023-53347",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53347"
},
{
"name": "CVE-2023-28374",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28374"
},
{
"name": "CVE-2023-52926",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52926"
},
{
"name": "CVE-2026-32597",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32597"
},
{
"name": "CVE-2025-68286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68286"
},
{
"name": "CVE-2025-9231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9231"
},
{
"name": "CVE-2024-36921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36921"
},
{
"name": "CVE-2025-40057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40057"
},
{
"name": "CVE-2024-41050",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41050"
},
{
"name": "CVE-2026-25500",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25500"
},
{
"name": "CVE-2024-26656",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26656"
},
{
"name": "CVE-2025-38520",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38520"
},
{
"name": "CVE-2025-27558",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27558"
},
{
"name": "CVE-2025-71094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71094"
},
{
"name": "CVE-2026-21637",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21637"
},
{
"name": "CVE-2024-35998",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35998"
},
{
"name": "CVE-2024-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37891"
},
{
"name": "CVE-2021-0076",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0076"
},
{
"name": "CVE-2025-68788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68788"
},
{
"name": "CVE-2024-58237",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58237"
},
{
"name": "CVE-2024-36909",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36909"
},
{
"name": "CVE-2024-42147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42147"
},
{
"name": "CVE-2023-53529",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53529"
},
{
"name": "CVE-2024-50028",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50028"
},
{
"name": "CVE-2023-53042",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53042"
},
{
"name": "CVE-2022-50527",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50527"
},
{
"name": "CVE-2023-54280",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54280"
},
{
"name": "CVE-2025-21786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21786"
},
{
"name": "CVE-2024-58094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58094"
},
{
"name": "CVE-2024-11187",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11187"
},
{
"name": "CVE-2025-52534",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52534"
},
{
"name": "CVE-2025-40314",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40314"
},
{
"name": "CVE-2024-46705",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46705"
},
{
"name": "CVE-2022-50407",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50407"
},
{
"name": "CVE-2026-23196",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23196"
},
{
"name": "CVE-2024-26595",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26595"
},
{
"name": "CVE-2022-23825",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23825"
},
{
"name": "CVE-2024-45775",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45775"
},
{
"name": "CVE-2025-40306",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40306"
},
{
"name": "CVE-2025-21881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21881"
},
{
"name": "CVE-2022-49901",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49901"
},
{
"name": "CVE-2026-23126",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23126"
},
{
"name": "CVE-2025-38329",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38329"
},
{
"name": "CVE-2021-33096",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33096"
},
{
"name": "CVE-2022-50230",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50230"
},
{
"name": "CVE-2024-35949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35949"
},
{
"name": "CVE-2025-39947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39947"
},
{
"name": "CVE-2025-68778",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68778"
},
{
"name": "CVE-2023-53588",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53588"
},
{
"name": "CVE-2024-41082",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41082"
},
{
"name": "CVE-2023-53685",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53685"
},
{
"name": "CVE-2025-5222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5222"
},
{
"name": "CVE-2025-23155",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23155"
},
{
"name": "CVE-2026-23054",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23054"
},
{
"name": "CVE-2025-37870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37870"
},
{
"name": "CVE-2025-40254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40254"
},
{
"name": "CVE-2022-49533",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49533"
},
{
"name": "CVE-2024-42253",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42253"
},
{
"name": "CVE-2020-26557",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26557"
},
{
"name": "CVE-2025-71064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71064"
},
{
"name": "CVE-2023-54201",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54201"
},
{
"name": "CVE-2021-33114",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33114"
},
{
"name": "CVE-2025-69645",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69645"
},
{
"name": "CVE-2025-68200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68200"
},
{
"name": "CVE-2022-49518",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49518"
},
{
"name": "CVE-2024-56727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56727"
},
{
"name": "CVE-2022-49125",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49125"
},
{
"name": "CVE-2024-36900",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36900"
},
{
"name": "CVE-2025-38501",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38501"
},
{
"name": "CVE-2024-26866",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26866"
},
{
"name": "CVE-2024-27010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27010"
},
{
"name": "CVE-2025-27516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27516"
},
{
"name": "CVE-2025-68736",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68736"
},
{
"name": "CVE-2023-52561",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52561"
},
{
"name": "CVE-2025-68725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68725"
},
{
"name": "CVE-2024-3220",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3220"
},
{
"name": "CVE-2024-53221",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53221"
},
{
"name": "CVE-2024-41069",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41069"
},
{
"name": "CVE-2025-68176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68176"
},
{
"name": "CVE-2025-37777",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37777"
},
{
"name": "CVE-2021-47432",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47432"
},
{
"name": "CVE-2026-24734",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24734"
},
{
"name": "CVE-2025-68204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68204"
},
{
"name": "CVE-2024-35878",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35878"
},
{
"name": "CVE-2023-53362",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53362"
},
{
"name": "CVE-2025-68795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68795"
},
{
"name": "CVE-2025-68349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68349"
},
{
"name": "CVE-2024-26756",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26756"
},
{
"name": "CVE-2022-50815",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50815"
},
{
"name": "CVE-2025-21931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21931"
},
{
"name": "CVE-2025-39826",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39826"
},
{
"name": "CVE-2025-38036",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38036"
},
{
"name": "CVE-2025-2668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2668"
},
{
"name": "CVE-2025-71221",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71221"
},
{
"name": "CVE-2025-37778",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37778"
},
{
"name": "CVE-2025-39716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39716"
},
{
"name": "CVE-2024-46860",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46860"
},
{
"name": "CVE-2025-22040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22040"
},
{
"name": "CVE-2024-53095",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53095"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2025-8277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8277"
},
{
"name": "CVE-2025-8941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8941"
},
{
"name": "CVE-2022-38457",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38457"
},
{
"name": "CVE-2024-56665",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56665"
},
{
"name": "CVE-2025-38340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38340"
},
{
"name": "CVE-2025-38109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38109"
},
{
"name": "CVE-2023-53629",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53629"
},
{
"name": "CVE-2022-50178",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50178"
},
{
"name": "CVE-2025-39779",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39779"
},
{
"name": "CVE-2025-66866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66866"
},
{
"name": "CVE-2025-68283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68283"
},
{
"name": "CVE-2023-7216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7216"
},
{
"name": "CVE-2025-66614",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66614"
},
{
"name": "CVE-2025-37880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37880"
},
{
"name": "CVE-2025-36427",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36427"
},
{
"name": "CVE-2026-23217",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23217"
},
{
"name": "CVE-2025-15469",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15469"
},
{
"name": "CVE-2025-37833",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37833"
},
{
"name": "CVE-2025-39761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39761"
},
{
"name": "CVE-2024-38608",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38608"
},
{
"name": "CVE-2025-68246",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68246"
},
{
"name": "CVE-2025-68339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68339"
},
{
"name": "CVE-2025-40287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40287"
},
{
"name": "CVE-2023-53320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53320"
},
{
"name": "CVE-2024-44961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44961"
},
{
"name": "CVE-2026-23069",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23069"
},
{
"name": "CVE-2025-21656",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21656"
},
{
"name": "CVE-2024-46835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46835"
},
{
"name": "CVE-2025-69650",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69650"
},
{
"name": "CVE-2022-50554",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50554"
},
{
"name": "CVE-2023-53509",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53509"
},
{
"name": "CVE-2023-53421",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53421"
},
{
"name": "CVE-2025-11731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11731"
},
{
"name": "CVE-2026-22992",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22992"
},
{
"name": "CVE-2024-52005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52005"
},
{
"name": "CVE-2024-46775",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46775"
},
{
"name": "CVE-2025-39764",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39764"
},
{
"name": "CVE-2025-38207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38207"
},
{
"name": "CVE-2022-49465",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49465"
},
{
"name": "CVE-2026-23004",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23004"
},
{
"name": "CVE-2024-26807",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26807"
},
{
"name": "CVE-2025-39720",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39720"
},
{
"name": "CVE-2023-54271",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54271"
},
{
"name": "CVE-2022-49742",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49742"
},
{
"name": "CVE-2025-71191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71191"
},
{
"name": "CVE-2025-68295",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68295"
},
{
"name": "CVE-2025-68728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68728"
},
{
"name": "CVE-2025-40780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40780"
},
{
"name": "CVE-2025-68364",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68364"
},
{
"name": "CVE-2024-42118",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42118"
},
{
"name": "CVE-2025-40100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40100"
},
{
"name": "CVE-2026-1965",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1965"
},
{
"name": "CVE-2024-52560",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52560"
},
{
"name": "CVE-2024-56604",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56604"
},
{
"name": "CVE-2026-23227",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23227"
},
{
"name": "CVE-2025-71087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71087"
},
{
"name": "CVE-2023-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37920"
},
{
"name": "CVE-2023-52653",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52653"
},
{
"name": "CVE-2025-40285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40285"
},
{
"name": "CVE-2023-52508",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52508"
},
{
"name": "CVE-2025-69647",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69647"
},
{
"name": "CVE-2025-39827",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39827"
},
{
"name": "CVE-2024-50014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50014"
},
{
"name": "CVE-2022-49108",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49108"
},
{
"name": "CVE-2024-56677",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56677"
},
{
"name": "CVE-2025-38717",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38717"
},
{
"name": "CVE-2026-3497",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3497"
},
{
"name": "CVE-2025-22019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22019"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2025-40208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40208"
},
{
"name": "CVE-2025-39746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39746"
},
{
"name": "CVE-2024-26767",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26767"
},
{
"name": "CVE-2025-21872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21872"
},
{
"name": "CVE-2026-2219",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2219"
},
{
"name": "CVE-2025-68287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68287"
},
{
"name": "CVE-2025-40039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40039"
},
{
"name": "CVE-2025-38208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38208"
},
{
"name": "CVE-2024-35926",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35926"
},
{
"name": "CVE-2024-27389",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27389"
},
{
"name": "CVE-2024-26983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26983"
},
{
"name": "CVE-2022-50627",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50627"
},
{
"name": "CVE-2024-50285",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50285"
},
{
"name": "CVE-2025-38099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38099"
},
{
"name": "CVE-2025-38524",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38524"
},
{
"name": "CVE-2025-38029",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38029"
},
{
"name": "CVE-2022-49123",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49123"
},
{
"name": "CVE-2024-50289",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50289"
},
{
"name": "CVE-2023-53258",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53258"
},
{
"name": "CVE-2024-46813",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46813"
},
{
"name": "CVE-2024-38594",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38594"
},
{
"name": "CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"name": "CVE-2024-47658",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47658"
},
{
"name": "CVE-2022-41409",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41409"
},
{
"name": "CVE-2025-38096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38096"
},
{
"name": "CVE-2024-48873",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-48873"
},
{
"name": "CVE-2025-68746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68746"
},
{
"name": "CVE-2024-12797",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12797"
},
{
"name": "CVE-2023-53429",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53429"
},
{
"name": "CVE-2024-46765",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46765"
},
{
"name": "CVE-2022-50380",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50380"
},
{
"name": "CVE-2025-12084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12084"
},
{
"name": "CVE-2025-38039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38039"
},
{
"name": "CVE-2022-48990",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48990"
},
{
"name": "CVE-2024-24864",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24864"
},
{
"name": "CVE-2024-35832",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35832"
},
{
"name": "CVE-2024-36479",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36479"
},
{
"name": "CVE-2025-71133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71133"
},
{
"name": "CVE-2026-23220",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23220"
},
{
"name": "CVE-2024-45782",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45782"
},
{
"name": "CVE-2022-50785",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50785"
},
{
"name": "CVE-2025-39745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39745"
},
{
"name": "CVE-2024-35799",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35799"
},
{
"name": "CVE-2025-40103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40103"
},
{
"name": "CVE-2026-23020",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23020"
},
{
"name": "CVE-2025-38595",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38595"
},
{
"name": "CVE-2025-71223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71223"
},
{
"name": "CVE-2025-36098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36098"
},
{
"name": "CVE-2025-68796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68796"
},
{
"name": "CVE-2025-40016",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40016"
},
{
"name": "CVE-2023-53765",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53765"
},
{
"name": "CVE-2025-38626",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38626"
},
{
"name": "CVE-2025-40356",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40356"
},
{
"name": "CVE-2026-1642",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1642"
},
{
"name": "CVE-2025-45582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45582"
},
{
"name": "CVE-2023-53325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53325"
},
{
"name": "CVE-2025-21752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21752"
},
{
"name": "CVE-2026-27138",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27138"
},
{
"name": "CVE-2025-40312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40312"
},
{
"name": "CVE-2025-37852",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37852"
},
{
"name": "CVE-2025-68220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68220"
},
{
"name": "CVE-2025-22125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22125"
},
{
"name": "CVE-2019-6293",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6293"
},
{
"name": "CVE-2024-26953",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26953"
},
{
"name": "CVE-2024-39282",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39282"
},
{
"name": "CVE-2025-21738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21738"
},
{
"name": "CVE-2023-50868",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50868"
},
{
"name": "CVE-2025-68302",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68302"
},
{
"name": "CVE-2024-50146",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50146"
},
{
"name": "CVE-2025-68238",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68238"
},
{
"name": "CVE-2024-56709",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56709"
},
{
"name": "CVE-2025-38063",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38063"
},
{
"name": "CVE-2025-68297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68297"
},
{
"name": "CVE-2024-40975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40975"
},
{
"name": "CVE-2025-68175",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68175"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2023-54227",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54227"
},
{
"name": "CVE-2023-46316",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46316"
},
{
"name": "CVE-2024-47866",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47866"
},
{
"name": "CVE-2024-44970",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44970"
},
{
"name": "CVE-2022-49476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49476"
},
{
"name": "CVE-2023-53855",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53855"
},
{
"name": "CVE-2026-23208",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23208"
},
{
"name": "CVE-2025-68804",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68804"
},
{
"name": "CVE-2025-39925",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39925"
},
{
"name": "CVE-2025-68769",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68769"
},
{
"name": "CVE-2024-50286",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50286"
},
{
"name": "CVE-2025-40139",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40139"
},
{
"name": "CVE-2025-68794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68794"
},
{
"name": "CVE-2025-21768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21768"
},
{
"name": "CVE-2022-48667",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48667"
},
{
"name": "CVE-2025-69419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69419"
},
{
"name": "CVE-2024-56744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56744"
},
{
"name": "CVE-2025-38491",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38491"
},
{
"name": "CVE-2026-3783",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3783"
},
{
"name": "CVE-2022-49161",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49161"
},
{
"name": "CVE-2021-21240",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21240"
},
{
"name": "CVE-2022-48771",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48771"
},
{
"name": "CVE-2025-37961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37961"
},
{
"name": "CVE-2025-23131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23131"
},
{
"name": "CVE-2024-27400",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27400"
},
{
"name": "CVE-2023-52485",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52485"
},
{
"name": "CVE-2025-40309",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40309"
},
{
"name": "CVE-2022-49997",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49997"
},
{
"name": "CVE-2022-49469",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49469"
},
{
"name": "CVE-2025-6075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6075"
},
{
"name": "CVE-2025-38408",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38408"
},
{
"name": "CVE-2026-23179",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23179"
},
{
"name": "CVE-2025-68334",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68334"
},
{
"name": "CVE-2025-40343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40343"
},
{
"name": "CVE-2025-38644",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38644"
},
{
"name": "CVE-2025-38692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38692"
},
{
"name": "CVE-2022-0480",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0480"
},
{
"name": "CVE-2025-68173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68173"
},
{
"name": "CVE-2024-49932",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49932"
},
{
"name": "CVE-2026-23090",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23090"
},
{
"name": "CVE-2026-23035",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23035"
},
{
"name": "CVE-2023-53209",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53209"
},
{
"name": "CVE-2023-54253",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54253"
},
{
"name": "CVE-2025-38127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38127"
},
{
"name": "CVE-2025-22103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22103"
},
{
"name": "CVE-2025-1272",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1272"
},
{
"name": "CVE-2025-21658",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21658"
},
{
"name": "CVE-2022-49651",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49651"
},
{
"name": "CVE-2025-68307",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68307"
},
{
"name": "CVE-2025-40308",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40308"
},
{
"name": "CVE-2024-26770",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26770"
},
{
"name": "CVE-2023-54324",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54324"
},
{
"name": "CVE-2024-27041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27041"
},
{
"name": "CVE-2025-36184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36184"
},
{
"name": "CVE-2026-3195",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3195"
},
{
"name": "CVE-2025-37743",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37743"
},
{
"name": "CVE-2025-40005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40005"
},
{
"name": "CVE-2025-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37920"
},
{
"name": "CVE-2024-56326",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56326"
},
{
"name": "CVE-2023-26242",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26242"
},
{
"name": "CVE-2025-58185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58185"
},
{
"name": "CVE-2025-40315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40315"
},
{
"name": "CVE-2023-52673",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52673"
},
{
"name": "CVE-2024-56722",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56722"
},
{
"name": "CVE-2021-33113",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33113"
},
{
"name": "CVE-2022-48668",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48668"
},
{
"name": "CVE-2024-27418",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27418"
},
{
"name": "CVE-2025-68231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68231"
},
{
"name": "CVE-2021-22930",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22930"
},
{
"name": "CVE-2025-14177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14177"
},
{
"name": "CVE-2026-23064",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23064"
},
{
"name": "CVE-2025-38591",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38591"
},
{
"name": "CVE-2025-68806",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68806"
},
{
"name": "CVE-2022-50322",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50322"
},
{
"name": "CVE-2023-50782",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50782"
},
{
"name": "CVE-2022-27635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27635"
},
{
"name": "CVE-2025-71098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71098"
},
{
"name": "CVE-2024-49922",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49922"
},
{
"name": "CVE-2020-12317",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12317"
},
{
"name": "CVE-2025-61731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61731"
},
{
"name": "CVE-2025-40251",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40251"
},
{
"name": "CVE-2024-42128",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42128"
},
{
"name": "CVE-2025-71078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71078"
},
{
"name": "CVE-2024-49909",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49909"
},
{
"name": "CVE-2025-40355",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40355"
},
{
"name": "CVE-2021-42771",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42771"
},
{
"name": "CVE-2026-2391",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2391"
},
{
"name": "CVE-2021-4095",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4095"
},
{
"name": "CVE-2022-50240",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50240"
},
{
"name": "CVE-2025-40054",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40054"
},
{
"name": "CVE-2024-45015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45015"
},
{
"name": "CVE-2025-68184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68184"
},
{
"name": "CVE-2024-36357",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36357"
},
{
"name": "CVE-2025-71074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71074"
},
{
"name": "CVE-2025-38673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38673"
},
{
"name": "CVE-2025-40107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40107"
},
{
"name": "CVE-2025-11234",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11234"
},
{
"name": "CVE-2025-71083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71083"
},
{
"name": "CVE-2026-23061",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23061"
},
{
"name": "CVE-2023-53447",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53447"
},
{
"name": "CVE-2024-46754",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46754"
},
{
"name": "CVE-2021-0161",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0161"
},
{
"name": "CVE-2018-1121",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1121"
},
{
"name": "CVE-2022-49547",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49547"
},
{
"name": "CVE-2025-66863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66863"
},
{
"name": "CVE-2025-0622",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0622"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2024-26757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26757"
},
{
"name": "CVE-2024-49899",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49899"
},
{
"name": "CVE-2022-49484",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49484"
},
{
"name": "CVE-2024-40900",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40900"
},
{
"name": "CVE-2024-46748",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46748"
},
{
"name": "CVE-2025-68813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68813"
},
{
"name": "CVE-2024-50164",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50164"
},
{
"name": "CVE-2026-27137",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27137"
},
{
"name": "CVE-2023-53248",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53248"
},
{
"name": "CVE-2024-56788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56788"
},
{
"name": "CVE-2016-8660",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8660"
},
{
"name": "CVE-2024-26691",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26691"
},
{
"name": "CVE-2026-23047",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23047"
},
{
"name": "CVE-2025-22121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22121"
},
{
"name": "CVE-2024-1975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1975"
},
{
"name": "CVE-2025-38215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38215"
},
{
"name": "CVE-2025-7519",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7519"
},
{
"name": "CVE-2023-53491",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53491"
},
{
"name": "CVE-2025-68365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68365"
},
{
"name": "CVE-2024-57804",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57804"
},
{
"name": "CVE-2024-49908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49908"
},
{
"name": "CVE-2025-68265",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68265"
},
{
"name": "CVE-2024-50048",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50048"
},
{
"name": "CVE-2026-28421",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28421"
},
{
"name": "CVE-2026-23119",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23119"
},
{
"name": "CVE-2025-37943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37943"
},
{
"name": "CVE-2025-21918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21918"
},
{
"name": "CVE-2025-37745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37745"
},
{
"name": "CVE-2025-71085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71085"
},
{
"name": "CVE-2026-27171",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27171"
},
{
"name": "CVE-2022-50811",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50811"
},
{
"name": "CVE-2025-13837",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13837"
},
{
"name": "CVE-2023-4133",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4133"
},
{
"name": "CVE-2024-50183",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50183"
},
{
"name": "CVE-2025-38734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38734"
},
{
"name": "CVE-2023-53366",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53366"
},
{
"name": "CVE-2022-49910",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49910"
},
{
"name": "CVE-2024-27062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27062"
},
{
"name": "CVE-2022-49203",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49203"
},
{
"name": "CVE-2024-40918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40918"
},
{
"name": "CVE-2024-27032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27032"
},
{
"name": "CVE-2022-50236",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50236"
},
{
"name": "CVE-2024-35932",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35932"
},
{
"name": "CVE-2024-35839",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35839"
},
{
"name": "CVE-2025-68344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68344"
},
{
"name": "CVE-2026-23137",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23137"
},
{
"name": "CVE-2025-40347",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40347"
},
{
"name": "CVE-2025-71154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71154"
},
{
"name": "CVE-2025-37882",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37882"
},
{
"name": "CVE-2024-35971",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35971"
},
{
"name": "CVE-2024-46762",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46762"
},
{
"name": "CVE-2023-34983",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34983"
},
{
"name": "CVE-2024-35868",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35868"
},
{
"name": "CVE-2023-53323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53323"
},
{
"name": "CVE-2026-3731",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3731"
},
{
"name": "CVE-2025-40198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40198"
},
{
"name": "CVE-2024-0760",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0760"
},
{
"name": "CVE-2025-39942",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39942"
},
{
"name": "CVE-2025-68310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68310"
},
{
"name": "CVE-2026-23222",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23222"
},
{
"name": "CVE-2025-68229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68229"
},
{
"name": "CVE-2023-52857",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52857"
},
{
"name": "CVE-2024-42107",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42107"
},
{
"name": "CVE-2025-68257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68257"
},
{
"name": "CVE-2025-39929",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39929"
},
{
"name": "CVE-2022-50304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50304"
},
{
"name": "CVE-2026-23226",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23226"
},
{
"name": "CVE-2020-26146",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26146"
},
{
"name": "CVE-2024-43844",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43844"
},
{
"name": "CVE-2023-52920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52920"
},
{
"name": "CVE-2023-52590",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52590"
},
{
"name": "CVE-2025-71084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71084"
},
{
"name": "CVE-2024-22025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22025"
},
{
"name": "CVE-2026-23049",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23049"
},
{
"name": "CVE-2025-68321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68321"
},
{
"name": "CVE-2021-0072",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0072"
},
{
"name": "CVE-2025-40190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40190"
},
{
"name": "CVE-2025-69652",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69652"
},
{
"name": "CVE-2025-21635",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21635"
},
{
"name": "CVE-2025-37924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37924"
},
{
"name": "CVE-2022-40133",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40133"
},
{
"name": "CVE-2020-26143",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26143"
},
{
"name": "CVE-2025-21712",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21712"
},
{
"name": "CVE-2025-38353",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38353"
},
{
"name": "CVE-2025-36009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36009"
},
{
"name": "CVE-2019-0154",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0154"
},
{
"name": "CVE-2024-57982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57982"
},
{
"name": "CVE-2023-52761",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52761"
},
{
"name": "CVE-2022-49773",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49773"
},
{
"name": "CVE-2023-53609",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53609"
},
{
"name": "CVE-2023-53478",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53478"
},
{
"name": "CVE-2024-42117",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42117"
},
{
"name": "CVE-2025-23160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23160"
},
{
"name": "CVE-2023-53682",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53682"
},
{
"name": "CVE-2026-23229",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23229"
},
{
"name": "CVE-2025-40311",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40311"
},
{
"name": "CVE-2025-54770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54770"
},
{
"name": "CVE-2026-3442",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3442"
},
{
"name": "CVE-2024-58238",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58238"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2025-68814",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68814"
},
{
"name": "CVE-2025-22039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22039"
},
{
"name": "CVE-2025-37842",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37842"
},
{
"name": "CVE-2025-39933",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39933"
},
{
"name": "CVE-2025-40237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40237"
},
{
"name": "CVE-2022-49722",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49722"
},
{
"name": "CVE-2026-23745",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23745"
},
{
"name": "CVE-2025-68780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68780"
},
{
"name": "CVE-2024-35945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35945"
},
{
"name": "CVE-2025-39990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39990"
},
{
"name": "CVE-2025-15467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15467"
},
{
"name": "CVE-2025-71081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71081"
},
{
"name": "CVE-2023-53780",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53780"
},
{
"name": "CVE-2020-35501",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35501"
},
{
"name": "CVE-2024-58251",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58251"
},
{
"name": "CVE-2025-38710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38710"
},
{
"name": "CVE-2025-9820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9820"
},
{
"name": "CVE-2023-52624",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52624"
},
{
"name": "CVE-2024-56557",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56557"
},
{
"name": "CVE-2022-49699",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49699"
},
{
"name": "CVE-2022-50700",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50700"
},
{
"name": "CVE-2023-52632",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52632"
},
{
"name": "CVE-2024-46836",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46836"
},
{
"name": "CVE-2026-23101",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23101"
},
{
"name": "CVE-2026-23099",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23099"
},
{
"name": "CVE-2024-38556",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38556"
},
{
"name": "CVE-2025-1180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1180"
},
{
"name": "CVE-2025-38060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38060"
},
{
"name": "CVE-2022-48929",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48929"
},
{
"name": "CVE-2025-55130",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55130"
},
{
"name": "CVE-2025-36070",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36070"
},
{
"name": "CVE-2024-46820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46820"
},
{
"name": "CVE-2025-39770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39770"
},
{
"name": "CVE-2025-38105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38105"
},
{
"name": "CVE-2025-37744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37744"
},
{
"name": "CVE-2025-38705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38705"
},
{
"name": "CVE-2023-53198",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53198"
},
{
"name": "CVE-2023-53846",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53846"
},
{
"name": "CVE-2025-71121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71121"
},
{
"name": "CVE-2024-35942",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35942"
},
{
"name": "CVE-2022-1247",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1247"
},
{
"name": "CVE-2025-40333",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40333"
},
{
"name": "CVE-2022-50234",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50234"
},
{
"name": "CVE-2025-38082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38082"
},
{
"name": "CVE-2025-37884",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37884"
},
{
"name": "CVE-2024-58054",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58054"
},
{
"name": "CVE-2024-49934",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49934"
},
{
"name": "CVE-2025-39750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39750"
},
{
"name": "CVE-2025-38022",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38022"
},
{
"name": "CVE-2026-23066",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23066"
},
{
"name": "CVE-2025-38562",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38562"
},
{
"name": "CVE-2023-4969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4969"
},
{
"name": "CVE-2024-50098",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50098"
},
{
"name": "CVE-2024-35946",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35946"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2023-53789",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53789"
},
{
"name": "CVE-2022-49858",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49858"
},
{
"name": "CVE-2025-39692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39692"
},
{
"name": "CVE-2024-35959",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35959"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2025-36428",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36428"
},
{
"name": "CVE-2023-53520",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53520"
},
{
"name": "CVE-2026-23085",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23085"
},
{
"name": "CVE-2023-52737",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52737"
},
{
"name": "CVE-2025-40360",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40360"
},
{
"name": "CVE-2026-23209",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23209"
},
{
"name": "CVE-2025-71136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71136"
},
{
"name": "CVE-2024-35803",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35803"
},
{
"name": "CVE-2025-22105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22105"
},
{
"name": "CVE-2024-8612",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8612"
},
{
"name": "CVE-2023-52586",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52586"
},
{
"name": "CVE-2025-40332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40332"
},
{
"name": "CVE-2021-46195",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46195"
},
{
"name": "CVE-2025-68354",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68354"
},
{
"name": "CVE-2025-68801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68801"
},
{
"name": "CVE-2021-33110",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33110"
},
{
"name": "CVE-2025-37834",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37834"
},
{
"name": "CVE-2025-21833",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21833"
},
{
"name": "CVE-2025-40082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40082"
},
{
"name": "CVE-2019-19378",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19378"
},
{
"name": "CVE-2026-23150",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23150"
},
{
"name": "CVE-2024-40972",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40972"
},
{
"name": "CVE-2025-61985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61985"
},
{
"name": "CVE-2025-71073",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71073"
},
{
"name": "CVE-2025-38426",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38426"
},
{
"name": "CVE-2025-38436",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38436"
},
{
"name": "CVE-2024-36911",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36911"
},
{
"name": "CVE-2025-55131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55131"
},
{
"name": "CVE-2025-40104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40104"
},
{
"name": "CVE-2024-36917",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36917"
},
{
"name": "CVE-2025-38097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38097"
},
{
"name": "CVE-2026-23236",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23236"
},
{
"name": "CVE-2023-53068",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53068"
},
{
"name": "CVE-2025-22090",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22090"
},
{
"name": "CVE-2025-61919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61919"
},
{
"name": "CVE-2021-31615",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31615"
},
{
"name": "CVE-2024-1737",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1737"
},
{
"name": "CVE-2025-40097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40097"
},
{
"name": "CVE-2022-49932",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49932"
},
{
"name": "CVE-2022-25837",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25837"
},
{
"name": "CVE-2025-68258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68258"
},
{
"name": "CVE-2024-49939",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49939"
},
{
"name": "CVE-2025-38239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38239"
},
{
"name": "CVE-2024-49905",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49905"
},
{
"name": "CVE-2023-52831",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52831"
},
{
"name": "CVE-2023-53221",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53221"
},
{
"name": "CVE-2024-26719",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26719"
},
{
"name": "CVE-2022-44034",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44034"
},
{
"name": "CVE-2022-40897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40897"
},
{
"name": "CVE-2023-53072",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53072"
},
{
"name": "CVE-2023-2007",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2007"
},
{
"name": "CVE-2022-37341",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37341"
},
{
"name": "CVE-2025-69648",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69648"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2024-50298",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50298"
},
{
"name": "CVE-2025-36424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36424"
},
{
"name": "CVE-2025-21915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21915"
},
{
"name": "CVE-2025-38590",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38590"
},
{
"name": "CVE-2024-46843",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46843"
},
{
"name": "CVE-2025-21792",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21792"
},
{
"name": "CVE-2023-54016",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54016"
},
{
"name": "CVE-2025-36387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36387"
},
{
"name": "CVE-2025-38709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38709"
},
{
"name": "CVE-2024-58018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58018"
},
{
"name": "CVE-2023-4408",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4408"
},
{
"name": "CVE-2025-71235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71235"
},
{
"name": "CVE-2025-61771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61771"
},
{
"name": "CVE-2023-53602",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53602"
},
{
"name": "CVE-2023-2828",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2828"
},
{
"name": "CVE-2023-54035",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54035"
},
{
"name": "CVE-2025-40322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40322"
},
{
"name": "CVE-2023-53867",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53867"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2025-61770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61770"
},
{
"name": "CVE-2025-37926",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37926"
},
{
"name": "CVE-2024-46715",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46715"
},
{
"name": "CVE-2025-38038",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38038"
},
{
"name": "CVE-2024-46802",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46802"
},
{
"name": "CVE-2025-39859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39859"
},
{
"name": "CVE-2025-40313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40313"
},
{
"name": "CVE-2023-52582",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52582"
},
{
"name": "CVE-2023-33053",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33053"
},
{
"name": "CVE-2025-1152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1152"
},
{
"name": "CVE-2026-24051",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24051"
},
{
"name": "CVE-2025-38015",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38015"
},
{
"name": "CVE-2024-26742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26742"
},
{
"name": "CVE-2025-38449",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38449"
},
{
"name": "CVE-2025-21714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21714"
},
{
"name": "CVE-2025-38261",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38261"
},
{
"name": "CVE-2024-36918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36918"
},
{
"name": "CVE-2025-37853",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37853"
},
{
"name": "CVE-2025-69644",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69644"
},
{
"name": "CVE-2022-49303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49303"
},
{
"name": "CVE-2025-38126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38126"
},
{
"name": "CVE-2023-46809",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46809"
},
{
"name": "CVE-2025-59465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59465"
},
{
"name": "CVE-2025-39763",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39763"
},
{
"name": "CVE-2025-21972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21972"
},
{
"name": "CVE-2023-54088",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54088"
},
{
"name": "CVE-2024-42320",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42320"
},
{
"name": "CVE-2025-38679",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38679"
},
{
"name": "CVE-2025-40271",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40271"
},
{
"name": "CVE-2024-53234",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53234"
},
{
"name": "CVE-2025-11961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11961"
},
{
"name": "CVE-2025-39877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39877"
},
{
"name": "CVE-2022-3114",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3114"
},
{
"name": "CVE-2023-52916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52916"
},
{
"name": "CVE-2025-38064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38064"
},
{
"name": "CVE-2026-22991",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22991"
},
{
"name": "CVE-2024-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35937"
},
{
"name": "CVE-2022-50628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50628"
},
{
"name": "CVE-2024-56718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56718"
},
{
"name": "CVE-2024-43824",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43824"
},
{
"name": "CVE-2025-39886",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39886"
},
{
"name": "CVE-2022-50350",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50350"
},
{
"name": "CVE-2025-21831",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21831"
},
{
"name": "CVE-2022-50721",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50721"
},
{
"name": "CVE-2022-50095",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50095"
},
{
"name": "CVE-2025-40073",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40073"
},
{
"name": "CVE-2024-26662",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26662"
},
{
"name": "CVE-2026-3196",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3196"
},
{
"name": "CVE-2025-61662",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61662"
},
{
"name": "CVE-2025-8291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8291"
},
{
"name": "CVE-2025-68308",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68308"
},
{
"name": "CVE-2024-50217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50217"
},
{
"name": "CVE-2021-0168",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0168"
},
{
"name": "CVE-2026-22795",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22795"
},
{
"name": "CVE-2022-50479",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50479"
},
{
"name": "CVE-2022-50583",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50583"
},
{
"name": "CVE-2025-37806",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37806"
},
{
"name": "CVE-2024-38554",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38554"
},
{
"name": "CVE-2025-68822",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68822"
},
{
"name": "CVE-2025-40242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40242"
},
{
"name": "CVE-2023-0030",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0030"
},
{
"name": "CVE-2024-42110",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42110"
},
{
"name": "CVE-2025-37822",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37822"
},
{
"name": "CVE-2025-61727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61727"
},
{
"name": "CVE-2025-39838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39838"
},
{
"name": "CVE-2025-37820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37820"
},
{
"name": "CVE-2024-53179",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53179"
},
{
"name": "CVE-2024-57945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57945"
},
{
"name": "CVE-2023-54233",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54233"
},
{
"name": "CVE-2024-43899",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43899"
},
{
"name": "CVE-2025-21986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21986"
},
{
"name": "CVE-2019-15213",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15213"
},
{
"name": "CVE-2025-38234",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38234"
},
{
"name": "CVE-2022-49935",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49935"
},
{
"name": "CVE-2021-44532",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44532"
},
{
"name": "CVE-2025-38011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38011"
},
{
"name": "CVE-2022-49534",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49534"
},
{
"name": "CVE-2024-57974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57974"
},
{
"name": "CVE-2024-50012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50012"
},
{
"name": "CVE-2025-68190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68190"
},
{
"name": "CVE-2023-53010",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53010"
},
{
"name": "CVE-2024-35956",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35956"
},
{
"name": "CVE-2024-57888",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57888"
},
{
"name": "CVE-2025-65637",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-65637"
},
{
"name": "CVE-2024-35908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35908"
},
{
"name": "CVE-2023-54237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54237"
},
{
"name": "CVE-2025-37878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37878"
},
{
"name": "CVE-2023-53424",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53424"
},
{
"name": "CVE-2026-23207",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23207"
},
{
"name": "CVE-2025-40252",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40252"
},
{
"name": "CVE-2022-49134",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49134"
},
{
"name": "CVE-2025-21946",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21946"
},
{
"name": "CVE-2025-21838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21838"
},
{
"name": "CVE-2022-49333",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49333"
},
{
"name": "CVE-2023-53791",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53791"
},
{
"name": "CVE-2025-27111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27111"
},
{
"name": "CVE-2024-49994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49994"
},
{
"name": "CVE-2025-53859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53859"
},
{
"name": "CVE-2019-19814",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19814"
},
{
"name": "CVE-2022-49136",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49136"
},
{
"name": "CVE-2025-68255",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68255"
},
{
"name": "CVE-2025-47910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47910"
},
{
"name": "CVE-2023-54081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54081"
},
{
"name": "CVE-2024-36898",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36898"
},
{
"name": "CVE-2024-44962",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44962"
},
{
"name": "CVE-2025-68322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68322"
},
{
"name": "CVE-2024-35931",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35931"
},
{
"name": "CVE-2025-38702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38702"
},
{
"name": "CVE-2026-22980",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22980"
},
{
"name": "CVE-2026-23138",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23138"
},
{
"name": "CVE-2025-39927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39927"
},
{
"name": "CVE-2026-1703",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1703"
},
{
"name": "CVE-2023-26551",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26551"
},
{
"name": "CVE-2024-46857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46857"
},
{
"name": "CVE-2024-58013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58013"
},
{
"name": "CVE-2024-53210",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53210"
},
{
"name": "CVE-2023-54185",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54185"
},
{
"name": "CVE-2022-49342",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49342"
},
{
"name": "CVE-2015-8553",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8553"
},
{
"name": "CVE-2025-40277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40277"
},
{
"name": "CVE-2025-38250",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38250"
},
{
"name": "CVE-2024-36966",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36966"
},
{
"name": "CVE-2023-53332",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53332"
},
{
"name": "CVE-2024-35924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35924"
},
{
"name": "CVE-2024-58095",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58095"
},
{
"name": "CVE-2024-45010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45010"
},
{
"name": "CVE-2022-49471",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49471"
},
{
"name": "CVE-2025-68174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68174"
},
{
"name": "CVE-2022-48976",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48976"
},
{
"name": "CVE-2025-21751",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21751"
},
{
"name": "CVE-2023-53753",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53753"
},
{
"name": "CVE-2024-41074",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41074"
},
{
"name": "CVE-2026-23234",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23234"
},
{
"name": "CVE-2025-40272",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40272"
},
{
"name": "CVE-2024-50106",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50106"
},
{
"name": "CVE-2025-23162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23162"
},
{
"name": "CVE-2026-23133",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23133"
},
{
"name": "CVE-2025-71093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71093"
},
{
"name": "CVE-2025-46727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46727"
},
{
"name": "CVE-2017-13694",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13694"
},
{
"name": "CVE-2025-71102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71102"
},
{
"name": "CVE-2026-23212",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23212"
},
{
"name": "CVE-2013-7445",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-7445"
},
{
"name": "CVE-2026-23170",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23170"
},
{
"name": "CVE-2023-52701",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52701"
},
{
"name": "CVE-2024-49906",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49906"
},
{
"name": "CVE-2024-26647",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26647"
},
{
"name": "CVE-2025-68759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68759"
},
{
"name": "CVE-2024-47809",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47809"
},
{
"name": "CVE-2026-23204",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23204"
},
{
"name": "CVE-2022-49317",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49317"
},
{
"name": "CVE-2026-23019",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23019"
},
{
"name": "CVE-2018-12928",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12928"
},
{
"name": "CVE-2025-71188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71188"
},
{
"name": "CVE-2023-38552",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38552"
},
{
"name": "CVE-2024-40989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40989"
},
{
"name": "CVE-2024-56607",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56607"
},
{
"name": "CVE-2025-40345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40345"
},
{
"name": "CVE-2026-27142",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27142"
},
{
"name": "CVE-2024-49904",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49904"
},
{
"name": "CVE-2023-53671",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53671"
},
{
"name": "CVE-2025-40354",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40354"
},
{
"name": "CVE-2024-26938",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26938"
},
{
"name": "CVE-2026-28417",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28417"
},
{
"name": "CVE-2025-37931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37931"
},
{
"name": "CVE-2024-35999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35999"
},
{
"name": "CVE-2023-29942",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29942"
},
{
"name": "CVE-2026-23125",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23125"
},
{
"name": "CVE-2026-0966",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0966"
},
{
"name": "CVE-2022-48633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48633"
},
{
"name": "CVE-2022-3238",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3238"
},
{
"name": "CVE-2024-38557",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38557"
},
{
"name": "CVE-2026-22185",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22185"
},
{
"name": "CVE-2023-53781",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53781"
},
{
"name": "CVE-2023-53584",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53584"
},
{
"name": "CVE-2024-57809",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57809"
},
{
"name": "CVE-2025-38057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38057"
},
{
"name": "CVE-2025-68733",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68733"
},
{
"name": "CVE-2024-56719",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56719"
},
{
"name": "CVE-2022-50418",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50418"
},
{
"name": "CVE-2023-53438",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53438"
},
{
"name": "CVE-2025-47906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47906"
},
{
"name": "CVE-2023-53460",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53460"
},
{
"name": "CVE-2026-23214",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23214"
},
{
"name": "CVE-2024-52559",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52559"
},
{
"name": "CVE-2025-68188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68188"
},
{
"name": "CVE-2025-40269",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40269"
},
{
"name": "CVE-2024-56671",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56671"
},
{
"name": "CVE-2025-68335",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68335"
},
{
"name": "CVE-2025-71079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71079"
},
{
"name": "CVE-2025-62626",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62626"
},
{
"name": "CVE-2025-39940",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39940"
},
{
"name": "CVE-2023-52751",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52751"
},
{
"name": "CVE-2022-49562",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49562"
},
{
"name": "CVE-2025-37861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37861"
},
{
"name": "CVE-2023-53483",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53483"
},
{
"name": "CVE-2023-53673",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53673"
},
{
"name": "CVE-2025-37938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37938"
},
{
"name": "CVE-2025-37746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37746"
},
{
"name": "CVE-2022-38076",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38076"
},
{
"name": "CVE-2025-38368",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38368"
},
{
"name": "CVE-2026-23178",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23178"
},
{
"name": "CVE-2025-59375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59375"
},
{
"name": "CVE-2025-31133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31133"
},
{
"name": "CVE-2026-22997",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22997"
},
{
"name": "CVE-2024-56368",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56368"
},
{
"name": "CVE-2025-40075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40075"
},
{
"name": "CVE-2022-49172",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49172"
},
{
"name": "CVE-2025-8194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
},
{
"name": "CVE-2024-40979",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40979"
},
{
"name": "CVE-2025-39977",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39977"
},
{
"name": "CVE-2025-38331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38331"
},
{
"name": "CVE-2026-23240",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23240"
},
{
"name": "CVE-2025-68330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68330"
},
{
"name": "CVE-2026-23228",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23228"
},
{
"name": "CVE-2024-49945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49945"
},
{
"name": "CVE-2022-44033",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44033"
},
{
"name": "CVE-2024-56757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56757"
},
{
"name": "CVE-2023-53662",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53662"
},
{
"name": "CVE-2025-38069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38069"
},
{
"name": "CVE-2022-49750",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49750"
},
{
"name": "CVE-2023-53707",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53707"
},
{
"name": "CVE-2023-53115",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53115"
},
{
"name": "CVE-2025-71196",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71196"
},
{
"name": "CVE-2025-21645",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21645"
},
{
"name": "CVE-2023-54107",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54107"
},
{
"name": "CVE-2022-48646",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48646"
},
{
"name": "CVE-2024-43912",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43912"
},
{
"name": "CVE-2024-35808",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35808"
},
{
"name": "CVE-2024-58012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58012"
},
{
"name": "CVE-2025-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50181"
},
{
"name": "CVE-2025-61663",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61663"
},
{
"name": "CVE-2025-68772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68772"
},
{
"name": "CVE-2024-49891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49891"
},
{
"name": "CVE-2024-36948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36948"
},
{
"name": "CVE-2022-48887",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48887"
},
{
"name": "CVE-2024-40977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40977"
},
{
"name": "CVE-2024-26948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26948"
},
{
"name": "CVE-2023-53370",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53370"
},
{
"name": "CVE-2024-53187",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53187"
},
{
"name": "CVE-2023-45929",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45929"
},
{
"name": "CVE-2025-68343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68343"
},
{
"name": "CVE-2025-66382",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66382"
},
{
"name": "CVE-2024-57795",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57795"
},
{
"name": "CVE-2025-37855",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37855"
},
{
"name": "CVE-2025-21816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21816"
},
{
"name": "CVE-2021-33115",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33115"
},
{
"name": "CVE-2025-21780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21780"
},
{
"name": "CVE-2020-26559",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26559"
},
{
"name": "CVE-2024-12705",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12705"
},
{
"name": "CVE-2025-69421",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69421"
},
{
"name": "CVE-2020-26140",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26140"
},
{
"name": "CVE-2024-39508",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39508"
},
{
"name": "CVE-2026-23191",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23191"
},
{
"name": "CVE-2026-32249",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32249"
},
{
"name": "CVE-2025-37899",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37899"
},
{
"name": "CVE-2026-23078",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23078"
},
{
"name": "CVE-2025-40362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40362"
},
{
"name": "CVE-2025-68201",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68201"
},
{
"name": "CVE-2024-43831",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43831"
},
{
"name": "CVE-2023-30630",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30630"
},
{
"name": "CVE-2025-40289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40289"
},
{
"name": "CVE-2026-23169",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23169"
},
{
"name": "CVE-2025-38330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38330"
},
{
"name": "CVE-2025-58188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58188"
},
{
"name": "CVE-2017-13693",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13693"
},
{
"name": "CVE-2025-68768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68768"
},
{
"name": "CVE-2024-50284",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50284"
},
{
"name": "CVE-2022-49306",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49306"
},
{
"name": "CVE-2024-49898",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49898"
},
{
"name": "CVE-2025-36423",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36423"
},
{
"name": "CVE-2022-49622",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49622"
},
{
"name": "CVE-2025-68785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68785"
},
{
"name": "CVE-2024-50211",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50211"
},
{
"name": "CVE-2025-38507",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38507"
},
{
"name": "CVE-2022-50284",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50284"
},
{
"name": "CVE-2025-39989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39989"
},
{
"name": "CVE-2023-6240",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6240"
},
{
"name": "CVE-2025-38014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38014"
},
{
"name": "CVE-2025-22028",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22028"
},
{
"name": "CVE-2024-41008",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41008"
},
{
"name": "CVE-2024-27035",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27035"
},
{
"name": "CVE-2023-53218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53218"
},
{
"name": "CVE-2022-25836",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25836"
},
{
"name": "CVE-2024-37354",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37354"
},
{
"name": "CVE-2025-68808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68808"
},
{
"name": "CVE-2025-4674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
},
{
"name": "CVE-2025-29934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29934"
},
{
"name": "CVE-2024-27005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27005"
},
{
"name": "CVE-2025-68223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68223"
},
{
"name": "CVE-2022-49133",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49133"
},
{
"name": "CVE-2024-36951",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36951"
},
{
"name": "CVE-2025-68783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68783"
},
{
"name": "CVE-2025-71147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71147"
},
{
"name": "CVE-2025-38438",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38438"
},
{
"name": "CVE-2025-40032",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40032"
},
{
"name": "CVE-2023-26555",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26555"
},
{
"name": "CVE-2023-1193",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1193"
},
{
"name": "CVE-2025-71220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71220"
},
{
"name": "CVE-2024-46806",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46806"
},
{
"name": "CVE-2022-50073",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50073"
},
{
"name": "CVE-2025-68724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68724"
},
{
"name": "CVE-2025-5278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5278"
},
{
"name": "CVE-2026-23103",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23103"
},
{
"name": "CVE-2026-23074",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23074"
},
{
"name": "CVE-2025-68786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68786"
},
{
"name": "CVE-2025-39732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39732"
},
{
"name": "CVE-2022-50393",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50393"
},
{
"name": "CVE-2025-68779",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68779"
},
{
"name": "CVE-2024-56433",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56433"
},
{
"name": "CVE-2025-21819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21819"
},
{
"name": "CVE-2025-48514",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48514"
},
{
"name": "CVE-2024-41030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41030"
},
{
"name": "CVE-2025-71199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71199"
},
{
"name": "CVE-2024-47664",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47664"
},
{
"name": "CVE-2024-36915",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36915"
},
{
"name": "CVE-2026-25749",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25749"
},
{
"name": "CVE-2024-49504",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49504"
},
{
"name": "CVE-2025-38118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38118"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2023-53367",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53367"
},
{
"name": "CVE-2022-50500",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50500"
},
{
"name": "CVE-2019-14899",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14899"
},
{
"name": "CVE-2022-29526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29526"
},
{
"name": "CVE-2024-53098",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53098"
},
{
"name": "CVE-2025-68797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68797"
},
{
"name": "CVE-2024-49968",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49968"
},
{
"name": "CVE-2025-68358",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68358"
},
{
"name": "CVE-2025-40206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40206"
},
{
"name": "CVE-2026-23180",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23180"
},
{
"name": "CVE-2021-0164",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0164"
},
{
"name": "CVE-2026-26958",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26958"
},
{
"name": "CVE-2024-46870",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46870"
},
{
"name": "CVE-2022-49178",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49178"
},
{
"name": "CVE-2024-22195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22195"
},
{
"name": "CVE-2023-23931",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23931"
},
{
"name": "CVE-2024-49929",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49929"
},
{
"name": "CVE-2025-40257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40257"
},
{
"name": "CVE-2023-53748",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53748"
},
{
"name": "CVE-2024-26740",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26740"
},
{
"name": "CVE-2022-49173",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49173"
},
{
"name": "CVE-2024-45781",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45781"
},
{
"name": "CVE-2025-71125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71125"
},
{
"name": "CVE-2025-21947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21947"
},
{
"name": "CVE-2024-53056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53056"
},
{
"name": "CVE-2022-50551",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50551"
},
{
"name": "CVE-2026-26269",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26269"
},
{
"name": "CVE-2024-43872",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43872"
},
{
"name": "CVE-2025-71108",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71108"
},
{
"name": "CVE-2022-49401",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49401"
},
{
"name": "CVE-2025-71069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71069"
},
{
"name": "CVE-2025-68312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68312"
},
{
"name": "CVE-2025-68284",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68284"
},
{
"name": "CVE-2025-68194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68194"
},
{
"name": "CVE-2023-52939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52939"
},
{
"name": "CVE-2024-14027",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-14027"
},
{
"name": "CVE-2025-38269",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38269"
},
{
"name": "CVE-2025-69649",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69649"
},
{
"name": "CVE-2024-53175",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53175"
},
{
"name": "CVE-2025-21734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21734"
},
{
"name": "CVE-2024-49859",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49859"
},
{
"name": "CVE-2025-40336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40336"
},
{
"name": "CVE-2025-37945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37945"
},
{
"name": "CVE-2025-71195",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71195"
},
{
"name": "CVE-2022-49766",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49766"
},
{
"name": "CVE-2025-6141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6141"
},
{
"name": "CVE-2025-22043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22043"
},
{
"name": "CVE-2024-49569",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49569"
},
{
"name": "CVE-2025-61984",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61984"
},
{
"name": "CVE-2023-52569",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52569"
},
{
"name": "CVE-2024-56609",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56609"
},
{
"name": "CVE-2022-49940",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49940"
},
{
"name": "CVE-2026-23083",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23083"
},
{
"name": "CVE-2025-38422",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38422"
},
{
"name": "CVE-2024-56611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56611"
},
{
"name": "CVE-2025-21927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21927"
},
{
"name": "CVE-2026-23088",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23088"
},
{
"name": "CVE-2020-25743",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25743"
},
{
"name": "CVE-2022-50167",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50167"
},
{
"name": "CVE-2025-68183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68183"
},
{
"name": "CVE-2026-27704",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27704"
},
{
"name": "CVE-2022-48064",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48064"
},
{
"name": "CVE-2023-45896",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45896"
},
{
"name": "CVE-2025-37903",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37903"
},
{
"name": "CVE-2025-68161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68161"
},
{
"name": "CVE-2025-68774",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68774"
},
{
"name": "CVE-2024-49940",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49940"
},
{
"name": "CVE-2025-40263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40263"
},
{
"name": "CVE-2021-3735",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3735"
},
{
"name": "CVE-2025-40353",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40353"
},
{
"name": "CVE-2024-46861",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46861"
},
{
"name": "CVE-2025-40222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40222"
},
{
"name": "CVE-2022-50634",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50634"
},
{
"name": "CVE-2025-52881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52881"
},
{
"name": "CVE-2025-54514",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54514"
},
{
"name": "CVE-2025-71202",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71202"
},
{
"name": "CVE-2015-7837",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7837"
},
{
"name": "CVE-2025-0677",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0677"
},
{
"name": "CVE-2024-45780",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45780"
},
{
"name": "CVE-2024-46749",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46749"
},
{
"name": "CVE-2022-50492",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50492"
},
{
"name": "CVE-2024-49888",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49888"
},
{
"name": "CVE-2022-50406",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50406"
},
{
"name": "CVE-2023-26552",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26552"
},
{
"name": "CVE-2024-49921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49921"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2026-23108",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23108"
},
{
"name": "CVE-2025-71180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71180"
},
{
"name": "CVE-2025-38232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38232"
},
{
"name": "CVE-2025-68244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68244"
},
{
"name": "CVE-2025-59691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59691"
},
{
"name": "CVE-2024-46830",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46830"
},
{
"name": "CVE-2023-52481",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52481"
},
{
"name": "CVE-2023-52888",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52888"
},
{
"name": "CVE-2025-22057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22057"
},
{
"name": "CVE-2024-47666",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47666"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2025-40278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40278"
},
{
"name": "CVE-2023-0160",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0160"
},
{
"name": "CVE-2024-50056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50056"
},
{
"name": "CVE-2025-71194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71194"
},
{
"name": "CVE-2026-1788",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1788"
},
{
"name": "CVE-2023-53721",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53721"
},
{
"name": "CVE-2025-22113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22113"
},
{
"name": "CVE-2025-40342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40342"
},
{
"name": "CVE-2022-50256",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50256"
},
{
"name": "CVE-2024-42091",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42091"
},
{
"name": "CVE-2024-27983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27983"
},
{
"name": "CVE-2025-37907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37907"
},
{
"name": "CVE-2024-38625",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38625"
},
{
"name": "CVE-2025-23085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23085"
},
{
"name": "CVE-2026-22796",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22796"
},
{
"name": "CVE-2023-4010",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4010"
},
{
"name": "CVE-2025-38425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38425"
},
{
"name": "CVE-2024-46727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46727"
},
{
"name": "CVE-2023-54028",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54028"
},
{
"name": "CVE-2024-42129",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42129"
},
{
"name": "CVE-2023-54105",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54105"
},
{
"name": "CVE-2018-17977",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17977"
},
{
"name": "CVE-2019-1010204",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1010204"
},
{
"name": "CVE-2023-53992",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53992"
},
{
"name": "CVE-2026-26960",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26960"
},
{
"name": "CVE-2025-40210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40210"
},
{
"name": "CVE-2022-50354",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50354"
},
{
"name": "CVE-2025-61724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61724"
},
{
"name": "CVE-2026-22999",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22999"
},
{
"name": "CVE-2025-21812",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21812"
},
{
"name": "CVE-2025-71082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71082"
},
{
"name": "CVE-2025-12801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12801"
},
{
"name": "CVE-2024-58015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58015"
},
{
"name": "CVE-2026-23068",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23068"
},
{
"name": "CVE-2024-41079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41079"
},
{
"name": "CVE-2025-68765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68765"
},
{
"name": "CVE-2026-23089",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23089"
},
{
"name": "CVE-2024-43823",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43823"
},
{
"name": "CVE-2023-52589",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52589"
},
{
"name": "CVE-2022-41848",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41848"
},
{
"name": "CVE-2026-23216",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23216"
},
{
"name": "CVE-2023-53434",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53434"
},
{
"name": "CVE-2023-29935",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29935"
},
{
"name": "CVE-2023-35061",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35061"
},
{
"name": "CVE-2025-71132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71132"
},
{
"name": "CVE-2025-71225",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71225"
},
{
"name": "CVE-2026-21636",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21636"
},
{
"name": "CVE-2026-23239",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23239"
},
{
"name": "CVE-2021-0172",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0172"
},
{
"name": "CVE-2024-47662",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47662"
},
{
"name": "CVE-2018-12930",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12930"
},
{
"name": "CVE-2026-23071",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23071"
},
{
"name": "CVE-2024-49970",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49970"
},
{
"name": "CVE-2024-41067",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41067"
},
{
"name": "CVE-2024-26844",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26844"
},
{
"name": "CVE-2025-23141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23141"
},
{
"name": "CVE-2026-23056",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23056"
},
{
"name": "CVE-2025-40193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40193"
},
{
"name": "CVE-2023-32644",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32644"
},
{
"name": "CVE-2025-71077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71077"
},
{
"name": "CVE-2025-21908",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21908"
},
{
"name": "CVE-2024-46681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46681"
},
{
"name": "CVE-2024-36927",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36927"
},
{
"name": "CVE-2025-61732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61732"
},
{
"name": "CVE-2025-61723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61723"
},
{
"name": "CVE-2025-9232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9232"
},
{
"name": "CVE-2025-40012",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40012"
},
{
"name": "CVE-2025-40279",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40279"
},
{
"name": "CVE-2026-0964",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0964"
},
{
"name": "CVE-2025-68328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68328"
},
{
"name": "CVE-2023-53178",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53178"
},
{
"name": "CVE-2024-47141",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47141"
},
{
"name": "CVE-2024-8354",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8354"
},
{
"name": "CVE-2023-54323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54323"
},
{
"name": "CVE-2025-37952",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37952"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2025-0689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0689"
},
{
"name": "CVE-2022-50316",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50316"
},
{
"name": "CVE-2023-31347",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31347"
},
{
"name": "CVE-2025-40084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40084"
},
{
"name": "CVE-2025-22111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22111"
},
{
"name": "CVE-2023-53657",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53657"
},
{
"name": "CVE-2024-49915",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49915"
},
{
"name": "CVE-2026-23063",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23063"
},
{
"name": "CVE-2025-55132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55132"
},
{
"name": "CVE-2023-52732",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52732"
},
{
"name": "CVE-2022-49759",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49759"
},
{
"name": "CVE-2025-61795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61795"
},
{
"name": "CVE-2026-23073",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23073"
},
{
"name": "CVE-2022-49167",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49167"
},
{
"name": "CVE-2025-68311",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68311"
},
{
"name": "CVE-2026-27903",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27903"
},
{
"name": "CVE-2023-54023",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54023"
},
{
"name": "CVE-2024-27056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27056"
},
{
"name": "CVE-2023-31082",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31082"
},
{
"name": "CVE-2024-41088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41088"
},
{
"name": "CVE-2025-0690",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0690"
},
{
"name": "CVE-2025-71114",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71114"
},
{
"name": "CVE-2023-53052",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53052"
},
{
"name": "CVE-2026-23058",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23058"
},
{
"name": "CVE-2022-49234",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49234"
},
{
"name": "CVE-2022-50163",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50163"
},
{
"name": "CVE-2024-36922",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36922"
},
{
"name": "CVE-2025-71067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71067"
},
{
"name": "CVE-2024-49919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49919"
},
{
"name": "CVE-2026-23238",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23238"
},
{
"name": "CVE-2025-71182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71182"
},
{
"name": "CVE-2020-26556",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26556"
},
{
"name": "CVE-2025-46394",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46394"
},
{
"name": "CVE-2025-66471",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66471"
},
{
"name": "CVE-2026-23038",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23038"
},
{
"name": "CVE-2025-40341",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40341"
},
{
"name": "CVE-2025-38409",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38409"
},
{
"name": "CVE-2021-3826",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3826"
},
{
"name": "CVE-2024-26699",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26699"
},
{
"name": "CVE-2024-57876",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57876"
},
{
"name": "CVE-2024-58019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58019"
},
{
"name": "CVE-2026-25679",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25679"
},
{
"name": "CVE-2026-22990",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22990"
},
{
"name": "CVE-2025-14017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14017"
},
{
"name": "CVE-2022-50390",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50390"
},
{
"name": "CVE-2026-23000",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23000"
},
{
"name": "CVE-2026-21441",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21441"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2025-71186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71186"
},
{
"name": "CVE-2024-53220",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53220"
},
{
"name": "CVE-2026-23176",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23176"
},
{
"name": "CVE-2023-53539",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53539"
},
{
"name": "CVE-2025-13836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13836"
},
{
"name": "CVE-2025-40338",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40338"
},
{
"name": "CVE-2025-68821",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68821"
},
{
"name": "CVE-2025-31648",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31648"
},
{
"name": "CVE-2025-0678",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0678"
},
{
"name": "CVE-2024-41075",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41075"
},
{
"name": "CVE-2026-23026",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23026"
},
{
"name": "CVE-2024-56674",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56674"
},
{
"name": "CVE-2024-27982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27982"
},
{
"name": "CVE-2025-40195",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40195"
},
{
"name": "CVE-2024-31884",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-31884"
},
{
"name": "CVE-2025-21976",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21976"
},
{
"name": "CVE-2019-1563",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1563"
},
{
"name": "CVE-2026-1002",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1002"
},
{
"name": "CVE-2026-23128",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23128"
},
{
"name": "CVE-2024-57975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57975"
},
{
"name": "CVE-2023-53574",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53574"
},
{
"name": "CVE-2022-50166",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50166"
},
{
"name": "CVE-2025-61725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61725"
},
{
"name": "CVE-2025-68325",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68325"
},
{
"name": "CVE-2025-71190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71190"
},
{
"name": "CVE-2024-56738",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56738"
},
{
"name": "CVE-2022-50778",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50778"
},
{
"name": "CVE-2024-42067",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42067"
},
{
"name": "CVE-2022-49971",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49971"
},
{
"name": "CVE-2025-71089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71089"
},
{
"name": "CVE-2025-21693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21693"
},
{
"name": "CVE-2025-71203",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71203"
},
{
"name": "CVE-2024-56657",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56657"
},
{
"name": "CVE-2025-39789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39789"
},
{
"name": "CVE-2022-49124",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49124"
},
{
"name": "CVE-2024-49901",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49901"
},
{
"name": "CVE-2023-52700",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52700"
},
{
"name": "CVE-2024-56583",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56583"
},
{
"name": "CVE-2022-50195",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50195"
},
{
"name": "CVE-2025-40358",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40358"
},
{
"name": "CVE-2024-40998",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40998"
},
{
"name": "CVE-2024-56712",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56712"
},
{
"name": "CVE-2025-68318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68318"
},
{
"name": "CVE-2022-49980",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49980"
},
{
"name": "CVE-2023-52634",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52634"
},
{
"name": "CVE-2025-22104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22104"
},
{
"name": "CVE-2022-2795",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2795"
},
{
"name": "CVE-2025-62526",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62526"
},
{
"name": "CVE-2024-49918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49918"
},
{
"name": "CVE-2025-68296",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68296"
},
{
"name": "CVE-2023-53785",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53785"
},
{
"name": "CVE-2024-45776",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45776"
},
{
"name": "CVE-2022-50090",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50090"
},
{
"name": "CVE-2025-40340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40340"
},
{
"name": "CVE-2025-68332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68332"
},
{
"name": "CVE-2020-14356",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14356"
},
{
"name": "CVE-2025-68745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68745"
},
{
"name": "CVE-2023-54263",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54263"
},
{
"name": "CVE-2025-71104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71104"
},
{
"name": "CVE-2026-22978",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22978"
},
{
"name": "CVE-2023-53764",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53764"
},
{
"name": "CVE-2024-53687",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53687"
},
{
"name": "CVE-2025-39901",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39901"
},
{
"name": "CVE-2025-40283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40283"
},
{
"name": "CVE-2025-5918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5918"
},
{
"name": "CVE-2024-38628",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38628"
},
{
"name": "CVE-2025-40324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40324"
},
{
"name": "CVE-2025-38672",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38672"
},
{
"name": "CVE-2023-54181",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54181"
},
{
"name": "CVE-2025-0684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0684"
},
{
"name": "CVE-2025-10158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10158"
},
{
"name": "CVE-2025-68378",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68378"
},
{
"name": "CVE-2024-47794",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47794"
},
{
"name": "CVE-2026-23146",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23146"
},
{
"name": "CVE-2025-38272",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38272"
},
{
"name": "CVE-2024-10524",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10524"
},
{
"name": "CVE-2025-40146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40146"
},
{
"name": "CVE-2025-38359",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38359"
},
{
"name": "CVE-2019-20794",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20794"
},
{
"name": "CVE-2023-53849",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53849"
},
{
"name": "CVE-2022-4543",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4543"
},
{
"name": "CVE-2025-21899",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21899"
},
{
"name": "CVE-2024-35195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35195"
},
{
"name": "CVE-2025-38129",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38129"
},
{
"name": "CVE-2026-23037",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23037"
},
{
"name": "CVE-2023-53627",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53627"
},
{
"name": "CVE-2025-40250",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40250"
},
{
"name": "CVE-2025-38091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38091"
},
{
"name": "CVE-2023-53510",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53510"
},
{
"name": "CVE-2025-40264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40264"
},
{
"name": "CVE-2025-38334",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38334"
},
{
"name": "CVE-2023-53575",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53575"
},
{
"name": "CVE-2022-49516",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49516"
},
{
"name": "CVE-2025-40778",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40778"
},
{
"name": "CVE-2025-38728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38728"
},
{
"name": "CVE-2022-3523",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3523"
},
{
"name": "CVE-2026-26157",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26157"
},
{
"name": "CVE-2026-23001",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23001"
},
{
"name": "CVE-2023-38417",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38417"
},
{
"name": "CVE-2025-68367",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68367"
},
{
"name": "CVE-2025-71224",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71224"
},
{
"name": "CVE-2025-22072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22072"
},
{
"name": "CVE-2025-68820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68820"
},
{
"name": "CVE-2021-45261",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45261"
},
{
"name": "CVE-2025-40074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40074"
},
{
"name": "CVE-2026-23193",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23193"
},
{
"name": "CVE-2025-40321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40321"
},
{
"name": "CVE-2024-47736",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47736"
},
{
"name": "CVE-2023-53037",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53037"
},
{
"name": "CVE-2024-46842",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46842"
},
{
"name": "CVE-2025-71237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71237"
},
{
"name": "CVE-2025-13462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13462"
},
{
"name": "CVE-2024-50112",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50112"
},
{
"name": "CVE-2025-69646",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69646"
},
{
"name": "CVE-2023-54207",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54207"
},
{
"name": "CVE-2026-23215",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23215"
},
{
"name": "CVE-2024-28956",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28956"
},
{
"name": "CVE-2025-68740",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68740"
},
{
"name": "CVE-2020-26142",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26142"
},
{
"name": "CVE-2022-49955",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49955"
},
{
"name": "CVE-2023-53628",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53628"
},
{
"name": "CVE-2025-29943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29943"
},
{
"name": "CVE-2025-39978",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39978"
},
{
"name": "CVE-2023-31346",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31346"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2025-40158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40158"
},
{
"name": "CVE-2024-56201",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56201"
},
{
"name": "CVE-2025-38071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38071"
},
{
"name": "CVE-2025-38140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38140"
},
{
"name": "CVE-2022-50002",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50002"
},
{
"name": "CVE-2025-38621",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38621"
},
{
"name": "CVE-2025-68742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68742"
},
{
"name": "CVE-2025-39908",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39908"
},
{
"name": "CVE-2026-24842",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24842"
},
{
"name": "CVE-2024-49920",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49920"
},
{
"name": "CVE-2025-40282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40282"
},
{
"name": "CVE-2026-23118",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23118"
},
{
"name": "CVE-2025-34034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-34034"
},
{
"name": "CVE-2025-37984",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37984"
},
{
"name": "CVE-2025-59692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59692"
},
{
"name": "CVE-2022-50116",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50116"
},
{
"name": "CVE-2018-12931",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12931"
},
{
"name": "CVE-2025-40168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40168"
},
{
"name": "CVE-2025-37856",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37856"
},
{
"name": "CVE-2022-50224",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50224"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2020-13791",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13791"
},
{
"name": "CVE-2026-23950",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23950"
},
{
"name": "CVE-2024-49990",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49990"
},
{
"name": "CVE-2020-15802",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15802"
},
{
"name": "CVE-2020-24240",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24240"
},
{
"name": "CVE-2024-46718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46718"
},
{
"name": "CVE-2025-68816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68816"
},
{
"name": "CVE-2024-41045",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41045"
},
{
"name": "CVE-2023-53545",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53545"
},
{
"name": "CVE-2022-50552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50552"
},
{
"name": "CVE-2021-0066",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0066"
},
{
"name": "CVE-2025-38333",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38333"
},
{
"name": "CVE-2023-53376",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53376"
},
{
"name": "CVE-2023-53538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53538"
},
{
"name": "CVE-2025-68192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68192"
},
{
"name": "CVE-2024-5569",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5569"
},
{
"name": "CVE-2025-68379",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68379"
},
{
"name": "CVE-2022-50357",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50357"
},
{
"name": "CVE-2024-57952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57952"
},
{
"name": "CVE-2025-68256",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68256"
},
{
"name": "CVE-2025-68777",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68777"
},
{
"name": "CVE-2023-52671",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52671"
},
{
"name": "CVE-2022-50303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50303"
},
{
"name": "CVE-2024-35870",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35870"
},
{
"name": "CVE-2025-68254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68254"
},
{
"name": "CVE-2026-23221",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23221"
},
{
"name": "CVE-2025-38059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38059"
},
{
"name": "CVE-2024-27014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27014"
},
{
"name": "CVE-2024-36013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36013"
},
{
"name": "CVE-2024-53176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53176"
},
{
"name": "CVE-2025-37956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37956"
},
{
"name": "CVE-2025-40196",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40196"
},
{
"name": "CVE-2024-49880",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49880"
},
{
"name": "CVE-2023-52676",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52676"
},
{
"name": "CVE-2025-38117",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38117"
},
{
"name": "CVE-2017-13165",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13165"
},
{
"name": "CVE-2025-38556",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38556"
},
{
"name": "CVE-2025-68171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68171"
},
{
"name": "CVE-2025-39932",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39932"
},
{
"name": "CVE-2024-47683",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47683"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2024-46811",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46811"
},
{
"name": "CVE-2025-21985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21985"
},
{
"name": "CVE-2025-22109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22109"
},
{
"name": "CVE-2025-38300",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38300"
},
{
"name": "CVE-2025-40040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40040"
},
{
"name": "CVE-2023-53635",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53635"
},
{
"name": "CVE-2025-39810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39810"
},
{
"name": "CVE-2026-22982",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22982"
},
{
"name": "CVE-2025-23132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23132"
},
{
"name": "CVE-2024-47678",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47678"
},
{
"name": "CVE-2022-49531",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49531"
},
{
"name": "CVE-2022-49504",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49504"
},
{
"name": "CVE-2025-1376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1376"
},
{
"name": "CVE-2022-49810",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49810"
},
{
"name": "CVE-2025-47912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47912"
},
{
"name": "CVE-2025-71109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71109"
},
{
"name": "CVE-2023-26586",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26586"
},
{
"name": "CVE-2025-38373",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38373"
},
{
"name": "CVE-2025-66861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66861"
},
{
"name": "CVE-2025-40095",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40095"
},
{
"name": "CVE-2025-37957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37957"
},
{
"name": "CVE-2025-38369",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38369"
},
{
"name": "CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"name": "CVE-2024-44950",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44950"
},
{
"name": "CVE-2025-39759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39759"
},
{
"name": "CVE-2022-50332",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50332"
},
{
"name": "CVE-2023-53822",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53822"
},
{
"name": "CVE-2024-27408",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27408"
},
{
"name": "CVE-2025-71222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71222"
},
{
"name": "CVE-2022-50461",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50461"
},
{
"name": "CVE-2025-21801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21801"
},
{
"name": "CVE-2023-26554",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26554"
},
{
"name": "CVE-2025-38486",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38486"
},
{
"name": "CVE-2021-26934",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26934"
},
{
"name": "CVE-2023-53466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53466"
},
{
"name": "CVE-2025-21629",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21629"
},
{
"name": "CVE-2025-71118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71118"
},
{
"name": "CVE-2023-53168",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53168"
},
{
"name": "CVE-2022-49528",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49528"
},
{
"name": "CVE-2025-68160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68160"
},
{
"name": "CVE-2022-45888",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45888"
},
{
"name": "CVE-2022-49218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49218"
},
{
"name": "CVE-2023-52749",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52749"
},
{
"name": "CVE-2025-39754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39754"
},
{
"name": "CVE-2025-40286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40286"
},
{
"name": "CVE-2022-49967",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49967"
},
{
"name": "CVE-2025-68327",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68327"
},
{
"name": "CVE-2024-2236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2236"
},
{
"name": "CVE-2022-49245",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49245"
},
{
"name": "CVE-2025-38098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38098"
},
{
"name": "CVE-2023-52682",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52682"
},
{
"name": "CVE-2022-50871",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50871"
},
{
"name": "CVE-2025-71150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71150"
},
{
"name": "CVE-2025-71229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71229"
},
{
"name": "CVE-2026-23213",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23213"
},
{
"name": "CVE-2025-39958",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39958"
},
{
"name": "CVE-2018-8956",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8956"
},
{
"name": "CVE-2025-40266",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40266"
},
{
"name": "CVE-2026-23091",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23091"
},
{
"name": "CVE-2025-68241",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68241"
},
{
"name": "CVE-2022-49420",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49420"
},
{
"name": "CVE-2022-40964",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40964"
},
{
"name": "CVE-2025-69873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69873"
},
{
"name": "CVE-2026-3441",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3441"
},
{
"name": "CVE-2024-36244",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36244"
},
{
"name": "CVE-2023-53149",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53149"
},
{
"name": "CVE-2026-23237",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23237"
},
{
"name": "CVE-2024-49987",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49987"
},
{
"name": "CVE-2025-60753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-60753"
},
{
"name": "CVE-2022-50746",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50746"
},
{
"name": "CVE-2025-52565",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52565"
},
{
"name": "CVE-2024-50034",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50034"
},
{
"name": "CVE-2025-38259",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38259"
},
{
"name": "CVE-2025-71192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71192"
},
{
"name": "CVE-2023-53596",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53596"
},
{
"name": "CVE-2022-49943",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49943"
},
{
"name": "CVE-2022-50260",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50260"
},
{
"name": "CVE-2025-40135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40135"
},
{
"name": "CVE-2025-67735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-67735"
},
{
"name": "CVE-2026-23121",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23121"
},
{
"name": "CVE-2020-12319",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12319"
},
{
"name": "CVE-2025-37951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37951"
},
{
"name": "CVE-2023-50495",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50495"
},
{
"name": "CVE-2024-49568",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49568"
},
{
"name": "CVE-2025-21750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21750"
},
{
"name": "CVE-2024-36924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36924"
},
{
"name": "CVE-2017-11164",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11164"
},
{
"name": "CVE-2023-3397",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3397"
},
{
"name": "CVE-2025-68734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68734"
},
{
"name": "CVE-2024-26672",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26672"
},
{
"name": "CVE-2024-57924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57924"
},
{
"name": "CVE-2025-37947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37947"
},
{
"name": "CVE-2025-68776",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68776"
},
{
"name": "CVE-2025-61728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61728"
},
{
"name": "CVE-2025-71066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71066"
},
{
"name": "CVE-2026-0965",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0965"
},
{
"name": "CVE-2023-53806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53806"
},
{
"name": "CVE-2025-21817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21817"
},
{
"name": "CVE-2025-68972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68972"
},
{
"name": "CVE-2025-68799",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68799"
},
{
"name": "CVE-2021-33139",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33139"
},
{
"name": "CVE-2025-58186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58186"
},
{
"name": "CVE-2025-21825",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21825"
},
{
"name": "CVE-2025-38192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38192"
},
{
"name": "CVE-2025-71236",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71236"
},
{
"name": "CVE-2025-68345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68345"
},
{
"name": "CVE-2025-39800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39800"
},
{
"name": "CVE-2024-50057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50057"
},
{
"name": "CVE-2025-38343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38343"
},
{
"name": "CVE-2025-71097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71097"
},
{
"name": "CVE-2024-46808",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46808"
},
{
"name": "CVE-2026-26158",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26158"
},
{
"name": "CVE-2025-38202",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38202"
},
{
"name": "CVE-2025-68288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68288"
},
{
"name": "CVE-2025-38168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38168"
},
{
"name": "CVE-2023-53547",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53547"
},
{
"name": "CVE-2019-20426",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20426"
},
{
"name": "CVE-2025-71107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71107"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2025-40310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40310"
},
{
"name": "CVE-2026-29786",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-29786"
},
{
"name": "CVE-2025-58187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58187"
},
{
"name": "CVE-2025-40083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40083"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2024-56584",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56584"
},
{
"name": "CVE-2026-23235",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23235"
},
{
"name": "CVE-2025-71111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71111"
},
{
"name": "CVE-2022-4899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4899"
},
{
"name": "CVE-2025-71152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71152"
},
{
"name": "CVE-2024-42139",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42139"
},
{
"name": "CVE-2024-56692",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56692"
},
{
"name": "CVE-2024-53196",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53196"
},
{
"name": "CVE-2025-38665",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38665"
},
{
"name": "CVE-2022-50212",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50212"
},
{
"name": "CVE-2026-23087",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23087"
},
{
"name": "CVE-2023-54259",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54259"
},
{
"name": "CVE-2025-68802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68802"
},
{
"name": "CVE-2023-54067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54067"
},
{
"name": "CVE-2025-1369",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1369"
},
{
"name": "CVE-2022-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3219"
},
{
"name": "CVE-2025-68317",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68317"
},
{
"name": "CVE-2023-53231",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53231"
},
{
"name": "CVE-2025-71185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71185"
},
{
"name": "CVE-2022-2961",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2961"
},
{
"name": "CVE-2025-40331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40331"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2022-49635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49635"
},
{
"name": "CVE-2024-50017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50017"
},
{
"name": "CVE-2026-23096",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23096"
},
{
"name": "CVE-2024-53241",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53241"
},
{
"name": "CVE-2025-14180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14180"
},
{
"name": "CVE-2026-23949",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23949"
},
{
"name": "CVE-2025-38704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38704"
},
{
"name": "CVE-2023-34969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34969"
},
{
"name": "CVE-2021-33155",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33155"
},
{
"name": "CVE-2025-68337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68337"
},
{
"name": "CVE-2024-57899",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57899"
},
{
"name": "CVE-2024-49928",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49928"
},
{
"name": "CVE-2025-21885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21885"
},
{
"name": "CVE-2024-50187",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50187"
},
{
"name": "CVE-2022-50851",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50851"
},
{
"name": "CVE-2025-36001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36001"
},
{
"name": "CVE-2022-50464",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50464"
},
{
"name": "CVE-2025-38674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38674"
},
{
"name": "CVE-2025-40093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40093"
},
{
"name": "CVE-2020-26560",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26560"
},
{
"name": "CVE-2024-26714",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26714"
},
{
"name": "CVE-2024-45777",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45777"
},
{
"name": "CVE-2025-38040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38040"
},
{
"name": "CVE-2024-40954",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40954"
},
{
"name": "CVE-2022-49965",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49965"
},
{
"name": "CVE-2025-54771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54771"
},
{
"name": "CVE-2024-0564",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0564"
},
{
"name": "CVE-2025-39825",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39825"
},
{
"name": "CVE-2025-71131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71131"
},
{
"name": "CVE-2022-49961",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49961"
},
{
"name": "CVE-2025-69651",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69651"
},
{
"name": "CVE-2025-38552",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38552"
},
{
"name": "CVE-2025-40335",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40335"
},
{
"name": "CVE-2025-40149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40149"
},
{
"name": "CVE-2024-58098",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58098"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2022-28667",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28667"
},
{
"name": "CVE-2023-53383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53383"
},
{
"name": "CVE-2024-46717",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46717"
},
{
"name": "CVE-2024-25743",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25743"
},
{
"name": "CVE-2022-50704",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50704"
},
{
"name": "CVE-2025-40164",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40164"
},
{
"name": "CVE-2023-54125",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54125"
},
{
"name": "CVE-2025-10911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10911"
},
{
"name": "CVE-2026-23164",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23164"
},
{
"name": "CVE-2024-41036",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41036"
},
{
"name": "CVE-2023-53751",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53751"
},
{
"name": "CVE-2025-0033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0033"
},
{
"name": "CVE-2023-53743",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53743"
},
{
"name": "CVE-2024-42319",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42319"
},
{
"name": "CVE-2025-37928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37928"
},
{
"name": "CVE-2017-13716",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13716"
},
{
"name": "CVE-2024-22018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22018"
},
{
"name": "CVE-2025-71116",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71116"
},
{
"name": "CVE-2022-40735",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40735"
},
{
"name": "CVE-2024-36024",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36024"
},
{
"name": "CVE-2025-21723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21723"
},
{
"name": "CVE-2023-54190",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54190"
},
{
"name": "CVE-2023-52879",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52879"
},
{
"name": "CVE-2025-68281",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68281"
},
{
"name": "CVE-2023-52837",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52837"
},
{
"name": "CVE-2025-38440",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38440"
},
{
"name": "CVE-2026-23124",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23124"
},
{
"name": "CVE-2023-52981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52981"
},
{
"name": "CVE-2024-53224",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53224"
},
{
"name": "CVE-2024-49910",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49910"
},
{
"name": "CVE-2025-68362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68362"
},
{
"name": "CVE-2023-53105",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53105"
},
{
"name": "CVE-2025-68236",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68236"
},
{
"name": "CVE-2024-39286",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39286"
},
{
"name": "CVE-2025-25184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25184"
},
{
"name": "CVE-2025-14524",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14524"
},
{
"name": "CVE-2024-49855",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49855"
},
{
"name": "CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"name": "CVE-2025-68333",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68333"
},
{
"name": "CVE-2024-47689",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47689"
},
{
"name": "CVE-2025-71160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71160"
},
{
"name": "CVE-2025-71232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71232"
},
{
"name": "CVE-2023-52625",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52625"
},
{
"name": "CVE-2023-53353",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53353"
},
{
"name": "CVE-2024-58096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58096"
},
{
"name": "CVE-2025-38225",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38225"
},
{
"name": "CVE-2023-53401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53401"
},
{
"name": "CVE-2025-22037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22037"
},
{
"name": "CVE-2023-53702",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53702"
},
{
"name": "CVE-2025-68290",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68290"
},
{
"name": "CVE-2025-40280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40280"
},
{
"name": "CVE-2024-26842",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26842"
},
{
"name": "CVE-2025-40099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40099"
},
{
"name": "CVE-2023-54059",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54059"
},
{
"name": "CVE-2025-71162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71162"
},
{
"name": "CVE-2021-0170",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0170"
},
{
"name": "CVE-2019-10782",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10782"
},
{
"name": "CVE-2024-40966",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40966"
},
{
"name": "CVE-2024-53133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53133"
},
{
"name": "CVE-2026-23075",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23075"
},
{
"name": "CVE-2022-50571",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50571"
},
{
"name": "CVE-2021-31879",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31879"
},
{
"name": "CVE-2026-23120",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23120"
},
{
"name": "CVE-2025-40180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40180"
},
{
"name": "CVE-2022-49393",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49393"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2025-68803",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68803"
},
{
"name": "CVE-2026-22996",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22996"
},
{
"name": "CVE-2024-53091",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53091"
},
{
"name": "CVE-2025-39851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39851"
},
{
"name": "CVE-2025-71204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71204"
},
{
"name": "CVE-2025-68331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68331"
},
{
"name": "CVE-2025-38244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38244"
},
{
"name": "CVE-2022-29217",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29217"
},
{
"name": "CVE-2024-26758",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26758"
},
{
"name": "CVE-2025-38080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38080"
},
{
"name": "CVE-2023-32651",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32651"
},
{
"name": "CVE-2025-37747",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37747"
},
{
"name": "CVE-2026-2297",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2297"
},
{
"name": "CVE-2026-23105",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23105"
},
{
"name": "CVE-2023-53036",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53036"
},
{
"name": "CVE-2025-38615",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38615"
},
{
"name": "CVE-2025-58181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58181"
},
{
"name": "CVE-2025-71115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71115"
},
{
"name": "CVE-2026-22976",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22976"
},
{
"name": "CVE-2022-50862",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50862"
},
{
"name": "CVE-2025-1118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1118"
},
{
"name": "CVE-2024-50166",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50166"
},
{
"name": "CVE-2024-35862",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35862"
},
{
"name": "CVE-2023-53355",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53355"
},
{
"name": "CVE-2022-25265",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25265"
},
{
"name": "CVE-2026-0967",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0967"
},
{
"name": "CVE-2026-23181",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23181"
},
{
"name": "CVE-2025-37944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37944"
},
{
"name": "CVE-2023-53558",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53558"
},
{
"name": "CVE-2025-47914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47914"
},
{
"name": "CVE-2025-68214",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68214"
},
{
"name": "CVE-2025-38703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38703"
},
{
"name": "CVE-2026-23141",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23141"
},
{
"name": "CVE-2026-22860",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22860"
},
{
"name": "CVE-2025-36365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36365"
},
{
"name": "CVE-2025-9403",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9403"
},
{
"name": "CVE-2025-40247",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40247"
},
{
"name": "CVE-2023-1255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1255"
},
{
"name": "CVE-2024-56641",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56641"
},
{
"name": "CVE-2024-43842",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43842"
},
{
"name": "CVE-2025-0686",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0686"
},
{
"name": "CVE-2025-21739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21739"
},
{
"name": "CVE-2024-49992",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49992"
},
{
"name": "CVE-2025-68781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68781"
},
{
"name": "CVE-2025-39753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39753"
},
{
"name": "CVE-2025-69418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69418"
},
{
"name": "CVE-2026-23182",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23182"
},
{
"name": "CVE-2021-0173",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0173"
},
{
"name": "CVE-2025-71112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71112"
},
{
"name": "CVE-2023-54285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54285"
},
{
"name": "CVE-2024-45778",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45778"
},
{
"name": "CVE-2026-23086",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23086"
},
{
"name": "CVE-2024-47661",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47661"
},
{
"name": "CVE-2026-28418",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28418"
},
{
"name": "CVE-2023-54151",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54151"
},
{
"name": "CVE-2025-22022",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22022"
},
{
"name": "CVE-2025-66864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66864"
},
{
"name": "CVE-2024-46803",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46803"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2025-59466",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59466"
},
{
"name": "CVE-2025-40192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40192"
},
{
"name": "CVE-2025-38544",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38544"
},
{
"name": "CVE-2025-39797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39797"
},
{
"name": "CVE-2025-68818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68818"
},
{
"name": "CVE-2022-36351",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36351"
},
{
"name": "CVE-2023-52921",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52921"
},
{
"name": "CVE-2025-15468",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15468"
},
{
"name": "CVE-2024-36478",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36478"
},
{
"name": "CVE-2024-43832",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43832"
},
{
"name": "CVE-2026-25639",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25639"
},
{
"name": "CVE-2026-1299",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1299"
},
{
"name": "CVE-2024-54683",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54683"
},
{
"name": "CVE-2025-1150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1150"
},
{
"name": "CVE-2024-46720",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46720"
},
{
"name": "CVE-2024-26658",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26658"
},
{
"name": "CVE-2026-2243",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2243"
},
{
"name": "CVE-2025-38198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38198"
},
{
"name": "CVE-2025-58189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58189"
},
{
"name": "CVE-2022-36087",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36087"
},
{
"name": "CVE-2024-38564",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38564"
},
{
"name": "CVE-2021-0174",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0174"
},
{
"name": "CVE-2025-8746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8746"
},
{
"name": "CVE-2025-36442",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36442"
},
{
"name": "CVE-2025-38006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38006"
},
{
"name": "CVE-2025-40102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40102"
},
{
"name": "CVE-2026-0968",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0968"
},
{
"name": "CVE-2025-40170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40170"
},
{
"name": "CVE-2025-38437",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38437"
},
{
"name": "CVE-2025-40160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40160"
},
{
"name": "CVE-2023-7008",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7008"
},
{
"name": "CVE-2024-45779",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45779"
},
{
"name": "CVE-2025-40284",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40284"
},
{
"name": "CVE-2025-38125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38125"
},
{
"name": "CVE-2025-40077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40077"
},
{
"name": "CVE-2024-57857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57857"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2022-50213",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50213"
},
{
"name": "CVE-2024-46823",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46823"
},
{
"name": "CVE-2023-32642",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32642"
},
{
"name": "CVE-2025-71227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71227"
},
{
"name": "CVE-2025-61772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61772"
},
{
"name": "CVE-2024-46733",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46733"
},
{
"name": "CVE-2024-41014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41014"
},
{
"name": "CVE-2022-50015",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50015"
},
{
"name": "CVE-2025-40071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40071"
},
{
"name": "CVE-2024-7883",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7883"
},
{
"name": "CVE-2024-50271",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50271"
},
{
"name": "CVE-2022-50772",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50772"
},
{
"name": "CVE-2024-56717",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56717"
},
{
"name": "CVE-2025-68366",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68366"
},
{
"name": "CVE-2024-56707",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56707"
},
{
"name": "CVE-2023-54234",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54234"
},
{
"name": "CVE-2022-45885",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45885"
},
{
"name": "CVE-2022-49783",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49783"
},
{
"name": "CVE-2025-40305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40305"
},
{
"name": "CVE-2016-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2781"
},
{
"name": "CVE-2023-29383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
},
{
"name": "CVE-2025-47153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47153"
},
{
"name": "CVE-2025-40080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40080"
},
{
"name": "CVE-2024-53216",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53216"
},
{
"name": "CVE-2022-49539",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49539"
},
{
"name": "CVE-2024-36347",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36347"
},
{
"name": "CVE-2024-26869",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26869"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2025-68815",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68815"
},
{
"name": "CVE-2021-20255",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20255"
},
{
"name": "CVE-2022-48979",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48979"
},
{
"name": "CVE-2025-40307",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40307"
},
{
"name": "CVE-2025-71193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71193"
},
{
"name": "CVE-2023-54180",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54180"
},
{
"name": "CVE-2026-23095",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23095"
},
{
"name": "CVE-2024-46848",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46848"
},
{
"name": "CVE-2025-68346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68346"
},
{
"name": "CVE-2025-38081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38081"
},
{
"name": "CVE-2024-36009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36009"
},
{
"name": "CVE-2025-71163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71163"
},
{
"name": "CVE-2024-36350",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36350"
},
{
"name": "CVE-2023-25951",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25951"
},
{
"name": "CVE-2025-40211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40211"
},
{
"name": "CVE-2023-53152",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53152"
},
{
"name": "CVE-2021-0308",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0308"
},
{
"name": "CVE-2025-68315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68315"
},
{
"name": "CVE-2024-50009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50009"
},
{
"name": "CVE-2025-39850",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39850"
},
{
"name": "CVE-2022-1205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1205"
},
{
"name": "CVE-2023-45927",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45927"
},
{
"name": "CVE-2020-25742",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25742"
},
{
"name": "CVE-2022-0987",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0987"
},
{
"name": "CVE-2025-71096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71096"
},
{
"name": "CVE-2025-71095",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71095"
},
{
"name": "CVE-2025-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40217"
},
{
"name": "CVE-2025-38199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38199"
},
{
"name": "CVE-2025-39905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39905"
},
{
"name": "CVE-2025-21944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21944"
},
{
"name": "CVE-2022-50720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50720"
},
{
"name": "CVE-2025-71105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71105"
},
{
"name": "CVE-2023-50387",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50387"
},
{
"name": "CVE-2022-49529",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49529"
},
{
"name": "CVE-2025-68266",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68266"
},
{
"name": "CVE-2024-27057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27057"
},
{
"name": "CVE-2025-68771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68771"
},
{
"name": "CVE-2025-39961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39961"
},
{
"name": "CVE-2025-68363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68363"
},
{
"name": "CVE-2024-54456",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54456"
},
{
"name": "CVE-2024-26876",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26876"
},
{
"name": "CVE-2025-40248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40248"
},
{
"name": "CVE-2023-52657",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52657"
},
{
"name": "CVE-2025-37876",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37876"
},
{
"name": "CVE-2024-58089",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58089"
},
{
"name": "CVE-2024-36331",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36331"
},
{
"name": "CVE-2026-27571",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27571"
},
{
"name": "CVE-2025-39748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39748"
},
{
"name": "CVE-2026-22984",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22984"
},
{
"name": "CVE-2026-27139",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27139"
},
{
"name": "CVE-2022-49127",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49127"
},
{
"name": "CVE-2026-24733",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24733"
},
{
"name": "CVE-2020-25741",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25741"
},
{
"name": "CVE-2022-50748",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50748"
},
{
"name": "CVE-2023-53767",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53767"
},
{
"name": "CVE-2025-21667",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21667"
},
{
"name": "CVE-2025-9230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9230"
},
{
"name": "CVE-2023-49083",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49083"
},
{
"name": "CVE-2025-21696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21696"
},
{
"name": "CVE-2025-68303",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68303"
},
{
"name": "CVE-2025-21955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21955"
},
{
"name": "CVE-2025-39863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39863"
},
{
"name": "CVE-2025-40259",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40259"
},
{
"name": "CVE-2023-53180",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53180"
},
{
"name": "CVE-2026-28419",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28419"
},
{
"name": "CVE-2025-8677",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8677"
},
{
"name": "CVE-2025-38560",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38560"
},
{
"name": "CVE-2023-53385",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53385"
},
{
"name": "CVE-2026-23206",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23206"
},
{
"name": "CVE-2025-68757",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68757"
},
{
"name": "CVE-2024-46678",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46678"
},
{
"name": "CVE-2024-58097",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58097"
},
{
"name": "CVE-2023-53620",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53620"
},
{
"name": "CVE-2022-50539",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50539"
},
{
"name": "CVE-2025-71068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71068"
},
{
"name": "CVE-2025-23130",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23130"
},
{
"name": "CVE-2022-49496",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49496"
},
{
"name": "CVE-2025-38349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38349"
},
{
"name": "CVE-2024-56782",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56782"
},
{
"name": "CVE-2025-39957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39957"
},
{
"name": "CVE-2025-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1352"
},
{
"name": "CVE-2023-53540",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53540"
},
{
"name": "CVE-2022-49552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49552"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2023-53261",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53261"
},
{
"name": "CVE-2026-24049",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24049"
},
{
"name": "CVE-2026-23033",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23033"
},
{
"name": "CVE-2025-39726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39726"
},
{
"name": "CVE-2024-26759",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26759"
},
{
"name": "CVE-2025-48924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48924"
},
{
"name": "CVE-2025-39931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39931"
},
{
"name": "CVE-2023-54187",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54187"
},
{
"name": "CVE-2026-22977",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22977"
},
{
"name": "CVE-2026-23145",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23145"
},
{
"name": "CVE-2022-44032",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44032"
},
{
"name": "CVE-2024-57895",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57895"
},
{
"name": "CVE-2023-53240",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53240"
},
{
"name": "CVE-2025-13735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13735"
},
{
"name": "CVE-2023-53694",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53694"
},
{
"name": "CVE-2024-53195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53195"
},
{
"name": "CVE-2024-35794",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35794"
},
{
"name": "CVE-2023-52829",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52829"
},
{
"name": "CVE-2026-23003",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23003"
},
{
"name": "CVE-2025-21891",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21891"
},
{
"name": "CVE-2025-38716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38716"
},
{
"name": "CVE-2025-11187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11187"
},
{
"name": "CVE-2024-56660",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56660"
},
{
"name": "CVE-2026-23076",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23076"
},
{
"name": "CVE-2023-54145",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54145"
},
{
"name": "CVE-2025-38033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38033"
},
{
"name": "CVE-2024-41023",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41023"
},
{
"name": "CVE-2024-47704",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47704"
},
{
"name": "CVE-2025-21672",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21672"
},
{
"name": "CVE-2024-35801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35801"
},
{
"name": "CVE-2024-49978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49978"
},
{
"name": "CVE-2024-36910",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36910"
},
{
"name": "CVE-2025-15079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15079"
},
{
"name": "CVE-2024-49870",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49870"
},
{
"name": "CVE-2025-36366",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36366"
},
{
"name": "CVE-2024-42125",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42125"
},
{
"name": "CVE-2025-36123",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36123"
},
{
"name": "CVE-2024-56737",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56737"
},
{
"name": "CVE-2025-68168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68168"
},
{
"name": "CVE-2025-21821",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21821"
},
{
"name": "CVE-2025-68206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68206"
},
{
"name": "CVE-2020-11935",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11935"
},
{
"name": "CVE-2023-54247",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54247"
},
{
"name": "CVE-2025-68309",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68309"
},
{
"name": "CVE-2023-52905",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52905"
},
{
"name": "CVE-2024-57852",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57852"
},
{
"name": "CVE-2025-40003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40003"
},
{
"name": "CVE-2025-22042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22042"
},
{
"name": "CVE-2025-71158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71158"
},
{
"name": "CVE-2022-49803",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49803"
},
{
"name": "CVE-2024-57898",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57898"
},
{
"name": "CVE-2020-35503",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35503"
},
{
"name": "CVE-2024-49923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49923"
},
{
"name": "CVE-2024-56639",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56639"
},
{
"name": "CVE-2025-68372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68372"
},
{
"name": "CVE-2026-23171",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23171"
},
{
"name": "CVE-2024-3651",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
},
{
"name": "CVE-2023-53002",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53002"
},
{
"name": "CVE-2021-0183",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0183"
},
{
"name": "CVE-2025-39884",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39884"
},
{
"name": "CVE-2025-39747",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39747"
},
{
"name": "CVE-2024-36914",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36914"
},
{
"name": "CVE-2026-26996",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26996"
},
{
"name": "CVE-2024-35826",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35826"
},
{
"name": "CVE-2026-23112",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23112"
},
{
"name": "CVE-2022-49764",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49764"
},
{
"name": "CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"name": "CVE-2025-21651",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21651"
},
{
"name": "CVE-2025-38092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38092"
},
{
"name": "CVE-2025-22124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22124"
},
{
"name": "CVE-2025-68313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68313"
},
{
"name": "CVE-2024-58053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58053"
},
{
"name": "CVE-2023-26553",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26553"
},
{
"name": "CVE-2025-60876",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-60876"
},
{
"name": "CVE-2025-37776",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37776"
},
{
"name": "CVE-2021-23840",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23840"
},
{
"name": "CVE-2024-58077",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58077"
},
{
"name": "CVE-2024-6519",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6519"
},
{
"name": "CVE-2024-46729",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46729"
},
{
"name": "CVE-2023-53850",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53850"
},
{
"name": "CVE-2023-2975",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2975"
},
{
"name": "CVE-2022-50266",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50266"
},
{
"name": "CVE-2024-53178",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53178"
},
{
"name": "CVE-2025-71137",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71137"
},
{
"name": "CVE-2026-23084",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23084"
},
{
"name": "CVE-2023-53093",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53093"
},
{
"name": "CVE-2025-11065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11065"
},
{
"name": "CVE-2026-23190",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23190"
},
{
"name": "CVE-2025-40123",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40123"
},
{
"name": "CVE-2026-22979",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22979"
},
{
"name": "CVE-2025-68301",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68301"
},
{
"name": "CVE-2024-49991",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49991"
},
{
"name": "CVE-2022-50009",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50009"
},
{
"name": "CVE-2022-26047",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26047"
},
{
"name": "CVE-2024-53240",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53240"
},
{
"name": "CVE-2026-23011",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23011"
},
{
"name": "CVE-2024-36949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36949"
},
{
"name": "CVE-2023-53816",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53816"
},
{
"name": "CVE-2025-37877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37877"
},
{
"name": "CVE-2024-2193",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2193"
},
{
"name": "CVE-2025-4382",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4382"
},
{
"name": "CVE-2022-28693",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28693"
},
{
"name": "CVE-2025-71161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71161"
},
{
"name": "CVE-2025-39706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39706"
},
{
"name": "CVE-2025-22038",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22038"
},
{
"name": "CVE-2025-68217",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68217"
},
{
"name": "CVE-2023-54242",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54242"
},
{
"name": "CVE-2025-68289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68289"
},
{
"name": "CVE-2025-40363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40363"
},
{
"name": "CVE-2024-41062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41062"
},
{
"name": "CVE-2025-40253",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40253"
},
{
"name": "CVE-2022-48816",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48816"
},
{
"name": "CVE-2026-27141",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27141"
},
{
"name": "CVE-2025-37800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37800"
},
{
"name": "CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"name": "CVE-2022-50518",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50518"
},
{
"name": "CVE-2022-49829",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49829"
},
{
"name": "CVE-2025-64756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64756"
},
{
"name": "CVE-2025-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21967"
},
{
"name": "CVE-2016-2568",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2568"
},
{
"name": "CVE-2020-13817",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13817"
},
{
"name": "CVE-2025-68245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68245"
},
{
"name": "CVE-2025-41254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41254"
},
{
"name": "CVE-2018-12929",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12929"
},
{
"name": "CVE-2024-26853",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26853"
},
{
"name": "CVE-2024-53147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53147"
},
{
"name": "CVE-2025-39952",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39952"
},
{
"name": "CVE-2025-40317",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40317"
},
{
"name": "CVE-2024-45783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45783"
},
{
"name": "CVE-2026-23110",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23110"
},
{
"name": "CVE-2023-53410",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53410"
},
{
"name": "CVE-2023-53254",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53254"
},
{
"name": "CVE-2024-34064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34064"
},
{
"name": "CVE-2023-47210",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47210"
},
{
"name": "CVE-2025-68809",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68809"
},
{
"name": "CVE-2025-53864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53864"
},
{
"name": "CVE-2024-36920",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36920"
},
{
"name": "CVE-2021-0165",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0165"
},
{
"name": "CVE-2025-0624",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0624"
},
{
"name": "CVE-2022-49177",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49177"
},
{
"name": "CVE-2025-38205",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38205"
},
{
"name": "CVE-2026-23100",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23100"
},
{
"name": "CVE-2025-59464",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59464"
},
{
"name": "CVE-2024-58241",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58241"
},
{
"name": "CVE-2025-21863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21863"
},
{
"name": "CVE-2025-71120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71120"
},
{
"name": "CVE-2025-38166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38166"
},
{
"name": "CVE-2022-49833",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49833"
},
{
"name": "CVE-2026-23060",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23060"
},
{
"name": "CVE-2025-38321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38321"
},
{
"name": "CVE-2025-68282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68282"
},
{
"name": "CVE-2025-39705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39705"
},
{
"name": "CVE-2025-68817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68817"
},
{
"name": "CVE-2024-36021",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36021"
},
{
"name": "CVE-2025-38045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38045"
},
{
"name": "CVE-2024-46726",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46726"
},
{
"name": "CVE-2025-40025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40025"
},
{
"name": "CVE-2024-53079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53079"
},
{
"name": "CVE-2025-68787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68787"
},
{
"name": "CVE-2025-1125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1125"
},
{
"name": "CVE-2023-53647",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53647"
},
{
"name": "CVE-2025-37954",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37954"
},
{
"name": "CVE-2025-23133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23133"
},
{
"name": "CVE-2025-0012",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0012"
},
{
"name": "CVE-2020-12313",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12313"
},
{
"name": "CVE-2025-71233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71233"
},
{
"name": "CVE-2025-68782",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68782"
},
{
"name": "CVE-2021-0166",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0166"
},
{
"name": "CVE-2025-21945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21945"
},
{
"name": "CVE-2022-3872",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3872"
},
{
"name": "CVE-2025-39744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39744"
},
{
"name": "CVE-2025-71197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71197"
},
{
"name": "CVE-2025-68177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68177"
},
{
"name": "CVE-2025-68758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68758"
},
{
"name": "CVE-2024-49931",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49931"
},
{
"name": "CVE-2024-43866",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43866"
},
{
"name": "CVE-2024-37021",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37021"
},
{
"name": "CVE-2024-47728",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47728"
},
{
"name": "CVE-2025-27610",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27610"
},
{
"name": "CVE-2025-68191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68191"
},
{
"name": "CVE-2026-23031",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23031"
},
{
"name": "CVE-2024-46730",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46730"
},
{
"name": "CVE-2025-71113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71113"
},
{
"name": "CVE-2025-71127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71127"
},
{
"name": "CVE-2025-37786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37786"
},
{
"name": "CVE-2024-46728",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46728"
},
{
"name": "CVE-2023-53561",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53561"
},
{
"name": "CVE-2026-22998",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22998"
},
{
"name": "CVE-2023-54172",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54172"
},
{
"name": "CVE-2026-23050",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23050"
},
{
"name": "CVE-2024-58100",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58100"
},
{
"name": "CVE-2020-0256",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0256"
},
{
"name": "CVE-2025-21673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21673"
},
{
"name": "CVE-2024-26954",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26954"
},
{
"name": "CVE-2025-21634",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21634"
},
{
"name": "CVE-2024-57999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57999"
},
{
"name": "CVE-2025-38047",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38047"
},
{
"name": "CVE-2024-47738",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47738"
},
{
"name": "CVE-2025-68340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68340"
},
{
"name": "CVE-2024-41013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41013"
},
{
"name": "CVE-2023-54320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54320"
},
{
"name": "CVE-2024-43911",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43911"
},
{
"name": "CVE-2025-30204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30204"
},
{
"name": "CVE-2025-37959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37959"
},
{
"name": "CVE-2017-0537",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0537"
},
{
"name": "CVE-2025-38191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38191"
},
{
"name": "CVE-2023-32681",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32681"
},
{
"name": "CVE-2025-68219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68219"
},
{
"name": "CVE-2022-50232",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50232"
},
{
"name": "CVE-2025-38062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38062"
},
{
"name": "CVE-2025-38531",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38531"
},
{
"name": "CVE-2023-26112",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26112"
},
{
"name": "CVE-2018-6952",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-6952"
},
{
"name": "CVE-2020-14304",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14304"
},
{
"name": "CVE-2024-46834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46834"
},
{
"name": "CVE-2025-40288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40288"
},
{
"name": "CVE-2025-68239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68239"
},
{
"name": "CVE-2025-40258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40258"
},
{
"name": "CVE-2025-21894",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21894"
},
{
"name": "CVE-2025-40281",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40281"
},
{
"name": "CVE-2025-68185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68185"
},
{
"name": "CVE-2025-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40304"
},
{
"name": "CVE-2025-38503",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38503"
},
{
"name": "CVE-2025-40110",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40110"
},
{
"name": "CVE-2026-24001",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24001"
},
{
"name": "CVE-2025-37807",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37807"
},
{
"name": "CVE-2025-38131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38131"
},
{
"name": "CVE-2022-50016",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50016"
},
{
"name": "CVE-2025-29481",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29481"
},
{
"name": "CVE-2024-53219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53219"
},
{
"name": "CVE-2023-53009",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53009"
},
{
"name": "CVE-2025-40268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40268"
},
{
"name": "CVE-2025-61661",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61661"
},
{
"name": "CVE-2026-23111",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23111"
},
{
"name": "CVE-2024-25740",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25740"
},
{
"name": "CVE-2024-50246",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50246"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2025-14178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14178"
},
{
"name": "CVE-2024-57950",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57950"
},
{
"name": "CVE-2025-21759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21759"
},
{
"name": "CVE-2025-40325",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40325"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2024-42321",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42321"
},
{
"name": "CVE-2026-23113",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23113"
},
{
"name": "CVE-2021-0176",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0176"
},
{
"name": "CVE-2025-1151",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1151"
},
{
"name": "CVE-2022-48998",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48998"
},
{
"name": "CVE-2025-68798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68798"
},
{
"name": "CVE-2024-42273",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42273"
},
{
"name": "CVE-2025-68336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68336"
},
{
"name": "CVE-2023-53794",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53794"
},
{
"name": "CVE-2026-23157",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23157"
},
{
"name": "CVE-2025-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40303"
},
{
"name": "CVE-2025-68178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68178"
},
{
"name": "CVE-2022-49974",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49974"
},
{
"name": "CVE-2025-40337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40337"
},
{
"name": "CVE-2019-20633",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20633"
},
{
"name": "CVE-2025-38264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38264"
},
{
"name": "CVE-2021-3714",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3714"
},
{
"name": "CVE-2023-54071",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54071"
},
{
"name": "CVE-2024-56566",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56566"
},
{
"name": "CVE-2025-46392",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46392"
},
{
"name": "CVE-2025-40036",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40036"
},
{
"name": "CVE-2024-57993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57993"
},
{
"name": "CVE-2024-47745",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47745"
},
{
"name": "CVE-2025-39833",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39833"
},
{
"name": "CVE-2026-23097",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23097"
},
{
"name": "CVE-2025-37980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37980"
},
{
"name": "CVE-2024-53190",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53190"
},
{
"name": "CVE-2025-40262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40262"
},
{
"name": "CVE-2024-35784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35784"
},
{
"name": "CVE-2024-56591",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56591"
},
{
"name": "CVE-2024-56544",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56544"
},
{
"name": "CVE-2024-56647",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56647"
},
{
"name": "CVE-2025-71198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71198"
},
{
"name": "CVE-2025-21649",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21649"
},
{
"name": "CVE-2024-57976",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57976"
},
{
"name": "CVE-2025-68819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68819"
},
{
"name": "CVE-2025-0685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0685"
},
{
"name": "CVE-2024-57893",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57893"
},
{
"name": "CVE-2026-23231",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23231"
},
{
"name": "CVE-2025-37879",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37879"
},
{
"name": "CVE-2022-50071",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50071"
},
{
"name": "CVE-2025-40261",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40261"
},
{
"name": "CVE-2024-56180",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56180"
},
{
"name": "CVE-2023-39333",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39333"
},
{
"name": "CVE-2025-38643",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38643"
},
{
"name": "CVE-2021-3864",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3864"
},
{
"name": "CVE-2025-39771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39771"
},
{
"name": "CVE-2023-52591",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52591"
},
{
"name": "CVE-2024-26648",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26648"
},
{
"name": "CVE-2025-66862",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66862"
},
{
"name": "CVE-2020-11868",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11868"
},
{
"name": "CVE-2020-24352",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24352"
},
{
"name": "CVE-2024-36000",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36000"
},
{
"name": "CVE-2026-23021",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23021"
},
{
"name": "CVE-2025-39819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39819"
},
{
"name": "CVE-2022-49296",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49296"
},
{
"name": "CVE-2025-61780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61780"
},
{
"name": "CVE-2024-49914",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49914"
},
{
"name": "CVE-2025-38360",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38360"
},
{
"name": "CVE-2025-68732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68732"
},
{
"name": "CVE-2025-39715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39715"
},
{
"name": "CVE-2025-36407",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36407"
},
{
"name": "CVE-2024-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0217"
},
{
"name": "CVE-2025-40323",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40323"
},
{
"name": "CVE-2025-21732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21732"
},
{
"name": "CVE-2021-47658",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47658"
},
{
"name": "CVE-2025-68285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68285"
},
{
"name": "CVE-2025-4575",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4575"
},
{
"name": "CVE-2019-12067",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12067"
},
{
"name": "CVE-2024-57843",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57843"
},
{
"name": "CVE-2025-38512",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38512"
},
{
"name": "CVE-2024-50135",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50135"
},
{
"name": "CVE-2024-49916",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49916"
},
{
"name": "CVE-2025-68119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68119"
},
{
"name": "CVE-2024-49988",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49988"
},
{
"name": "CVE-2023-52648",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52648"
},
{
"name": "CVE-2024-49861",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49861"
},
{
"name": "CVE-2026-23093",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23093"
},
{
"name": "CVE-2024-49893",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49893"
},
{
"name": "CVE-2024-44963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44963"
},
{
"name": "CVE-2023-53348",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53348"
},
{
"name": "CVE-2022-48766",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48766"
},
{
"name": "CVE-2019-15794",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15794"
},
{
"name": "CVE-2024-49917",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49917"
},
{
"name": "CVE-2022-50467",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50467"
},
{
"name": "CVE-2025-37849",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37849"
},
{
"name": "CVE-2025-32441",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32441"
},
{
"name": "CVE-2024-48875",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-48875"
},
{
"name": "CVE-2024-41935",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41935"
},
{
"name": "CVE-2025-38162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38162"
},
{
"name": "CVE-2022-23491",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23491"
},
{
"name": "CVE-2025-22873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22873"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2025-71183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71183"
},
{
"name": "CVE-2023-54047",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54047"
},
{
"name": "CVE-2023-53382",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53382"
},
{
"name": "CVE-2024-50060",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50060"
},
{
"name": "CVE-2025-39677",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39677"
},
{
"name": "CVE-2023-53651",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53651"
},
{
"name": "CVE-2025-21832",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21832"
},
{
"name": "CVE-2025-68371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68371"
},
{
"name": "CVE-2022-50383",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50383"
},
{
"name": "CVE-2025-39707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39707"
},
{
"name": "CVE-2025-40275",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40275"
},
{
"name": "CVE-2023-53387",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53387"
},
{
"name": "CVE-2026-31802",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31802"
},
{
"name": "CVE-2024-45774",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45774"
},
{
"name": "CVE-2023-54019",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54019"
},
{
"name": "CVE-2025-22053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22053"
},
{
"name": "CVE-2025-13465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13465"
},
{
"name": "CVE-2025-61664",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61664"
},
{
"name": "CVE-2025-68211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68211"
},
{
"name": "CVE-2026-25702",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25702"
},
{
"name": "CVE-2023-52452",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52452"
},
{
"name": "CVE-2023-42366",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42366"
},
{
"name": "CVE-2022-50863",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50863"
},
{
"name": "CVE-2025-39829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39829"
},
{
"name": "CVE-2024-35843",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35843"
},
{
"name": "CVE-2025-71091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71091"
},
{
"name": "CVE-2025-39781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39781"
},
{
"name": "CVE-2025-39762",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39762"
},
{
"name": "CVE-2024-40999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40999"
},
{
"name": "CVE-2023-53292",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53292"
},
{
"name": "CVE-2023-52576",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52576"
},
{
"name": "CVE-2024-27002",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27002"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2024-57887",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57887"
},
{
"name": "CVE-2025-21730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21730"
},
{
"name": "CVE-2024-35865",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35865"
},
{
"name": "CVE-2025-71184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71184"
},
{
"name": "CVE-2023-52660",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52660"
},
{
"name": "CVE-2024-35995",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35995"
},
{
"name": "CVE-2025-69420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69420"
},
{
"name": "CVE-2023-53371",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53371"
},
{
"name": "CVE-2025-38659",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38659"
},
{
"name": "CVE-2025-68227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68227"
},
{
"name": "CVE-2025-22041",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22041"
},
{
"name": "CVE-2025-40339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40339"
},
{
"name": "CVE-2025-22127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22127"
},
{
"name": "CVE-2025-47273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47273"
},
{
"name": "CVE-2024-27025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27025"
},
{
"name": "CVE-2025-38020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38020"
},
{
"name": "CVE-2024-27011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27011"
},
{
"name": "CVE-2025-15224",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15224"
},
{
"name": "CVE-2024-26605",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26605"
},
{
"name": "CVE-2026-27904",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27904"
},
{
"name": "CVE-2024-38543",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38543"
},
{
"name": "CVE-2025-68263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68263"
},
{
"name": "CVE-2023-53187",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53187"
},
{
"name": "CVE-2025-38689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38689"
},
{
"name": "CVE-2025-68800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68800"
},
{
"name": "CVE-2026-1225",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1225"
},
{
"name": "CVE-2025-38275",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38275"
},
{
"name": "CVE-2025-68261",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68261"
},
{
"name": "CVE-2022-48744",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48744"
},
{
"name": "CVE-2025-38070",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38070"
},
{
"name": "CVE-2025-68755",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68755"
},
{
"name": "CVE-2025-62525",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62525"
},
{
"name": "CVE-2025-71238",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71238"
},
{
"name": "CVE-2021-0175",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0175"
},
{
"name": "CVE-2024-36012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36012"
},
{
"name": "CVE-2022-48706",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48706"
},
{
"name": "CVE-2025-40334",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40334"
},
{
"name": "CVE-2025-68767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68767"
},
{
"name": "CVE-2024-46716",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46716"
},
{
"name": "CVE-2012-4542",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4542"
},
{
"name": "CVE-2021-3773",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3773"
},
{
"name": "CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"name": "CVE-2022-49267",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49267"
},
{
"name": "CVE-2024-56592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56592"
},
{
"name": "CVE-2025-37854",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37854"
},
{
"name": "CVE-2025-38189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38189"
},
{
"name": "CVE-2022-48628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48628"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
},
{
"name": "CVE-2024-50138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50138"
},
{
"name": "CVE-2025-40319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40319"
},
{
"name": "CVE-2021-44534",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44534"
},
{
"name": "CVE-2025-14831",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14831"
},
{
"name": "CVE-2024-56565",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56565"
},
{
"name": "CVE-2025-68193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68193"
},
{
"name": "CVE-2025-68727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68727"
},
{
"name": "CVE-2024-57872",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57872"
},
{
"name": "CVE-2023-28720",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28720"
},
{
"name": "CVE-2024-53093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53093"
},
{
"name": "CVE-2026-23080",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23080"
},
{
"name": "CVE-2024-46833",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46833"
},
{
"name": "CVE-2024-47703",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47703"
},
{
"name": "CVE-2023-53742",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53742"
},
{
"name": "CVE-2025-38361",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38361"
},
{
"name": "CVE-2025-38041",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38041"
},
{
"name": "CVE-2024-53177",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53177"
},
{
"name": "CVE-2024-56588",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56588"
},
{
"name": "CVE-2023-53452",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53452"
},
{
"name": "CVE-2023-54121",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54121"
},
{
"name": "CVE-2023-6610",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6610"
},
{
"name": "CVE-2023-54261",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54261"
},
{
"name": "CVE-2022-50616",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50616"
},
{
"name": "CVE-2025-66418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66418"
},
{
"name": "CVE-2023-53544",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53544"
},
{
"name": "CVE-2025-68264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68264"
},
{
"name": "CVE-2024-49911",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49911"
},
{
"name": "CVE-2026-23154",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23154"
},
{
"name": "CVE-2022-50708",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50708"
},
{
"name": "CVE-2026-3784",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3784"
},
{
"name": "CVE-2025-68764",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68764"
},
{
"name": "CVE-2025-9301",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9301"
},
{
"name": "CVE-2025-11226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11226"
}
],
"initial_release_date": "2026-03-20T00:00:00",
"last_revision_date": "2026-03-20T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0326",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-03-20T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37233",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37233"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37237",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37237"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37236",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37236"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37246",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37246"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37235",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37235"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37229",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37229"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37226",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37226"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37230",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37230"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37242",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37242"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37228",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37228"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37240",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37240"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37243",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37243"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37234",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37234"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37231",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37231"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37239",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37239"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37227",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37227"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37232",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37232"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37247",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37247"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37241",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37241"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37238",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37238"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37244",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37244"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37245",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37245"
}
]
}
CERTFR-2026-AVI-0299
Vulnerability from certfr_avis - Published: 2026-03-16 - Updated: 2026-03-16
De multiples vulnérabilités ont été découvertes dans les produits Microsoft. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | N/A | azl3 coredns 1.11.4-14 versions antérieures à 1.11.4-15 | ||
| Microsoft | N/A | azl3 giflib 5.2.1-10 versions antérieures à 5.2.1-11 | ||
| Microsoft | N/A | cbl2 coredns 1.11.1-25 versions antérieures à 1.11.1-26 | ||
| Microsoft | N/A | azl3 azurelinux-image-tools 1.2.0-1 versions antérieures à 1.2.0-2 | ||
| Microsoft | N/A | cbl2 giflib 5.2.1-10 versions antérieures à 5.2.1-11 | ||
| Microsoft | N/A | azl3 golang 1.26.0-1 versions antérieures à 1.26.1-1 | ||
| Microsoft | N/A | azl3 golang 1.25.7-1 versions antérieures à 1.25.8-1 |
| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "azl3 coredns 1.11.4-14 versions ant\u00e9rieures \u00e0 1.11.4-15",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 giflib 5.2.1-10 versions ant\u00e9rieures \u00e0 5.2.1-11",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 coredns 1.11.1-25 versions ant\u00e9rieures \u00e0 1.11.1-26",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 azurelinux-image-tools 1.2.0-1 versions ant\u00e9rieures \u00e0 1.2.0-2",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 giflib 5.2.1-10 versions ant\u00e9rieures \u00e0 5.2.1-11",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 golang 1.26.0-1 versions ant\u00e9rieures \u00e0 1.26.1-1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 golang 1.25.7-1 versions ant\u00e9rieures \u00e0 1.25.8-1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2026-27138",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27138"
},
{
"name": "CVE-2026-27137",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27137"
},
{
"name": "CVE-2026-26018",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26018"
},
{
"name": "CVE-2026-26017",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26017"
},
{
"name": "CVE-2026-23868",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23868"
},
{
"name": "CVE-2026-27141",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27141"
}
],
"initial_release_date": "2026-03-16T00:00:00",
"last_revision_date": "2026-03-16T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0299",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-03-16T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Microsoft. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Microsoft",
"vendor_advisories": [
{
"published_at": "2026-03-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-26018",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26018"
},
{
"published_at": "2026-03-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23868",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23868"
},
{
"published_at": "2026-03-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-26017",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26017"
},
{
"published_at": "2026-03-05",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-27141",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27141"
},
{
"published_at": "2026-03-11",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-27138",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27138"
},
{
"published_at": "2026-03-11",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-27137",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27137"
}
]
}
CERTFR-2026-AVI-0316
Vulnerability from certfr_avis - Published: 2026-03-19 - Updated: 2026-03-19
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | N/A | NodeJS Buildpack versions antérieures à 1.8.82 | ||
| VMware | Tanzu Platform | Tanzu for MySQL sur Tanzu Platform versions antérieures à 10.1.1 | ||
| VMware | N/A | Java Buildpack versions antérieures à 4.90.0 | ||
| VMware | N/A | NGINX Buildpack versions antérieures à 1.2.71 | ||
| VMware | N/A | HWC Buildpack versions antérieures à 3.1.91 | ||
| VMware | Tanzu Platform | Foundation Core for VMware Tanzu Platform versions antérieures à 3.1.9 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "NodeJS Buildpack versions ant\u00e9rieures \u00e0 1.8.82",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu for MySQL sur Tanzu Platform versions ant\u00e9rieures \u00e0 10.1.1",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Java Buildpack versions ant\u00e9rieures \u00e0 4.90.0",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "NGINX Buildpack versions ant\u00e9rieures \u00e0 1.2.71",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "HWC Buildpack versions ant\u00e9rieures \u00e0 3.1.91",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Foundation Core for VMware Tanzu Platform versions ant\u00e9rieures \u00e0 3.1.9",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2026-28422",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28422"
},
{
"name": "CVE-2024-36903",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36903"
},
{
"name": "CVE-2024-35875",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35875"
},
{
"name": "CVE-2022-50759",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50759"
},
{
"name": "CVE-2026-26007",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26007"
},
{
"name": "CVE-2025-71075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71075"
},
{
"name": "CVE-2024-49912",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49912"
},
{
"name": "CVE-2024-36026",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36026"
},
{
"name": "CVE-2026-23198",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23198"
},
{
"name": "CVE-2023-3640",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3640"
},
{
"name": "CVE-2024-27435",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27435"
},
{
"name": "CVE-2025-40273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40273"
},
{
"name": "CVE-2023-53714",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53714"
},
{
"name": "CVE-2024-42122",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42122"
},
{
"name": "CVE-2025-68230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68230"
},
{
"name": "CVE-2026-28420",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28420"
},
{
"name": "CVE-2022-49069",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49069"
},
{
"name": "CVE-2024-57875",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57875"
},
{
"name": "CVE-2022-27943",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27943"
},
{
"name": "CVE-2025-40064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40064"
},
{
"name": "CVE-2023-54129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54129"
},
{
"name": "CVE-2025-66865",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66865"
},
{
"name": "CVE-2024-41031",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41031"
},
{
"name": "CVE-2025-39992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39992"
},
{
"name": "CVE-2025-69534",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69534"
},
{
"name": "CVE-2025-61730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61730"
},
{
"name": "CVE-2022-49543",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49543"
},
{
"name": "CVE-2026-23202",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23202"
},
{
"name": "CVE-2025-38485",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38485"
},
{
"name": "CVE-2023-53562",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53562"
},
{
"name": "CVE-2025-68324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68324"
},
{
"name": "CVE-2025-22026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22026"
},
{
"name": "CVE-2023-54149",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54149"
},
{
"name": "CVE-2025-71086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71086"
},
{
"name": "CVE-2024-50063",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50063"
},
{
"name": "CVE-2023-33875",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33875"
},
{
"name": "CVE-2024-41001",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41001"
},
{
"name": "CVE-2024-42155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42155"
},
{
"name": "CVE-2026-23167",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23167"
},
{
"name": "CVE-2025-36353",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36353"
},
{
"name": "CVE-2025-68196",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68196"
},
{
"name": "CVE-2024-46770",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46770"
},
{
"name": "CVE-2023-53247",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53247"
},
{
"name": "CVE-2025-38042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38042"
},
{
"name": "CVE-2025-22083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22083"
},
{
"name": "CVE-2023-53829",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53829"
},
{
"name": "CVE-2025-58183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58183"
},
{
"name": "CVE-2023-54002",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54002"
},
{
"name": "CVE-2022-50550",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50550"
},
{
"name": "CVE-2022-0400",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0400"
},
{
"name": "CVE-2022-49138",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49138"
},
{
"name": "CVE-2025-66199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66199"
},
{
"name": "CVE-2024-42239",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42239"
},
{
"name": "CVE-2022-49359",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49359"
},
{
"name": "CVE-2025-68342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68342"
},
{
"name": "CVE-2022-48673",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48673"
},
{
"name": "CVE-2022-50425",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50425"
},
{
"name": "CVE-2025-38201",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38201"
},
{
"name": "CVE-2024-39293",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39293"
},
{
"name": "CVE-2023-53008",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53008"
},
{
"name": "CVE-2025-38669",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38669"
},
{
"name": "CVE-2025-40137",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40137"
},
{
"name": "CVE-2023-54052",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54052"
},
{
"name": "CVE-2025-22107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22107"
},
{
"name": "CVE-2024-38306",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38306"
},
{
"name": "CVE-2023-53733",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53733"
},
{
"name": "CVE-2025-37775",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37775"
},
{
"name": "CVE-2025-21682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21682"
},
{
"name": "CVE-2023-1386",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1386"
},
{
"name": "CVE-2024-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35939"
},
{
"name": "CVE-2024-39298",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39298"
},
{
"name": "CVE-2024-56703",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56703"
},
{
"name": "CVE-2026-23098",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23098"
},
{
"name": "CVE-2023-53347",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53347"
},
{
"name": "CVE-2023-28374",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28374"
},
{
"name": "CVE-2023-52926",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52926"
},
{
"name": "CVE-2026-32597",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32597"
},
{
"name": "CVE-2025-68286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68286"
},
{
"name": "CVE-2025-9231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9231"
},
{
"name": "CVE-2024-36921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36921"
},
{
"name": "CVE-2025-40057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40057"
},
{
"name": "CVE-2024-41050",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41050"
},
{
"name": "CVE-2026-25500",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25500"
},
{
"name": "CVE-2024-26656",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26656"
},
{
"name": "CVE-2025-38520",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38520"
},
{
"name": "CVE-2025-27558",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27558"
},
{
"name": "CVE-2025-71094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71094"
},
{
"name": "CVE-2026-21637",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21637"
},
{
"name": "CVE-2024-35998",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35998"
},
{
"name": "CVE-2024-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37891"
},
{
"name": "CVE-2021-0076",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0076"
},
{
"name": "CVE-2025-68788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68788"
},
{
"name": "CVE-2024-58237",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58237"
},
{
"name": "CVE-2024-36909",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36909"
},
{
"name": "CVE-2024-42147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42147"
},
{
"name": "CVE-2023-53529",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53529"
},
{
"name": "CVE-2024-50028",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50028"
},
{
"name": "CVE-2023-53042",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53042"
},
{
"name": "CVE-2022-50527",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50527"
},
{
"name": "CVE-2023-54280",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54280"
},
{
"name": "CVE-2025-21786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21786"
},
{
"name": "CVE-2024-58094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58094"
},
{
"name": "CVE-2024-11187",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11187"
},
{
"name": "CVE-2025-52534",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52534"
},
{
"name": "CVE-2025-40314",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40314"
},
{
"name": "CVE-2024-46705",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46705"
},
{
"name": "CVE-2022-50407",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50407"
},
{
"name": "CVE-2026-23196",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23196"
},
{
"name": "CVE-2024-26595",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26595"
},
{
"name": "CVE-2022-23825",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23825"
},
{
"name": "CVE-2024-45775",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45775"
},
{
"name": "CVE-2025-40306",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40306"
},
{
"name": "CVE-2025-21881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21881"
},
{
"name": "CVE-2022-49901",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49901"
},
{
"name": "CVE-2026-23126",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23126"
},
{
"name": "CVE-2025-38329",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38329"
},
{
"name": "CVE-2021-33096",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33096"
},
{
"name": "CVE-2022-50230",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50230"
},
{
"name": "CVE-2024-35949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35949"
},
{
"name": "CVE-2025-39947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39947"
},
{
"name": "CVE-2025-68778",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68778"
},
{
"name": "CVE-2023-53588",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53588"
},
{
"name": "CVE-2024-41082",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41082"
},
{
"name": "CVE-2023-53685",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53685"
},
{
"name": "CVE-2025-5222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5222"
},
{
"name": "CVE-2025-23155",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23155"
},
{
"name": "CVE-2026-23054",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23054"
},
{
"name": "CVE-2025-37870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37870"
},
{
"name": "CVE-2025-40254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40254"
},
{
"name": "CVE-2022-49533",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49533"
},
{
"name": "CVE-2024-42253",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42253"
},
{
"name": "CVE-2020-26557",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26557"
},
{
"name": "CVE-2025-71064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71064"
},
{
"name": "CVE-2023-54201",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54201"
},
{
"name": "CVE-2021-33114",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33114"
},
{
"name": "CVE-2025-69645",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69645"
},
{
"name": "CVE-2025-68200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68200"
},
{
"name": "CVE-2022-49518",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49518"
},
{
"name": "CVE-2024-56727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56727"
},
{
"name": "CVE-2022-49125",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49125"
},
{
"name": "CVE-2024-36900",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36900"
},
{
"name": "CVE-2025-38501",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38501"
},
{
"name": "CVE-2024-26866",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26866"
},
{
"name": "CVE-2024-27010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27010"
},
{
"name": "CVE-2025-27516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27516"
},
{
"name": "CVE-2025-68736",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68736"
},
{
"name": "CVE-2023-52561",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52561"
},
{
"name": "CVE-2025-68725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68725"
},
{
"name": "CVE-2024-53221",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53221"
},
{
"name": "CVE-2024-41069",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41069"
},
{
"name": "CVE-2025-68176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68176"
},
{
"name": "CVE-2025-37777",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37777"
},
{
"name": "CVE-2021-47432",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47432"
},
{
"name": "CVE-2025-68204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68204"
},
{
"name": "CVE-2024-35878",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35878"
},
{
"name": "CVE-2023-53362",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53362"
},
{
"name": "CVE-2025-68795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68795"
},
{
"name": "CVE-2025-68349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68349"
},
{
"name": "CVE-2024-26756",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26756"
},
{
"name": "CVE-2022-50815",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50815"
},
{
"name": "CVE-2025-21931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21931"
},
{
"name": "CVE-2025-39826",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39826"
},
{
"name": "CVE-2025-38036",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38036"
},
{
"name": "CVE-2025-2668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2668"
},
{
"name": "CVE-2025-71221",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71221"
},
{
"name": "CVE-2025-37778",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37778"
},
{
"name": "CVE-2025-39716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39716"
},
{
"name": "CVE-2024-46860",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46860"
},
{
"name": "CVE-2025-22040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22040"
},
{
"name": "CVE-2024-53095",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53095"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2025-8277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8277"
},
{
"name": "CVE-2025-8941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8941"
},
{
"name": "CVE-2022-38457",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38457"
},
{
"name": "CVE-2024-56665",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56665"
},
{
"name": "CVE-2025-38340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38340"
},
{
"name": "CVE-2025-38109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38109"
},
{
"name": "CVE-2023-53629",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53629"
},
{
"name": "CVE-2022-50178",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50178"
},
{
"name": "CVE-2025-39779",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39779"
},
{
"name": "CVE-2025-66866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66866"
},
{
"name": "CVE-2025-68283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68283"
},
{
"name": "CVE-2023-7216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7216"
},
{
"name": "CVE-2025-37880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37880"
},
{
"name": "CVE-2025-36427",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36427"
},
{
"name": "CVE-2026-23217",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23217"
},
{
"name": "CVE-2025-15469",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15469"
},
{
"name": "CVE-2025-37833",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37833"
},
{
"name": "CVE-2025-39761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39761"
},
{
"name": "CVE-2024-38608",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38608"
},
{
"name": "CVE-2025-68246",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68246"
},
{
"name": "CVE-2025-68339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68339"
},
{
"name": "CVE-2025-40287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40287"
},
{
"name": "CVE-2023-53320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53320"
},
{
"name": "CVE-2024-44961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44961"
},
{
"name": "CVE-2026-23069",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23069"
},
{
"name": "CVE-2025-21656",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21656"
},
{
"name": "CVE-2024-46835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46835"
},
{
"name": "CVE-2025-69650",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69650"
},
{
"name": "CVE-2022-50554",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50554"
},
{
"name": "CVE-2023-53509",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53509"
},
{
"name": "CVE-2023-53421",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53421"
},
{
"name": "CVE-2025-11731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11731"
},
{
"name": "CVE-2026-22992",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22992"
},
{
"name": "CVE-2024-52005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52005"
},
{
"name": "CVE-2024-46775",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46775"
},
{
"name": "CVE-2025-39764",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39764"
},
{
"name": "CVE-2025-38207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38207"
},
{
"name": "CVE-2022-49465",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49465"
},
{
"name": "CVE-2026-23004",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23004"
},
{
"name": "CVE-2024-26807",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26807"
},
{
"name": "CVE-2025-39720",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39720"
},
{
"name": "CVE-2023-54271",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54271"
},
{
"name": "CVE-2022-49742",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49742"
},
{
"name": "CVE-2025-71191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71191"
},
{
"name": "CVE-2025-68295",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68295"
},
{
"name": "CVE-2025-68728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68728"
},
{
"name": "CVE-2025-40780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40780"
},
{
"name": "CVE-2025-68364",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68364"
},
{
"name": "CVE-2024-42118",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42118"
},
{
"name": "CVE-2025-40100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40100"
},
{
"name": "CVE-2026-1965",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1965"
},
{
"name": "CVE-2024-52560",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52560"
},
{
"name": "CVE-2024-56604",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56604"
},
{
"name": "CVE-2026-23227",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23227"
},
{
"name": "CVE-2025-71087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71087"
},
{
"name": "CVE-2023-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37920"
},
{
"name": "CVE-2023-52653",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52653"
},
{
"name": "CVE-2025-40285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40285"
},
{
"name": "CVE-2023-52508",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52508"
},
{
"name": "CVE-2025-69647",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69647"
},
{
"name": "CVE-2025-39827",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39827"
},
{
"name": "CVE-2024-50014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50014"
},
{
"name": "CVE-2022-49108",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49108"
},
{
"name": "CVE-2024-56677",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56677"
},
{
"name": "CVE-2025-38717",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38717"
},
{
"name": "CVE-2026-3497",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3497"
},
{
"name": "CVE-2025-22019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22019"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2025-40208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40208"
},
{
"name": "CVE-2025-39746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39746"
},
{
"name": "CVE-2024-26767",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26767"
},
{
"name": "CVE-2025-21872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21872"
},
{
"name": "CVE-2026-2219",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2219"
},
{
"name": "CVE-2025-68287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68287"
},
{
"name": "CVE-2025-40039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40039"
},
{
"name": "CVE-2025-38208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38208"
},
{
"name": "CVE-2024-35926",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35926"
},
{
"name": "CVE-2024-27389",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27389"
},
{
"name": "CVE-2024-26983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26983"
},
{
"name": "CVE-2022-50627",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50627"
},
{
"name": "CVE-2024-50285",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50285"
},
{
"name": "CVE-2025-38099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38099"
},
{
"name": "CVE-2025-38524",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38524"
},
{
"name": "CVE-2025-38029",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38029"
},
{
"name": "CVE-2022-49123",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49123"
},
{
"name": "CVE-2024-50289",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50289"
},
{
"name": "CVE-2023-53258",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53258"
},
{
"name": "CVE-2024-46813",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46813"
},
{
"name": "CVE-2024-38594",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38594"
},
{
"name": "CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"name": "CVE-2024-47658",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47658"
},
{
"name": "CVE-2022-41409",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41409"
},
{
"name": "CVE-2025-38096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38096"
},
{
"name": "CVE-2024-48873",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-48873"
},
{
"name": "CVE-2025-68746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68746"
},
{
"name": "CVE-2023-53429",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53429"
},
{
"name": "CVE-2024-46765",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46765"
},
{
"name": "CVE-2022-50380",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50380"
},
{
"name": "CVE-2025-38039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38039"
},
{
"name": "CVE-2022-48990",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48990"
},
{
"name": "CVE-2024-24864",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24864"
},
{
"name": "CVE-2024-35832",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35832"
},
{
"name": "CVE-2024-36479",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36479"
},
{
"name": "CVE-2025-71133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71133"
},
{
"name": "CVE-2026-23220",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23220"
},
{
"name": "CVE-2024-45782",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45782"
},
{
"name": "CVE-2022-50785",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50785"
},
{
"name": "CVE-2025-39745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39745"
},
{
"name": "CVE-2024-35799",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35799"
},
{
"name": "CVE-2025-40103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40103"
},
{
"name": "CVE-2026-23020",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23020"
},
{
"name": "CVE-2025-38595",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38595"
},
{
"name": "CVE-2025-71223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71223"
},
{
"name": "CVE-2025-36098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36098"
},
{
"name": "CVE-2025-68796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68796"
},
{
"name": "CVE-2025-40016",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40016"
},
{
"name": "CVE-2023-53765",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53765"
},
{
"name": "CVE-2025-38626",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38626"
},
{
"name": "CVE-2025-40356",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40356"
},
{
"name": "CVE-2026-1642",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1642"
},
{
"name": "CVE-2025-45582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45582"
},
{
"name": "CVE-2023-53325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53325"
},
{
"name": "CVE-2025-21752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21752"
},
{
"name": "CVE-2026-27138",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27138"
},
{
"name": "CVE-2025-40312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40312"
},
{
"name": "CVE-2025-37852",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37852"
},
{
"name": "CVE-2025-68220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68220"
},
{
"name": "CVE-2025-22125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22125"
},
{
"name": "CVE-2019-6293",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6293"
},
{
"name": "CVE-2024-26953",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26953"
},
{
"name": "CVE-2024-39282",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39282"
},
{
"name": "CVE-2025-21738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21738"
},
{
"name": "CVE-2023-50868",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50868"
},
{
"name": "CVE-2025-68302",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68302"
},
{
"name": "CVE-2024-50146",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50146"
},
{
"name": "CVE-2025-68238",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68238"
},
{
"name": "CVE-2024-56709",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56709"
},
{
"name": "CVE-2025-38063",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38063"
},
{
"name": "CVE-2025-68297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68297"
},
{
"name": "CVE-2024-40975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40975"
},
{
"name": "CVE-2025-68175",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68175"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2023-54227",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54227"
},
{
"name": "CVE-2023-46316",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46316"
},
{
"name": "CVE-2024-47866",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47866"
},
{
"name": "CVE-2024-44970",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44970"
},
{
"name": "CVE-2022-49476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49476"
},
{
"name": "CVE-2023-53855",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53855"
},
{
"name": "CVE-2026-23208",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23208"
},
{
"name": "CVE-2025-68804",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68804"
},
{
"name": "CVE-2025-39925",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39925"
},
{
"name": "CVE-2025-68769",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68769"
},
{
"name": "CVE-2024-50286",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50286"
},
{
"name": "CVE-2025-40139",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40139"
},
{
"name": "CVE-2025-68794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68794"
},
{
"name": "CVE-2025-21768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21768"
},
{
"name": "CVE-2022-48667",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48667"
},
{
"name": "CVE-2025-69419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69419"
},
{
"name": "CVE-2024-56744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56744"
},
{
"name": "CVE-2025-38491",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38491"
},
{
"name": "CVE-2026-3783",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3783"
},
{
"name": "CVE-2022-49161",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49161"
},
{
"name": "CVE-2021-21240",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21240"
},
{
"name": "CVE-2022-48771",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48771"
},
{
"name": "CVE-2025-37961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37961"
},
{
"name": "CVE-2025-23131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23131"
},
{
"name": "CVE-2024-27400",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27400"
},
{
"name": "CVE-2023-52485",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52485"
},
{
"name": "CVE-2025-40309",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40309"
},
{
"name": "CVE-2022-49997",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49997"
},
{
"name": "CVE-2022-49469",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49469"
},
{
"name": "CVE-2025-38408",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38408"
},
{
"name": "CVE-2026-23179",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23179"
},
{
"name": "CVE-2025-68334",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68334"
},
{
"name": "CVE-2025-40343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40343"
},
{
"name": "CVE-2025-38644",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38644"
},
{
"name": "CVE-2025-38692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38692"
},
{
"name": "CVE-2022-0480",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0480"
},
{
"name": "CVE-2025-68173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68173"
},
{
"name": "CVE-2024-49932",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49932"
},
{
"name": "CVE-2026-23090",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23090"
},
{
"name": "CVE-2026-23035",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23035"
},
{
"name": "CVE-2023-53209",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53209"
},
{
"name": "CVE-2023-54253",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54253"
},
{
"name": "CVE-2025-38127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38127"
},
{
"name": "CVE-2025-22103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22103"
},
{
"name": "CVE-2025-1272",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1272"
},
{
"name": "CVE-2025-21658",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21658"
},
{
"name": "CVE-2022-49651",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49651"
},
{
"name": "CVE-2025-68307",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68307"
},
{
"name": "CVE-2025-40308",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40308"
},
{
"name": "CVE-2024-26770",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26770"
},
{
"name": "CVE-2023-54324",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54324"
},
{
"name": "CVE-2024-27041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27041"
},
{
"name": "CVE-2025-36184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36184"
},
{
"name": "CVE-2026-3195",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3195"
},
{
"name": "CVE-2025-37743",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37743"
},
{
"name": "CVE-2025-40005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40005"
},
{
"name": "CVE-2025-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37920"
},
{
"name": "CVE-2024-56326",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56326"
},
{
"name": "CVE-2023-26242",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26242"
},
{
"name": "CVE-2025-58185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58185"
},
{
"name": "CVE-2025-40315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40315"
},
{
"name": "CVE-2023-52673",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52673"
},
{
"name": "CVE-2024-56722",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56722"
},
{
"name": "CVE-2021-33113",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33113"
},
{
"name": "CVE-2022-48668",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48668"
},
{
"name": "CVE-2024-27418",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27418"
},
{
"name": "CVE-2025-68231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68231"
},
{
"name": "CVE-2021-22930",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22930"
},
{
"name": "CVE-2026-23064",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23064"
},
{
"name": "CVE-2025-38591",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38591"
},
{
"name": "CVE-2025-68806",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68806"
},
{
"name": "CVE-2022-50322",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50322"
},
{
"name": "CVE-2023-50782",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50782"
},
{
"name": "CVE-2022-27635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27635"
},
{
"name": "CVE-2025-71098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71098"
},
{
"name": "CVE-2024-49922",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49922"
},
{
"name": "CVE-2020-12317",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12317"
},
{
"name": "CVE-2025-61731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61731"
},
{
"name": "CVE-2025-40251",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40251"
},
{
"name": "CVE-2024-42128",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42128"
},
{
"name": "CVE-2025-71078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71078"
},
{
"name": "CVE-2024-49909",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49909"
},
{
"name": "CVE-2025-40355",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40355"
},
{
"name": "CVE-2021-42771",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42771"
},
{
"name": "CVE-2021-4095",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4095"
},
{
"name": "CVE-2022-50240",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50240"
},
{
"name": "CVE-2025-40054",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40054"
},
{
"name": "CVE-2024-45015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45015"
},
{
"name": "CVE-2025-68184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68184"
},
{
"name": "CVE-2024-36357",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36357"
},
{
"name": "CVE-2025-71074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71074"
},
{
"name": "CVE-2025-38673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38673"
},
{
"name": "CVE-2025-40107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40107"
},
{
"name": "CVE-2025-11234",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11234"
},
{
"name": "CVE-2025-71083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71083"
},
{
"name": "CVE-2026-23061",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23061"
},
{
"name": "CVE-2023-53447",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53447"
},
{
"name": "CVE-2024-46754",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46754"
},
{
"name": "CVE-2021-0161",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0161"
},
{
"name": "CVE-2018-1121",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1121"
},
{
"name": "CVE-2022-49547",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49547"
},
{
"name": "CVE-2025-66863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66863"
},
{
"name": "CVE-2025-0622",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0622"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2024-26757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26757"
},
{
"name": "CVE-2024-49899",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49899"
},
{
"name": "CVE-2022-49484",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49484"
},
{
"name": "CVE-2024-40900",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40900"
},
{
"name": "CVE-2024-46748",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46748"
},
{
"name": "CVE-2025-68813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68813"
},
{
"name": "CVE-2024-50164",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50164"
},
{
"name": "CVE-2026-27137",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27137"
},
{
"name": "CVE-2023-53248",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53248"
},
{
"name": "CVE-2024-56788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56788"
},
{
"name": "CVE-2016-8660",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8660"
},
{
"name": "CVE-2024-26691",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26691"
},
{
"name": "CVE-2026-23047",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23047"
},
{
"name": "CVE-2025-22121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22121"
},
{
"name": "CVE-2024-1975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1975"
},
{
"name": "CVE-2025-38215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38215"
},
{
"name": "CVE-2025-7519",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7519"
},
{
"name": "CVE-2023-53491",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53491"
},
{
"name": "CVE-2025-68365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68365"
},
{
"name": "CVE-2024-57804",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57804"
},
{
"name": "CVE-2024-49908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49908"
},
{
"name": "CVE-2025-68265",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68265"
},
{
"name": "CVE-2024-50048",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50048"
},
{
"name": "CVE-2026-28421",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28421"
},
{
"name": "CVE-2026-23119",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23119"
},
{
"name": "CVE-2025-37943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37943"
},
{
"name": "CVE-2025-21918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21918"
},
{
"name": "CVE-2025-37745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37745"
},
{
"name": "CVE-2025-71085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71085"
},
{
"name": "CVE-2026-27171",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27171"
},
{
"name": "CVE-2022-50811",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50811"
},
{
"name": "CVE-2023-4133",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4133"
},
{
"name": "CVE-2024-50183",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50183"
},
{
"name": "CVE-2025-38734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38734"
},
{
"name": "CVE-2023-53366",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53366"
},
{
"name": "CVE-2022-49910",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49910"
},
{
"name": "CVE-2024-27062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27062"
},
{
"name": "CVE-2022-49203",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49203"
},
{
"name": "CVE-2024-40918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40918"
},
{
"name": "CVE-2024-27032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27032"
},
{
"name": "CVE-2022-50236",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50236"
},
{
"name": "CVE-2024-35932",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35932"
},
{
"name": "CVE-2024-35839",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35839"
},
{
"name": "CVE-2025-68344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68344"
},
{
"name": "CVE-2026-23137",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23137"
},
{
"name": "CVE-2025-40347",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40347"
},
{
"name": "CVE-2025-71154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71154"
},
{
"name": "CVE-2025-37882",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37882"
},
{
"name": "CVE-2024-35971",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35971"
},
{
"name": "CVE-2024-46762",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46762"
},
{
"name": "CVE-2023-34983",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34983"
},
{
"name": "CVE-2024-35868",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35868"
},
{
"name": "CVE-2023-53323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53323"
},
{
"name": "CVE-2026-3731",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3731"
},
{
"name": "CVE-2025-40198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40198"
},
{
"name": "CVE-2024-0760",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0760"
},
{
"name": "CVE-2025-39942",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39942"
},
{
"name": "CVE-2025-68310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68310"
},
{
"name": "CVE-2026-23222",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23222"
},
{
"name": "CVE-2025-68229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68229"
},
{
"name": "CVE-2023-52857",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52857"
},
{
"name": "CVE-2024-42107",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42107"
},
{
"name": "CVE-2025-68257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68257"
},
{
"name": "CVE-2025-39929",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39929"
},
{
"name": "CVE-2022-50304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50304"
},
{
"name": "CVE-2026-23226",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23226"
},
{
"name": "CVE-2020-26146",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26146"
},
{
"name": "CVE-2024-43844",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43844"
},
{
"name": "CVE-2023-52920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52920"
},
{
"name": "CVE-2023-52590",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52590"
},
{
"name": "CVE-2025-71084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71084"
},
{
"name": "CVE-2024-22025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22025"
},
{
"name": "CVE-2026-23049",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23049"
},
{
"name": "CVE-2025-68321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68321"
},
{
"name": "CVE-2021-0072",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0072"
},
{
"name": "CVE-2025-40190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40190"
},
{
"name": "CVE-2025-69652",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69652"
},
{
"name": "CVE-2025-21635",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21635"
},
{
"name": "CVE-2025-37924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37924"
},
{
"name": "CVE-2022-40133",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40133"
},
{
"name": "CVE-2020-26143",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26143"
},
{
"name": "CVE-2025-21712",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21712"
},
{
"name": "CVE-2025-38353",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38353"
},
{
"name": "CVE-2025-36009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36009"
},
{
"name": "CVE-2019-0154",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0154"
},
{
"name": "CVE-2024-57982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57982"
},
{
"name": "CVE-2023-52761",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52761"
},
{
"name": "CVE-2022-49773",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49773"
},
{
"name": "CVE-2023-53609",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53609"
},
{
"name": "CVE-2023-53478",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53478"
},
{
"name": "CVE-2024-42117",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42117"
},
{
"name": "CVE-2025-23160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23160"
},
{
"name": "CVE-2023-53682",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53682"
},
{
"name": "CVE-2026-23229",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23229"
},
{
"name": "CVE-2025-40311",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40311"
},
{
"name": "CVE-2025-54770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54770"
},
{
"name": "CVE-2026-3442",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3442"
},
{
"name": "CVE-2024-58238",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58238"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2025-68814",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68814"
},
{
"name": "CVE-2025-22039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22039"
},
{
"name": "CVE-2025-37842",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37842"
},
{
"name": "CVE-2025-39933",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39933"
},
{
"name": "CVE-2025-40237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40237"
},
{
"name": "CVE-2025-47908",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47908"
},
{
"name": "CVE-2022-49722",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49722"
},
{
"name": "CVE-2026-23745",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23745"
},
{
"name": "CVE-2025-68780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68780"
},
{
"name": "CVE-2024-35945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35945"
},
{
"name": "CVE-2025-39990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39990"
},
{
"name": "CVE-2025-15467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15467"
},
{
"name": "CVE-2025-71081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71081"
},
{
"name": "CVE-2023-53780",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53780"
},
{
"name": "CVE-2020-35501",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35501"
},
{
"name": "CVE-2024-58251",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58251"
},
{
"name": "CVE-2025-38710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38710"
},
{
"name": "CVE-2025-9820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9820"
},
{
"name": "CVE-2023-52624",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52624"
},
{
"name": "CVE-2024-56557",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56557"
},
{
"name": "CVE-2022-49699",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49699"
},
{
"name": "CVE-2022-50700",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50700"
},
{
"name": "CVE-2023-52632",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52632"
},
{
"name": "CVE-2024-46836",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46836"
},
{
"name": "CVE-2026-23101",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23101"
},
{
"name": "CVE-2026-23099",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23099"
},
{
"name": "CVE-2024-38556",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38556"
},
{
"name": "CVE-2025-1180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1180"
},
{
"name": "CVE-2025-38060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38060"
},
{
"name": "CVE-2022-48929",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48929"
},
{
"name": "CVE-2025-55130",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55130"
},
{
"name": "CVE-2025-36070",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36070"
},
{
"name": "CVE-2024-46820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46820"
},
{
"name": "CVE-2025-39770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39770"
},
{
"name": "CVE-2025-38105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38105"
},
{
"name": "CVE-2025-37744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37744"
},
{
"name": "CVE-2025-38705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38705"
},
{
"name": "CVE-2023-53198",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53198"
},
{
"name": "CVE-2023-53846",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53846"
},
{
"name": "CVE-2025-71121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71121"
},
{
"name": "CVE-2024-35942",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35942"
},
{
"name": "CVE-2022-1247",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1247"
},
{
"name": "CVE-2025-40333",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40333"
},
{
"name": "CVE-2022-50234",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50234"
},
{
"name": "CVE-2025-38082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38082"
},
{
"name": "CVE-2025-37884",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37884"
},
{
"name": "CVE-2024-58054",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58054"
},
{
"name": "CVE-2024-49934",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49934"
},
{
"name": "CVE-2025-39750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39750"
},
{
"name": "CVE-2025-38022",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38022"
},
{
"name": "CVE-2026-23066",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23066"
},
{
"name": "CVE-2025-38562",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38562"
},
{
"name": "CVE-2023-4969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4969"
},
{
"name": "CVE-2024-50098",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50098"
},
{
"name": "CVE-2024-35946",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35946"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2023-53789",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53789"
},
{
"name": "CVE-2022-49858",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49858"
},
{
"name": "CVE-2025-39692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39692"
},
{
"name": "CVE-2024-35959",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35959"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2025-36428",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36428"
},
{
"name": "CVE-2023-53520",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53520"
},
{
"name": "CVE-2026-23085",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23085"
},
{
"name": "CVE-2023-52737",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52737"
},
{
"name": "CVE-2025-40360",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40360"
},
{
"name": "CVE-2026-23209",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23209"
},
{
"name": "CVE-2025-71136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71136"
},
{
"name": "CVE-2024-35803",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35803"
},
{
"name": "CVE-2025-22105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22105"
},
{
"name": "CVE-2024-8612",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8612"
},
{
"name": "CVE-2023-52586",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52586"
},
{
"name": "CVE-2025-40332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40332"
},
{
"name": "CVE-2021-46195",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46195"
},
{
"name": "CVE-2025-68354",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68354"
},
{
"name": "CVE-2025-68801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68801"
},
{
"name": "CVE-2021-33110",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33110"
},
{
"name": "CVE-2025-37834",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37834"
},
{
"name": "CVE-2025-21833",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21833"
},
{
"name": "CVE-2025-40082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40082"
},
{
"name": "CVE-2019-19378",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19378"
},
{
"name": "CVE-2026-23150",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23150"
},
{
"name": "CVE-2024-40972",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40972"
},
{
"name": "CVE-2025-61985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61985"
},
{
"name": "CVE-2025-71073",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71073"
},
{
"name": "CVE-2025-38426",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38426"
},
{
"name": "CVE-2025-38436",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38436"
},
{
"name": "CVE-2024-36911",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36911"
},
{
"name": "CVE-2025-55131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55131"
},
{
"name": "CVE-2025-40104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40104"
},
{
"name": "CVE-2024-36917",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36917"
},
{
"name": "CVE-2025-38097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38097"
},
{
"name": "CVE-2026-23236",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23236"
},
{
"name": "CVE-2023-53068",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53068"
},
{
"name": "CVE-2025-22090",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22090"
},
{
"name": "CVE-2021-31615",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31615"
},
{
"name": "CVE-2024-1737",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1737"
},
{
"name": "CVE-2025-40097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40097"
},
{
"name": "CVE-2022-49932",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49932"
},
{
"name": "CVE-2022-25837",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25837"
},
{
"name": "CVE-2025-68258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68258"
},
{
"name": "CVE-2024-49939",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49939"
},
{
"name": "CVE-2025-38239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38239"
},
{
"name": "CVE-2024-49905",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49905"
},
{
"name": "CVE-2023-52831",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52831"
},
{
"name": "CVE-2023-53221",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53221"
},
{
"name": "CVE-2024-26719",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26719"
},
{
"name": "CVE-2022-44034",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44034"
},
{
"name": "CVE-2022-40897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40897"
},
{
"name": "CVE-2023-53072",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53072"
},
{
"name": "CVE-2023-2007",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2007"
},
{
"name": "CVE-2022-37341",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37341"
},
{
"name": "CVE-2025-69648",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69648"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2024-50298",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50298"
},
{
"name": "CVE-2025-36424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36424"
},
{
"name": "CVE-2025-21915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21915"
},
{
"name": "CVE-2025-38590",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38590"
},
{
"name": "CVE-2024-46843",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46843"
},
{
"name": "CVE-2025-21792",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21792"
},
{
"name": "CVE-2023-54016",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54016"
},
{
"name": "CVE-2025-36387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36387"
},
{
"name": "CVE-2025-38709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38709"
},
{
"name": "CVE-2024-58018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58018"
},
{
"name": "CVE-2023-4408",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4408"
},
{
"name": "CVE-2025-71235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71235"
},
{
"name": "CVE-2023-53602",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53602"
},
{
"name": "CVE-2023-2828",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2828"
},
{
"name": "CVE-2023-54035",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54035"
},
{
"name": "CVE-2025-40322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40322"
},
{
"name": "CVE-2023-53867",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53867"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2025-37926",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37926"
},
{
"name": "CVE-2024-46715",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46715"
},
{
"name": "CVE-2025-38038",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38038"
},
{
"name": "CVE-2024-46802",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46802"
},
{
"name": "CVE-2025-39859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39859"
},
{
"name": "CVE-2025-40313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40313"
},
{
"name": "CVE-2023-52582",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52582"
},
{
"name": "CVE-2023-33053",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33053"
},
{
"name": "CVE-2025-1152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1152"
},
{
"name": "CVE-2026-24051",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24051"
},
{
"name": "CVE-2025-38015",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38015"
},
{
"name": "CVE-2024-26742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26742"
},
{
"name": "CVE-2025-38449",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38449"
},
{
"name": "CVE-2025-21714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21714"
},
{
"name": "CVE-2025-38261",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38261"
},
{
"name": "CVE-2024-36918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36918"
},
{
"name": "CVE-2025-37853",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37853"
},
{
"name": "CVE-2025-69644",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69644"
},
{
"name": "CVE-2022-49303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49303"
},
{
"name": "CVE-2025-38126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38126"
},
{
"name": "CVE-2023-46809",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46809"
},
{
"name": "CVE-2025-59465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59465"
},
{
"name": "CVE-2025-39763",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39763"
},
{
"name": "CVE-2025-21972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21972"
},
{
"name": "CVE-2023-54088",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54088"
},
{
"name": "CVE-2024-42320",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42320"
},
{
"name": "CVE-2025-38679",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38679"
},
{
"name": "CVE-2025-40271",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40271"
},
{
"name": "CVE-2024-53234",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53234"
},
{
"name": "CVE-2025-11961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11961"
},
{
"name": "CVE-2025-39877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39877"
},
{
"name": "CVE-2022-3114",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3114"
},
{
"name": "CVE-2023-52916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52916"
},
{
"name": "CVE-2025-38064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38064"
},
{
"name": "CVE-2026-22991",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22991"
},
{
"name": "CVE-2024-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35937"
},
{
"name": "CVE-2022-50628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50628"
},
{
"name": "CVE-2024-56718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56718"
},
{
"name": "CVE-2024-43824",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43824"
},
{
"name": "CVE-2025-39886",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39886"
},
{
"name": "CVE-2022-50350",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50350"
},
{
"name": "CVE-2025-21831",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21831"
},
{
"name": "CVE-2022-50721",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50721"
},
{
"name": "CVE-2022-50095",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50095"
},
{
"name": "CVE-2025-40073",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40073"
},
{
"name": "CVE-2024-26662",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26662"
},
{
"name": "CVE-2026-3196",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3196"
},
{
"name": "CVE-2025-61662",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61662"
},
{
"name": "CVE-2025-68308",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68308"
},
{
"name": "CVE-2024-50217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50217"
},
{
"name": "CVE-2021-0168",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0168"
},
{
"name": "CVE-2026-22795",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22795"
},
{
"name": "CVE-2022-50479",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50479"
},
{
"name": "CVE-2022-50583",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50583"
},
{
"name": "CVE-2025-37806",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37806"
},
{
"name": "CVE-2024-38554",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38554"
},
{
"name": "CVE-2025-68822",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68822"
},
{
"name": "CVE-2025-40242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40242"
},
{
"name": "CVE-2023-0030",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0030"
},
{
"name": "CVE-2024-42110",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42110"
},
{
"name": "CVE-2025-37822",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37822"
},
{
"name": "CVE-2025-61727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61727"
},
{
"name": "CVE-2025-39838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39838"
},
{
"name": "CVE-2025-37820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37820"
},
{
"name": "CVE-2024-53179",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53179"
},
{
"name": "CVE-2024-57945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57945"
},
{
"name": "CVE-2023-54233",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54233"
},
{
"name": "CVE-2024-43899",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43899"
},
{
"name": "CVE-2025-21986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21986"
},
{
"name": "CVE-2019-15213",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15213"
},
{
"name": "CVE-2025-38234",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38234"
},
{
"name": "CVE-2022-49935",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49935"
},
{
"name": "CVE-2021-44532",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44532"
},
{
"name": "CVE-2025-38011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38011"
},
{
"name": "CVE-2022-49534",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49534"
},
{
"name": "CVE-2024-57974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57974"
},
{
"name": "CVE-2024-50012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50012"
},
{
"name": "CVE-2025-68190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68190"
},
{
"name": "CVE-2023-53010",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53010"
},
{
"name": "CVE-2024-35956",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35956"
},
{
"name": "CVE-2024-57888",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57888"
},
{
"name": "CVE-2024-35908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35908"
},
{
"name": "CVE-2023-54237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54237"
},
{
"name": "CVE-2025-37878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37878"
},
{
"name": "CVE-2023-53424",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53424"
},
{
"name": "CVE-2026-23207",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23207"
},
{
"name": "CVE-2025-40252",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40252"
},
{
"name": "CVE-2022-49134",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49134"
},
{
"name": "CVE-2025-21946",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21946"
},
{
"name": "CVE-2025-21838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21838"
},
{
"name": "CVE-2022-49333",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49333"
},
{
"name": "CVE-2023-53791",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53791"
},
{
"name": "CVE-2024-49994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49994"
},
{
"name": "CVE-2025-53859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53859"
},
{
"name": "CVE-2019-19814",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19814"
},
{
"name": "CVE-2022-49136",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49136"
},
{
"name": "CVE-2025-68255",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68255"
},
{
"name": "CVE-2025-47910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47910"
},
{
"name": "CVE-2023-54081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54081"
},
{
"name": "CVE-2024-36898",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36898"
},
{
"name": "CVE-2024-44962",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44962"
},
{
"name": "CVE-2025-68322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68322"
},
{
"name": "CVE-2024-35931",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35931"
},
{
"name": "CVE-2025-38702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38702"
},
{
"name": "CVE-2026-22980",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22980"
},
{
"name": "CVE-2026-23138",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23138"
},
{
"name": "CVE-2025-39927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39927"
},
{
"name": "CVE-2023-26551",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26551"
},
{
"name": "CVE-2024-46857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46857"
},
{
"name": "CVE-2024-58013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58013"
},
{
"name": "CVE-2024-53210",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53210"
},
{
"name": "CVE-2023-54185",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54185"
},
{
"name": "CVE-2022-49342",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49342"
},
{
"name": "CVE-2015-8553",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8553"
},
{
"name": "CVE-2025-40277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40277"
},
{
"name": "CVE-2025-38250",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38250"
},
{
"name": "CVE-2024-36966",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36966"
},
{
"name": "CVE-2023-53332",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53332"
},
{
"name": "CVE-2024-35924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35924"
},
{
"name": "CVE-2024-58095",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58095"
},
{
"name": "CVE-2024-45010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45010"
},
{
"name": "CVE-2022-49471",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49471"
},
{
"name": "CVE-2025-68174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68174"
},
{
"name": "CVE-2022-48976",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48976"
},
{
"name": "CVE-2025-21751",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21751"
},
{
"name": "CVE-2023-53753",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53753"
},
{
"name": "CVE-2024-41074",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41074"
},
{
"name": "CVE-2026-23234",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23234"
},
{
"name": "CVE-2025-40272",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40272"
},
{
"name": "CVE-2024-50106",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50106"
},
{
"name": "CVE-2025-23162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23162"
},
{
"name": "CVE-2026-23133",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23133"
},
{
"name": "CVE-2025-71093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71093"
},
{
"name": "CVE-2017-13694",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13694"
},
{
"name": "CVE-2025-71102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71102"
},
{
"name": "CVE-2026-23212",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23212"
},
{
"name": "CVE-2013-7445",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-7445"
},
{
"name": "CVE-2026-23170",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23170"
},
{
"name": "CVE-2023-52701",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52701"
},
{
"name": "CVE-2024-49906",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49906"
},
{
"name": "CVE-2024-26647",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26647"
},
{
"name": "CVE-2025-68759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68759"
},
{
"name": "CVE-2024-47809",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47809"
},
{
"name": "CVE-2026-23204",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23204"
},
{
"name": "CVE-2022-49317",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49317"
},
{
"name": "CVE-2026-23019",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23019"
},
{
"name": "CVE-2018-12928",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12928"
},
{
"name": "CVE-2025-71188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71188"
},
{
"name": "CVE-2023-38552",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38552"
},
{
"name": "CVE-2024-40989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40989"
},
{
"name": "CVE-2024-56607",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56607"
},
{
"name": "CVE-2025-40345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40345"
},
{
"name": "CVE-2026-27142",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27142"
},
{
"name": "CVE-2024-49904",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49904"
},
{
"name": "CVE-2023-53671",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53671"
},
{
"name": "CVE-2025-40354",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40354"
},
{
"name": "CVE-2024-26938",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26938"
},
{
"name": "CVE-2026-28417",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28417"
},
{
"name": "CVE-2025-37931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37931"
},
{
"name": "CVE-2024-35999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35999"
},
{
"name": "CVE-2023-29942",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29942"
},
{
"name": "CVE-2026-23125",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23125"
},
{
"name": "CVE-2026-0966",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0966"
},
{
"name": "CVE-2022-48633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48633"
},
{
"name": "CVE-2022-3238",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3238"
},
{
"name": "CVE-2024-38557",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38557"
},
{
"name": "CVE-2026-22185",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22185"
},
{
"name": "CVE-2023-53781",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53781"
},
{
"name": "CVE-2023-53584",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53584"
},
{
"name": "CVE-2024-57809",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57809"
},
{
"name": "CVE-2025-38057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38057"
},
{
"name": "CVE-2025-68733",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68733"
},
{
"name": "CVE-2024-56719",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56719"
},
{
"name": "CVE-2022-50418",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50418"
},
{
"name": "CVE-2023-53438",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53438"
},
{
"name": "CVE-2025-47906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47906"
},
{
"name": "CVE-2023-53460",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53460"
},
{
"name": "CVE-2026-23214",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23214"
},
{
"name": "CVE-2024-52559",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52559"
},
{
"name": "CVE-2025-68188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68188"
},
{
"name": "CVE-2025-40269",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40269"
},
{
"name": "CVE-2024-56671",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56671"
},
{
"name": "CVE-2025-68335",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68335"
},
{
"name": "CVE-2025-71079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71079"
},
{
"name": "CVE-2025-62626",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62626"
},
{
"name": "CVE-2025-39940",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39940"
},
{
"name": "CVE-2023-52751",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52751"
},
{
"name": "CVE-2022-49562",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49562"
},
{
"name": "CVE-2025-37861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37861"
},
{
"name": "CVE-2023-53483",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53483"
},
{
"name": "CVE-2023-53673",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53673"
},
{
"name": "CVE-2025-37938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37938"
},
{
"name": "CVE-2025-37746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37746"
},
{
"name": "CVE-2022-38076",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38076"
},
{
"name": "CVE-2025-38368",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38368"
},
{
"name": "CVE-2026-23178",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23178"
},
{
"name": "CVE-2025-59375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59375"
},
{
"name": "CVE-2025-31133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31133"
},
{
"name": "CVE-2026-22997",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22997"
},
{
"name": "CVE-2024-56368",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56368"
},
{
"name": "CVE-2025-40075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40075"
},
{
"name": "CVE-2022-49172",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49172"
},
{
"name": "CVE-2024-40979",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40979"
},
{
"name": "CVE-2025-39977",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39977"
},
{
"name": "CVE-2025-38331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38331"
},
{
"name": "CVE-2026-23240",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23240"
},
{
"name": "CVE-2025-68330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68330"
},
{
"name": "CVE-2026-23228",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23228"
},
{
"name": "CVE-2024-49945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49945"
},
{
"name": "CVE-2022-44033",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44033"
},
{
"name": "CVE-2024-56757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56757"
},
{
"name": "CVE-2023-53662",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53662"
},
{
"name": "CVE-2025-38069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38069"
},
{
"name": "CVE-2022-49750",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49750"
},
{
"name": "CVE-2023-53707",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53707"
},
{
"name": "CVE-2023-53115",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53115"
},
{
"name": "CVE-2025-71196",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71196"
},
{
"name": "CVE-2025-21645",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21645"
},
{
"name": "CVE-2023-54107",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54107"
},
{
"name": "CVE-2022-48646",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48646"
},
{
"name": "CVE-2024-43912",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43912"
},
{
"name": "CVE-2024-35808",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35808"
},
{
"name": "CVE-2024-58012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58012"
},
{
"name": "CVE-2025-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50181"
},
{
"name": "CVE-2025-61663",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61663"
},
{
"name": "CVE-2025-68772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68772"
},
{
"name": "CVE-2024-49891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49891"
},
{
"name": "CVE-2024-36948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36948"
},
{
"name": "CVE-2022-48887",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48887"
},
{
"name": "CVE-2024-40977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40977"
},
{
"name": "CVE-2024-26948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26948"
},
{
"name": "CVE-2023-53370",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53370"
},
{
"name": "CVE-2024-53187",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53187"
},
{
"name": "CVE-2023-45929",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45929"
},
{
"name": "CVE-2025-68343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68343"
},
{
"name": "CVE-2025-66382",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66382"
},
{
"name": "CVE-2024-57795",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57795"
},
{
"name": "CVE-2025-37855",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37855"
},
{
"name": "CVE-2025-21816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21816"
},
{
"name": "CVE-2021-33115",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33115"
},
{
"name": "CVE-2025-21780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21780"
},
{
"name": "CVE-2020-26559",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26559"
},
{
"name": "CVE-2024-12705",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12705"
},
{
"name": "CVE-2025-69421",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69421"
},
{
"name": "CVE-2020-26140",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26140"
},
{
"name": "CVE-2024-39508",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39508"
},
{
"name": "CVE-2026-23191",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23191"
},
{
"name": "CVE-2026-32249",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32249"
},
{
"name": "CVE-2025-37899",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37899"
},
{
"name": "CVE-2026-23078",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23078"
},
{
"name": "CVE-2025-40362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40362"
},
{
"name": "CVE-2025-68201",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68201"
},
{
"name": "CVE-2024-43831",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43831"
},
{
"name": "CVE-2023-30630",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30630"
},
{
"name": "CVE-2025-40289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40289"
},
{
"name": "CVE-2026-23169",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23169"
},
{
"name": "CVE-2025-38330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38330"
},
{
"name": "CVE-2025-58188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58188"
},
{
"name": "CVE-2017-13693",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13693"
},
{
"name": "CVE-2025-68768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68768"
},
{
"name": "CVE-2024-50284",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50284"
},
{
"name": "CVE-2022-49306",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49306"
},
{
"name": "CVE-2024-49898",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49898"
},
{
"name": "CVE-2025-36423",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36423"
},
{
"name": "CVE-2022-49622",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49622"
},
{
"name": "CVE-2025-68785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68785"
},
{
"name": "CVE-2024-50211",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50211"
},
{
"name": "CVE-2025-38507",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38507"
},
{
"name": "CVE-2022-50284",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50284"
},
{
"name": "CVE-2025-39989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39989"
},
{
"name": "CVE-2023-6240",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6240"
},
{
"name": "CVE-2025-38014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38014"
},
{
"name": "CVE-2025-22028",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22028"
},
{
"name": "CVE-2024-41008",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41008"
},
{
"name": "CVE-2024-27035",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27035"
},
{
"name": "CVE-2023-53218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53218"
},
{
"name": "CVE-2022-25836",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25836"
},
{
"name": "CVE-2024-37354",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37354"
},
{
"name": "CVE-2025-68808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68808"
},
{
"name": "CVE-2025-4674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
},
{
"name": "CVE-2025-29934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29934"
},
{
"name": "CVE-2024-27005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27005"
},
{
"name": "CVE-2025-68223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68223"
},
{
"name": "CVE-2022-49133",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49133"
},
{
"name": "CVE-2024-36951",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36951"
},
{
"name": "CVE-2025-68783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68783"
},
{
"name": "CVE-2025-71147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71147"
},
{
"name": "CVE-2025-38438",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38438"
},
{
"name": "CVE-2025-40032",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40032"
},
{
"name": "CVE-2023-26555",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26555"
},
{
"name": "CVE-2023-1193",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1193"
},
{
"name": "CVE-2025-71220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71220"
},
{
"name": "CVE-2024-46806",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46806"
},
{
"name": "CVE-2022-50073",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50073"
},
{
"name": "CVE-2025-68724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68724"
},
{
"name": "CVE-2025-5278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5278"
},
{
"name": "CVE-2026-23103",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23103"
},
{
"name": "CVE-2026-23074",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23074"
},
{
"name": "CVE-2025-68786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68786"
},
{
"name": "CVE-2025-39732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39732"
},
{
"name": "CVE-2022-50393",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50393"
},
{
"name": "CVE-2025-68779",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68779"
},
{
"name": "CVE-2024-56433",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56433"
},
{
"name": "CVE-2025-21819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21819"
},
{
"name": "CVE-2025-48514",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48514"
},
{
"name": "CVE-2024-41030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41030"
},
{
"name": "CVE-2025-71199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71199"
},
{
"name": "CVE-2024-47664",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47664"
},
{
"name": "CVE-2024-36915",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36915"
},
{
"name": "CVE-2026-25749",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25749"
},
{
"name": "CVE-2024-49504",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49504"
},
{
"name": "CVE-2025-38118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38118"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2023-53367",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53367"
},
{
"name": "CVE-2022-50500",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50500"
},
{
"name": "CVE-2019-14899",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14899"
},
{
"name": "CVE-2022-29526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29526"
},
{
"name": "CVE-2024-53098",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53098"
},
{
"name": "CVE-2025-68797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68797"
},
{
"name": "CVE-2024-49968",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49968"
},
{
"name": "CVE-2025-68358",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68358"
},
{
"name": "CVE-2025-40206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40206"
},
{
"name": "CVE-2026-23180",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23180"
},
{
"name": "CVE-2021-0164",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0164"
},
{
"name": "CVE-2024-46870",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46870"
},
{
"name": "CVE-2022-49178",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49178"
},
{
"name": "CVE-2024-22195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22195"
},
{
"name": "CVE-2023-23931",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23931"
},
{
"name": "CVE-2024-49929",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49929"
},
{
"name": "CVE-2025-40257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40257"
},
{
"name": "CVE-2023-53748",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53748"
},
{
"name": "CVE-2024-26740",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26740"
},
{
"name": "CVE-2022-49173",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49173"
},
{
"name": "CVE-2024-45781",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45781"
},
{
"name": "CVE-2025-71125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71125"
},
{
"name": "CVE-2025-21947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21947"
},
{
"name": "CVE-2024-53056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53056"
},
{
"name": "CVE-2022-50551",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50551"
},
{
"name": "CVE-2026-26269",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26269"
},
{
"name": "CVE-2024-43872",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43872"
},
{
"name": "CVE-2025-71108",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71108"
},
{
"name": "CVE-2022-49401",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49401"
},
{
"name": "CVE-2025-71069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71069"
},
{
"name": "CVE-2025-68312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68312"
},
{
"name": "CVE-2025-68284",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68284"
},
{
"name": "CVE-2025-68194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68194"
},
{
"name": "CVE-2023-52939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52939"
},
{
"name": "CVE-2024-14027",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-14027"
},
{
"name": "CVE-2025-38269",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38269"
},
{
"name": "CVE-2025-69649",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69649"
},
{
"name": "CVE-2024-53175",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53175"
},
{
"name": "CVE-2025-21734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21734"
},
{
"name": "CVE-2024-49859",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49859"
},
{
"name": "CVE-2025-40336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40336"
},
{
"name": "CVE-2025-37945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37945"
},
{
"name": "CVE-2025-71195",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71195"
},
{
"name": "CVE-2022-49766",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49766"
},
{
"name": "CVE-2025-6141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6141"
},
{
"name": "CVE-2025-22043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22043"
},
{
"name": "CVE-2024-49569",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49569"
},
{
"name": "CVE-2025-61984",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61984"
},
{
"name": "CVE-2023-52569",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52569"
},
{
"name": "CVE-2024-56609",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56609"
},
{
"name": "CVE-2022-49940",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49940"
},
{
"name": "CVE-2026-23083",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23083"
},
{
"name": "CVE-2025-38422",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38422"
},
{
"name": "CVE-2024-56611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56611"
},
{
"name": "CVE-2025-21927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21927"
},
{
"name": "CVE-2026-23088",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23088"
},
{
"name": "CVE-2020-25743",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25743"
},
{
"name": "CVE-2022-50167",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50167"
},
{
"name": "CVE-2025-68183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68183"
},
{
"name": "CVE-2026-27704",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27704"
},
{
"name": "CVE-2022-48064",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48064"
},
{
"name": "CVE-2023-45896",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45896"
},
{
"name": "CVE-2025-37903",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37903"
},
{
"name": "CVE-2025-68774",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68774"
},
{
"name": "CVE-2024-49940",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49940"
},
{
"name": "CVE-2025-40263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40263"
},
{
"name": "CVE-2021-3735",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3735"
},
{
"name": "CVE-2025-40353",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40353"
},
{
"name": "CVE-2024-46861",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46861"
},
{
"name": "CVE-2025-40222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40222"
},
{
"name": "CVE-2022-50634",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50634"
},
{
"name": "CVE-2025-52881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52881"
},
{
"name": "CVE-2025-54514",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54514"
},
{
"name": "CVE-2025-71202",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71202"
},
{
"name": "CVE-2015-7837",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7837"
},
{
"name": "CVE-2025-0677",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0677"
},
{
"name": "CVE-2024-45780",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45780"
},
{
"name": "CVE-2024-46749",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46749"
},
{
"name": "CVE-2022-50492",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50492"
},
{
"name": "CVE-2024-49888",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49888"
},
{
"name": "CVE-2022-50406",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50406"
},
{
"name": "CVE-2023-26552",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26552"
},
{
"name": "CVE-2024-49921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49921"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2026-23108",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23108"
},
{
"name": "CVE-2025-71180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71180"
},
{
"name": "CVE-2025-38232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38232"
},
{
"name": "CVE-2025-68244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68244"
},
{
"name": "CVE-2025-59691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59691"
},
{
"name": "CVE-2024-46830",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46830"
},
{
"name": "CVE-2023-52481",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52481"
},
{
"name": "CVE-2023-52888",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52888"
},
{
"name": "CVE-2025-22057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22057"
},
{
"name": "CVE-2024-47666",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47666"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2025-40278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40278"
},
{
"name": "CVE-2023-0160",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0160"
},
{
"name": "CVE-2024-50056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50056"
},
{
"name": "CVE-2025-71194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71194"
},
{
"name": "CVE-2026-1788",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1788"
},
{
"name": "CVE-2023-53721",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53721"
},
{
"name": "CVE-2025-22113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22113"
},
{
"name": "CVE-2025-40342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40342"
},
{
"name": "CVE-2022-50256",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50256"
},
{
"name": "CVE-2024-42091",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42091"
},
{
"name": "CVE-2024-27983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27983"
},
{
"name": "CVE-2025-37907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37907"
},
{
"name": "CVE-2024-38625",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38625"
},
{
"name": "CVE-2025-23085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23085"
},
{
"name": "CVE-2026-22796",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22796"
},
{
"name": "CVE-2023-4010",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4010"
},
{
"name": "CVE-2025-38425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38425"
},
{
"name": "CVE-2024-46727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46727"
},
{
"name": "CVE-2023-54028",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54028"
},
{
"name": "CVE-2024-42129",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42129"
},
{
"name": "CVE-2023-54105",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54105"
},
{
"name": "CVE-2018-17977",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17977"
},
{
"name": "CVE-2019-1010204",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1010204"
},
{
"name": "CVE-2023-53992",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53992"
},
{
"name": "CVE-2026-26960",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26960"
},
{
"name": "CVE-2025-40210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40210"
},
{
"name": "CVE-2022-50354",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50354"
},
{
"name": "CVE-2025-61724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61724"
},
{
"name": "CVE-2026-22999",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22999"
},
{
"name": "CVE-2025-21812",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21812"
},
{
"name": "CVE-2025-71082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71082"
},
{
"name": "CVE-2025-12801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12801"
},
{
"name": "CVE-2024-58015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58015"
},
{
"name": "CVE-2026-23068",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23068"
},
{
"name": "CVE-2024-41079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41079"
},
{
"name": "CVE-2025-68765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68765"
},
{
"name": "CVE-2026-23089",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23089"
},
{
"name": "CVE-2024-43823",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43823"
},
{
"name": "CVE-2023-52589",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52589"
},
{
"name": "CVE-2022-41848",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41848"
},
{
"name": "CVE-2026-23216",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23216"
},
{
"name": "CVE-2023-53434",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53434"
},
{
"name": "CVE-2023-29935",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29935"
},
{
"name": "CVE-2023-35061",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35061"
},
{
"name": "CVE-2025-71132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71132"
},
{
"name": "CVE-2025-71225",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71225"
},
{
"name": "CVE-2026-21636",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21636"
},
{
"name": "CVE-2026-23239",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23239"
},
{
"name": "CVE-2021-0172",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0172"
},
{
"name": "CVE-2024-47662",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47662"
},
{
"name": "CVE-2018-12930",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12930"
},
{
"name": "CVE-2026-23071",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23071"
},
{
"name": "CVE-2024-49970",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49970"
},
{
"name": "CVE-2024-41067",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41067"
},
{
"name": "CVE-2024-26844",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26844"
},
{
"name": "CVE-2025-23141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23141"
},
{
"name": "CVE-2026-23056",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23056"
},
{
"name": "CVE-2025-40193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40193"
},
{
"name": "CVE-2023-32644",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32644"
},
{
"name": "CVE-2025-71077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71077"
},
{
"name": "CVE-2025-21908",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21908"
},
{
"name": "CVE-2024-46681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46681"
},
{
"name": "CVE-2024-36927",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36927"
},
{
"name": "CVE-2025-61732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61732"
},
{
"name": "CVE-2025-61723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61723"
},
{
"name": "CVE-2025-9232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9232"
},
{
"name": "CVE-2025-40012",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40012"
},
{
"name": "CVE-2025-40279",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40279"
},
{
"name": "CVE-2026-0964",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0964"
},
{
"name": "CVE-2025-68328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68328"
},
{
"name": "CVE-2023-53178",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53178"
},
{
"name": "CVE-2024-47141",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47141"
},
{
"name": "CVE-2024-8354",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8354"
},
{
"name": "CVE-2023-54323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54323"
},
{
"name": "CVE-2025-37952",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37952"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2025-0689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0689"
},
{
"name": "CVE-2022-50316",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50316"
},
{
"name": "CVE-2023-31347",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31347"
},
{
"name": "CVE-2025-40084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40084"
},
{
"name": "CVE-2025-22111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22111"
},
{
"name": "CVE-2023-53657",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53657"
},
{
"name": "CVE-2024-49915",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49915"
},
{
"name": "CVE-2026-23063",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23063"
},
{
"name": "CVE-2025-55132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55132"
},
{
"name": "CVE-2023-52732",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52732"
},
{
"name": "CVE-2022-49759",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49759"
},
{
"name": "CVE-2026-23073",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23073"
},
{
"name": "CVE-2022-49167",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49167"
},
{
"name": "CVE-2025-68311",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68311"
},
{
"name": "CVE-2026-27903",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27903"
},
{
"name": "CVE-2023-54023",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54023"
},
{
"name": "CVE-2024-27056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27056"
},
{
"name": "CVE-2023-31082",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31082"
},
{
"name": "CVE-2024-41088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41088"
},
{
"name": "CVE-2025-0690",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0690"
},
{
"name": "CVE-2025-71114",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71114"
},
{
"name": "CVE-2023-53052",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53052"
},
{
"name": "CVE-2026-23058",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23058"
},
{
"name": "CVE-2022-49234",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49234"
},
{
"name": "CVE-2022-50163",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50163"
},
{
"name": "CVE-2024-36922",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36922"
},
{
"name": "CVE-2025-71067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71067"
},
{
"name": "CVE-2024-49919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49919"
},
{
"name": "CVE-2026-23238",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23238"
},
{
"name": "CVE-2025-71182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71182"
},
{
"name": "CVE-2020-26556",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26556"
},
{
"name": "CVE-2025-46394",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46394"
},
{
"name": "CVE-2025-66471",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66471"
},
{
"name": "CVE-2026-23038",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23038"
},
{
"name": "CVE-2025-40341",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40341"
},
{
"name": "CVE-2025-38409",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38409"
},
{
"name": "CVE-2021-3826",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3826"
},
{
"name": "CVE-2024-26699",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26699"
},
{
"name": "CVE-2024-57876",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57876"
},
{
"name": "CVE-2024-58019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58019"
},
{
"name": "CVE-2026-25679",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25679"
},
{
"name": "CVE-2026-22990",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22990"
},
{
"name": "CVE-2025-14017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14017"
},
{
"name": "CVE-2022-50390",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50390"
},
{
"name": "CVE-2026-23000",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23000"
},
{
"name": "CVE-2026-21441",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21441"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2025-71186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71186"
},
{
"name": "CVE-2024-53220",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53220"
},
{
"name": "CVE-2026-23176",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23176"
},
{
"name": "CVE-2023-53539",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53539"
},
{
"name": "CVE-2025-40338",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40338"
},
{
"name": "CVE-2025-68821",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68821"
},
{
"name": "CVE-2025-31648",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31648"
},
{
"name": "CVE-2026-1229",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1229"
},
{
"name": "CVE-2025-0678",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0678"
},
{
"name": "CVE-2024-41075",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41075"
},
{
"name": "CVE-2026-23026",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23026"
},
{
"name": "CVE-2024-56674",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56674"
},
{
"name": "CVE-2024-27982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27982"
},
{
"name": "CVE-2025-40195",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40195"
},
{
"name": "CVE-2024-31884",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-31884"
},
{
"name": "CVE-2025-21976",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21976"
},
{
"name": "CVE-2019-1563",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1563"
},
{
"name": "CVE-2026-23128",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23128"
},
{
"name": "CVE-2024-57975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57975"
},
{
"name": "CVE-2023-53574",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53574"
},
{
"name": "CVE-2022-50166",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50166"
},
{
"name": "CVE-2025-61725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61725"
},
{
"name": "CVE-2025-68325",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68325"
},
{
"name": "CVE-2025-71190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71190"
},
{
"name": "CVE-2024-56738",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56738"
},
{
"name": "CVE-2022-50778",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50778"
},
{
"name": "CVE-2024-42067",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42067"
},
{
"name": "CVE-2022-49971",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49971"
},
{
"name": "CVE-2025-71089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71089"
},
{
"name": "CVE-2025-21693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21693"
},
{
"name": "CVE-2025-71203",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71203"
},
{
"name": "CVE-2024-56657",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56657"
},
{
"name": "CVE-2025-39789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39789"
},
{
"name": "CVE-2022-49124",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49124"
},
{
"name": "CVE-2024-49901",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49901"
},
{
"name": "CVE-2023-52700",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52700"
},
{
"name": "CVE-2024-56583",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56583"
},
{
"name": "CVE-2022-50195",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50195"
},
{
"name": "CVE-2025-40358",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40358"
},
{
"name": "CVE-2024-40998",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40998"
},
{
"name": "CVE-2024-56712",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56712"
},
{
"name": "CVE-2025-68318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68318"
},
{
"name": "CVE-2022-49980",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49980"
},
{
"name": "CVE-2023-52634",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52634"
},
{
"name": "CVE-2025-22104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22104"
},
{
"name": "CVE-2022-2795",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2795"
},
{
"name": "CVE-2025-62526",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62526"
},
{
"name": "CVE-2024-49918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49918"
},
{
"name": "CVE-2025-68296",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68296"
},
{
"name": "CVE-2023-53785",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53785"
},
{
"name": "CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"name": "CVE-2024-45776",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45776"
},
{
"name": "CVE-2022-50090",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50090"
},
{
"name": "CVE-2025-40340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40340"
},
{
"name": "CVE-2025-68332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68332"
},
{
"name": "CVE-2020-14356",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14356"
},
{
"name": "CVE-2025-68745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68745"
},
{
"name": "CVE-2023-54263",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54263"
},
{
"name": "CVE-2025-71104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71104"
},
{
"name": "CVE-2026-22978",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22978"
},
{
"name": "CVE-2023-53764",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53764"
},
{
"name": "CVE-2024-53687",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53687"
},
{
"name": "CVE-2025-39901",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39901"
},
{
"name": "CVE-2025-40283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40283"
},
{
"name": "CVE-2025-5918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5918"
},
{
"name": "CVE-2024-38628",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38628"
},
{
"name": "CVE-2025-40324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40324"
},
{
"name": "CVE-2025-38672",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38672"
},
{
"name": "CVE-2023-54181",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54181"
},
{
"name": "CVE-2025-0684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0684"
},
{
"name": "CVE-2025-10158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10158"
},
{
"name": "CVE-2025-68378",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68378"
},
{
"name": "CVE-2024-47794",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47794"
},
{
"name": "CVE-2026-23146",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23146"
},
{
"name": "CVE-2025-38272",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38272"
},
{
"name": "CVE-2024-10524",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10524"
},
{
"name": "CVE-2025-40146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40146"
},
{
"name": "CVE-2025-38359",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38359"
},
{
"name": "CVE-2019-20794",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20794"
},
{
"name": "CVE-2023-53849",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53849"
},
{
"name": "CVE-2022-4543",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4543"
},
{
"name": "CVE-2025-21899",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21899"
},
{
"name": "CVE-2024-35195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35195"
},
{
"name": "CVE-2025-38129",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38129"
},
{
"name": "CVE-2026-23037",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23037"
},
{
"name": "CVE-2023-53627",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53627"
},
{
"name": "CVE-2025-40250",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40250"
},
{
"name": "CVE-2025-38091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38091"
},
{
"name": "CVE-2023-53510",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53510"
},
{
"name": "CVE-2025-40264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40264"
},
{
"name": "CVE-2025-38334",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38334"
},
{
"name": "CVE-2023-53575",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53575"
},
{
"name": "CVE-2022-49516",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49516"
},
{
"name": "CVE-2025-40778",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40778"
},
{
"name": "CVE-2025-38728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38728"
},
{
"name": "CVE-2022-3523",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3523"
},
{
"name": "CVE-2026-26157",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26157"
},
{
"name": "CVE-2026-23001",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23001"
},
{
"name": "CVE-2023-38417",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38417"
},
{
"name": "CVE-2025-68367",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68367"
},
{
"name": "CVE-2025-71224",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71224"
},
{
"name": "CVE-2025-22072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22072"
},
{
"name": "CVE-2025-68820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68820"
},
{
"name": "CVE-2021-45261",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45261"
},
{
"name": "CVE-2025-40074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40074"
},
{
"name": "CVE-2026-23193",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23193"
},
{
"name": "CVE-2025-40321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40321"
},
{
"name": "CVE-2024-47736",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47736"
},
{
"name": "CVE-2023-53037",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53037"
},
{
"name": "CVE-2024-46842",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46842"
},
{
"name": "CVE-2025-71237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71237"
},
{
"name": "CVE-2025-13462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13462"
},
{
"name": "CVE-2024-50112",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50112"
},
{
"name": "CVE-2025-69646",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69646"
},
{
"name": "CVE-2023-54207",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54207"
},
{
"name": "CVE-2026-23215",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23215"
},
{
"name": "CVE-2024-28956",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28956"
},
{
"name": "CVE-2025-68740",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68740"
},
{
"name": "CVE-2020-26142",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26142"
},
{
"name": "CVE-2022-49955",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49955"
},
{
"name": "CVE-2023-53628",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53628"
},
{
"name": "CVE-2025-29943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29943"
},
{
"name": "CVE-2025-39978",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39978"
},
{
"name": "CVE-2023-31346",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31346"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2025-40158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40158"
},
{
"name": "CVE-2024-56201",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56201"
},
{
"name": "CVE-2025-38071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38071"
},
{
"name": "CVE-2025-38140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38140"
},
{
"name": "CVE-2022-50002",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50002"
},
{
"name": "CVE-2025-38621",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38621"
},
{
"name": "CVE-2025-68742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68742"
},
{
"name": "CVE-2025-39908",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39908"
},
{
"name": "CVE-2026-24842",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24842"
},
{
"name": "CVE-2024-49920",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49920"
},
{
"name": "CVE-2025-40282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40282"
},
{
"name": "CVE-2026-23118",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23118"
},
{
"name": "CVE-2025-34034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-34034"
},
{
"name": "CVE-2025-37984",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37984"
},
{
"name": "CVE-2025-59692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59692"
},
{
"name": "CVE-2022-50116",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50116"
},
{
"name": "CVE-2018-12931",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12931"
},
{
"name": "CVE-2025-40168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40168"
},
{
"name": "CVE-2025-37856",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37856"
},
{
"name": "CVE-2022-50224",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50224"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2020-13791",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13791"
},
{
"name": "CVE-2026-23950",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23950"
},
{
"name": "CVE-2024-49990",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49990"
},
{
"name": "CVE-2020-15802",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15802"
},
{
"name": "CVE-2020-24240",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24240"
},
{
"name": "CVE-2024-46718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46718"
},
{
"name": "CVE-2025-68816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68816"
},
{
"name": "CVE-2024-41045",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41045"
},
{
"name": "CVE-2023-53545",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53545"
},
{
"name": "CVE-2022-50552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50552"
},
{
"name": "CVE-2021-0066",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0066"
},
{
"name": "CVE-2025-38333",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38333"
},
{
"name": "CVE-2023-53376",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53376"
},
{
"name": "CVE-2023-53538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53538"
},
{
"name": "CVE-2025-68192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68192"
},
{
"name": "CVE-2024-5569",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5569"
},
{
"name": "CVE-2025-68379",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68379"
},
{
"name": "CVE-2022-50357",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50357"
},
{
"name": "CVE-2024-57952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57952"
},
{
"name": "CVE-2025-68256",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68256"
},
{
"name": "CVE-2025-68777",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68777"
},
{
"name": "CVE-2023-52671",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52671"
},
{
"name": "CVE-2022-50303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50303"
},
{
"name": "CVE-2024-35870",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35870"
},
{
"name": "CVE-2025-68254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68254"
},
{
"name": "CVE-2026-23221",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23221"
},
{
"name": "CVE-2025-38059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38059"
},
{
"name": "CVE-2024-27014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27014"
},
{
"name": "CVE-2024-36013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36013"
},
{
"name": "CVE-2024-53176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53176"
},
{
"name": "CVE-2025-37956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37956"
},
{
"name": "CVE-2025-40196",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40196"
},
{
"name": "CVE-2024-49880",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49880"
},
{
"name": "CVE-2023-52676",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52676"
},
{
"name": "CVE-2025-38117",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38117"
},
{
"name": "CVE-2017-13165",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13165"
},
{
"name": "CVE-2025-38556",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38556"
},
{
"name": "CVE-2025-68171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68171"
},
{
"name": "CVE-2025-39932",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39932"
},
{
"name": "CVE-2024-47683",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47683"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2024-46811",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46811"
},
{
"name": "CVE-2025-21985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21985"
},
{
"name": "CVE-2025-22109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22109"
},
{
"name": "CVE-2025-38300",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38300"
},
{
"name": "CVE-2025-40040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40040"
},
{
"name": "CVE-2023-53635",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53635"
},
{
"name": "CVE-2025-39810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39810"
},
{
"name": "CVE-2026-22982",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22982"
},
{
"name": "CVE-2025-23132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23132"
},
{
"name": "CVE-2024-47678",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47678"
},
{
"name": "CVE-2022-49531",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49531"
},
{
"name": "CVE-2022-49504",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49504"
},
{
"name": "CVE-2025-1376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1376"
},
{
"name": "CVE-2022-49810",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49810"
},
{
"name": "CVE-2025-47912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47912"
},
{
"name": "CVE-2025-71109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71109"
},
{
"name": "CVE-2023-26586",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26586"
},
{
"name": "CVE-2025-38373",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38373"
},
{
"name": "CVE-2025-66861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66861"
},
{
"name": "CVE-2025-40095",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40095"
},
{
"name": "CVE-2025-37957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37957"
},
{
"name": "CVE-2025-38369",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38369"
},
{
"name": "CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"name": "CVE-2024-44950",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44950"
},
{
"name": "CVE-2025-39759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39759"
},
{
"name": "CVE-2022-50332",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50332"
},
{
"name": "CVE-2023-53822",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53822"
},
{
"name": "CVE-2024-27408",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27408"
},
{
"name": "CVE-2025-71222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71222"
},
{
"name": "CVE-2022-50461",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50461"
},
{
"name": "CVE-2025-21801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21801"
},
{
"name": "CVE-2023-26554",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26554"
},
{
"name": "CVE-2025-38486",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38486"
},
{
"name": "CVE-2021-26934",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26934"
},
{
"name": "CVE-2023-53466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53466"
},
{
"name": "CVE-2025-21629",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21629"
},
{
"name": "CVE-2025-71118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71118"
},
{
"name": "CVE-2023-53168",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53168"
},
{
"name": "CVE-2022-49528",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49528"
},
{
"name": "CVE-2025-68160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68160"
},
{
"name": "CVE-2022-45888",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45888"
},
{
"name": "CVE-2022-49218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49218"
},
{
"name": "CVE-2023-52749",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52749"
},
{
"name": "CVE-2025-39754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39754"
},
{
"name": "CVE-2025-40286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40286"
},
{
"name": "CVE-2022-49967",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49967"
},
{
"name": "CVE-2025-68327",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68327"
},
{
"name": "CVE-2024-2236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2236"
},
{
"name": "CVE-2022-49245",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49245"
},
{
"name": "CVE-2025-38098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38098"
},
{
"name": "CVE-2023-52682",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52682"
},
{
"name": "CVE-2022-50871",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50871"
},
{
"name": "CVE-2025-71150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71150"
},
{
"name": "CVE-2025-71229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71229"
},
{
"name": "CVE-2026-23213",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23213"
},
{
"name": "CVE-2025-39958",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39958"
},
{
"name": "CVE-2018-8956",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8956"
},
{
"name": "CVE-2025-40266",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40266"
},
{
"name": "CVE-2026-23091",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23091"
},
{
"name": "CVE-2025-68241",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68241"
},
{
"name": "CVE-2022-49420",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49420"
},
{
"name": "CVE-2022-40964",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40964"
},
{
"name": "CVE-2026-3441",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3441"
},
{
"name": "CVE-2024-36244",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36244"
},
{
"name": "CVE-2023-53149",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53149"
},
{
"name": "CVE-2026-23237",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23237"
},
{
"name": "CVE-2024-49987",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49987"
},
{
"name": "CVE-2025-60753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-60753"
},
{
"name": "CVE-2022-50746",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50746"
},
{
"name": "CVE-2025-52565",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52565"
},
{
"name": "CVE-2024-50034",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50034"
},
{
"name": "CVE-2025-38259",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38259"
},
{
"name": "CVE-2025-71192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71192"
},
{
"name": "CVE-2023-53596",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53596"
},
{
"name": "CVE-2022-49943",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49943"
},
{
"name": "CVE-2022-50260",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50260"
},
{
"name": "CVE-2025-40135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40135"
},
{
"name": "CVE-2026-23121",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23121"
},
{
"name": "CVE-2020-12319",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12319"
},
{
"name": "CVE-2025-37951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37951"
},
{
"name": "CVE-2023-50495",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50495"
},
{
"name": "CVE-2024-49568",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49568"
},
{
"name": "CVE-2025-21750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21750"
},
{
"name": "CVE-2024-36924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36924"
},
{
"name": "CVE-2017-11164",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11164"
},
{
"name": "CVE-2023-3397",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3397"
},
{
"name": "CVE-2025-68734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68734"
},
{
"name": "CVE-2024-26672",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26672"
},
{
"name": "CVE-2024-57924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57924"
},
{
"name": "CVE-2025-37947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37947"
},
{
"name": "CVE-2025-68776",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68776"
},
{
"name": "CVE-2025-61728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61728"
},
{
"name": "CVE-2025-71066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71066"
},
{
"name": "CVE-2026-0965",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0965"
},
{
"name": "CVE-2023-53806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53806"
},
{
"name": "CVE-2025-21817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21817"
},
{
"name": "CVE-2025-68972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68972"
},
{
"name": "CVE-2025-68799",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68799"
},
{
"name": "CVE-2021-33139",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33139"
},
{
"name": "CVE-2025-58186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58186"
},
{
"name": "CVE-2025-21825",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21825"
},
{
"name": "CVE-2025-38192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38192"
},
{
"name": "CVE-2025-71236",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71236"
},
{
"name": "CVE-2025-68345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68345"
},
{
"name": "CVE-2025-39800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39800"
},
{
"name": "CVE-2024-50057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50057"
},
{
"name": "CVE-2025-38343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38343"
},
{
"name": "CVE-2025-71097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71097"
},
{
"name": "CVE-2024-46808",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46808"
},
{
"name": "CVE-2026-26158",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26158"
},
{
"name": "CVE-2025-38202",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38202"
},
{
"name": "CVE-2025-68288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68288"
},
{
"name": "CVE-2025-38168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38168"
},
{
"name": "CVE-2023-53547",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53547"
},
{
"name": "CVE-2019-20426",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20426"
},
{
"name": "CVE-2025-71107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71107"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2025-40310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40310"
},
{
"name": "CVE-2026-29786",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-29786"
},
{
"name": "CVE-2025-58187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58187"
},
{
"name": "CVE-2025-40083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40083"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2024-56584",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56584"
},
{
"name": "CVE-2026-23235",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23235"
},
{
"name": "CVE-2025-71111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71111"
},
{
"name": "CVE-2022-4899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4899"
},
{
"name": "CVE-2025-71152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71152"
},
{
"name": "CVE-2024-42139",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42139"
},
{
"name": "CVE-2024-56692",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56692"
},
{
"name": "CVE-2024-53196",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53196"
},
{
"name": "CVE-2025-38665",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38665"
},
{
"name": "CVE-2022-50212",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50212"
},
{
"name": "CVE-2026-23087",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23087"
},
{
"name": "CVE-2023-54259",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54259"
},
{
"name": "CVE-2025-68802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68802"
},
{
"name": "CVE-2023-54067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54067"
},
{
"name": "CVE-2025-1369",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1369"
},
{
"name": "CVE-2022-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3219"
},
{
"name": "CVE-2025-68317",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68317"
},
{
"name": "CVE-2023-53231",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53231"
},
{
"name": "CVE-2025-71185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71185"
},
{
"name": "CVE-2022-2961",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2961"
},
{
"name": "CVE-2025-40331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40331"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2022-49635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49635"
},
{
"name": "CVE-2024-50017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50017"
},
{
"name": "CVE-2026-23096",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23096"
},
{
"name": "CVE-2024-53241",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53241"
},
{
"name": "CVE-2025-38704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38704"
},
{
"name": "CVE-2023-34969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34969"
},
{
"name": "CVE-2021-33155",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33155"
},
{
"name": "CVE-2025-68337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68337"
},
{
"name": "CVE-2024-57899",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57899"
},
{
"name": "CVE-2024-49928",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49928"
},
{
"name": "CVE-2025-21885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21885"
},
{
"name": "CVE-2024-50187",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50187"
},
{
"name": "CVE-2022-50851",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50851"
},
{
"name": "CVE-2025-36001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36001"
},
{
"name": "CVE-2022-50464",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50464"
},
{
"name": "CVE-2025-38674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38674"
},
{
"name": "CVE-2025-40093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40093"
},
{
"name": "CVE-2020-26560",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26560"
},
{
"name": "CVE-2024-26714",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26714"
},
{
"name": "CVE-2024-45777",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45777"
},
{
"name": "CVE-2025-38040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38040"
},
{
"name": "CVE-2024-40954",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40954"
},
{
"name": "CVE-2022-49965",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49965"
},
{
"name": "CVE-2025-54771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54771"
},
{
"name": "CVE-2024-0564",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0564"
},
{
"name": "CVE-2025-39825",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39825"
},
{
"name": "CVE-2025-71131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71131"
},
{
"name": "CVE-2022-49961",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49961"
},
{
"name": "CVE-2025-69651",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69651"
},
{
"name": "CVE-2025-38552",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38552"
},
{
"name": "CVE-2025-40335",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40335"
},
{
"name": "CVE-2025-40149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40149"
},
{
"name": "CVE-2024-58098",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58098"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2022-28667",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28667"
},
{
"name": "CVE-2023-53383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53383"
},
{
"name": "CVE-2024-46717",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46717"
},
{
"name": "CVE-2024-25743",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25743"
},
{
"name": "CVE-2022-50704",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50704"
},
{
"name": "CVE-2025-40164",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40164"
},
{
"name": "CVE-2023-54125",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54125"
},
{
"name": "CVE-2025-10911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10911"
},
{
"name": "CVE-2026-23164",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23164"
},
{
"name": "CVE-2024-41036",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41036"
},
{
"name": "CVE-2023-53751",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53751"
},
{
"name": "CVE-2025-0033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0033"
},
{
"name": "CVE-2023-53743",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53743"
},
{
"name": "CVE-2024-42319",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42319"
},
{
"name": "CVE-2025-37928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37928"
},
{
"name": "CVE-2017-13716",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13716"
},
{
"name": "CVE-2024-22018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22018"
},
{
"name": "CVE-2025-71116",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71116"
},
{
"name": "CVE-2022-40735",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40735"
},
{
"name": "CVE-2024-36024",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36024"
},
{
"name": "CVE-2025-21723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21723"
},
{
"name": "CVE-2023-54190",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54190"
},
{
"name": "CVE-2023-52879",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52879"
},
{
"name": "CVE-2025-68281",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68281"
},
{
"name": "CVE-2023-52837",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52837"
},
{
"name": "CVE-2025-38440",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38440"
},
{
"name": "CVE-2026-23124",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23124"
},
{
"name": "CVE-2023-52981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52981"
},
{
"name": "CVE-2024-53224",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53224"
},
{
"name": "CVE-2024-49910",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49910"
},
{
"name": "CVE-2025-68362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68362"
},
{
"name": "CVE-2023-53105",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53105"
},
{
"name": "CVE-2025-68236",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68236"
},
{
"name": "CVE-2024-39286",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39286"
},
{
"name": "CVE-2025-14524",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14524"
},
{
"name": "CVE-2024-49855",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49855"
},
{
"name": "CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"name": "CVE-2025-68333",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68333"
},
{
"name": "CVE-2024-47689",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47689"
},
{
"name": "CVE-2025-71160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71160"
},
{
"name": "CVE-2025-71232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71232"
},
{
"name": "CVE-2023-52625",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52625"
},
{
"name": "CVE-2023-53353",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53353"
},
{
"name": "CVE-2024-58096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58096"
},
{
"name": "CVE-2025-38225",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38225"
},
{
"name": "CVE-2023-53401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53401"
},
{
"name": "CVE-2025-22037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22037"
},
{
"name": "CVE-2023-53702",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53702"
},
{
"name": "CVE-2025-68290",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68290"
},
{
"name": "CVE-2025-40280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40280"
},
{
"name": "CVE-2024-26842",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26842"
},
{
"name": "CVE-2025-40099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40099"
},
{
"name": "CVE-2023-54059",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54059"
},
{
"name": "CVE-2025-71162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71162"
},
{
"name": "CVE-2021-0170",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0170"
},
{
"name": "CVE-2024-40966",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40966"
},
{
"name": "CVE-2024-53133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53133"
},
{
"name": "CVE-2026-23075",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23075"
},
{
"name": "CVE-2022-50571",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50571"
},
{
"name": "CVE-2021-31879",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31879"
},
{
"name": "CVE-2026-23120",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23120"
},
{
"name": "CVE-2025-40180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40180"
},
{
"name": "CVE-2022-49393",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49393"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2025-68803",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68803"
},
{
"name": "CVE-2026-22996",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22996"
},
{
"name": "CVE-2024-53091",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53091"
},
{
"name": "CVE-2025-39851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39851"
},
{
"name": "CVE-2025-71204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71204"
},
{
"name": "CVE-2025-68331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68331"
},
{
"name": "CVE-2025-38244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38244"
},
{
"name": "CVE-2022-29217",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29217"
},
{
"name": "CVE-2024-26758",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26758"
},
{
"name": "CVE-2025-38080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38080"
},
{
"name": "CVE-2023-32651",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32651"
},
{
"name": "CVE-2025-37747",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37747"
},
{
"name": "CVE-2026-2297",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2297"
},
{
"name": "CVE-2026-23105",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23105"
},
{
"name": "CVE-2023-53036",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53036"
},
{
"name": "CVE-2025-38615",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38615"
},
{
"name": "CVE-2025-58181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58181"
},
{
"name": "CVE-2025-71115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71115"
},
{
"name": "CVE-2026-22976",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22976"
},
{
"name": "CVE-2022-50862",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50862"
},
{
"name": "CVE-2025-1118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1118"
},
{
"name": "CVE-2024-50166",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50166"
},
{
"name": "CVE-2024-35862",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35862"
},
{
"name": "CVE-2023-53355",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53355"
},
{
"name": "CVE-2022-25265",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25265"
},
{
"name": "CVE-2026-0967",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0967"
},
{
"name": "CVE-2026-23181",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23181"
},
{
"name": "CVE-2025-37944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37944"
},
{
"name": "CVE-2023-53558",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53558"
},
{
"name": "CVE-2025-47914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47914"
},
{
"name": "CVE-2025-68214",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68214"
},
{
"name": "CVE-2025-38703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38703"
},
{
"name": "CVE-2026-23141",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23141"
},
{
"name": "CVE-2026-22860",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22860"
},
{
"name": "CVE-2025-36365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36365"
},
{
"name": "CVE-2025-9403",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9403"
},
{
"name": "CVE-2025-40247",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40247"
},
{
"name": "CVE-2023-1255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1255"
},
{
"name": "CVE-2024-56641",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56641"
},
{
"name": "CVE-2024-43842",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43842"
},
{
"name": "CVE-2025-0686",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0686"
},
{
"name": "CVE-2025-21739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21739"
},
{
"name": "CVE-2024-49992",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49992"
},
{
"name": "CVE-2025-68781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68781"
},
{
"name": "CVE-2025-39753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39753"
},
{
"name": "CVE-2025-69418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69418"
},
{
"name": "CVE-2026-23182",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23182"
},
{
"name": "CVE-2021-0173",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0173"
},
{
"name": "CVE-2025-71112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71112"
},
{
"name": "CVE-2023-54285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54285"
},
{
"name": "CVE-2024-45778",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45778"
},
{
"name": "CVE-2026-23086",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23086"
},
{
"name": "CVE-2024-47661",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47661"
},
{
"name": "CVE-2026-28418",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28418"
},
{
"name": "CVE-2023-54151",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54151"
},
{
"name": "CVE-2025-22022",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22022"
},
{
"name": "CVE-2025-66864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66864"
},
{
"name": "CVE-2024-46803",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46803"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2025-59466",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59466"
},
{
"name": "CVE-2025-40192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40192"
},
{
"name": "CVE-2025-38544",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38544"
},
{
"name": "CVE-2025-39797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39797"
},
{
"name": "CVE-2025-68818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68818"
},
{
"name": "CVE-2022-36351",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36351"
},
{
"name": "CVE-2023-52921",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52921"
},
{
"name": "CVE-2025-15468",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15468"
},
{
"name": "CVE-2024-36478",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36478"
},
{
"name": "CVE-2024-43832",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43832"
},
{
"name": "CVE-2026-1299",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1299"
},
{
"name": "CVE-2024-54683",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54683"
},
{
"name": "CVE-2025-1150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1150"
},
{
"name": "CVE-2024-46720",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46720"
},
{
"name": "CVE-2024-26658",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26658"
},
{
"name": "CVE-2026-2243",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2243"
},
{
"name": "CVE-2025-38198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38198"
},
{
"name": "CVE-2025-58189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58189"
},
{
"name": "CVE-2022-36087",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36087"
},
{
"name": "CVE-2024-38564",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38564"
},
{
"name": "CVE-2021-0174",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0174"
},
{
"name": "CVE-2025-8746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8746"
},
{
"name": "CVE-2025-36442",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36442"
},
{
"name": "CVE-2025-38006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38006"
},
{
"name": "CVE-2025-40102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40102"
},
{
"name": "CVE-2026-0968",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0968"
},
{
"name": "CVE-2025-40170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40170"
},
{
"name": "CVE-2025-38437",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38437"
},
{
"name": "CVE-2025-40160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40160"
},
{
"name": "CVE-2023-7008",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7008"
},
{
"name": "CVE-2024-45779",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45779"
},
{
"name": "CVE-2025-40284",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40284"
},
{
"name": "CVE-2025-38125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38125"
},
{
"name": "CVE-2025-40077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40077"
},
{
"name": "CVE-2024-57857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57857"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2022-50213",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50213"
},
{
"name": "CVE-2024-46823",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46823"
},
{
"name": "CVE-2023-32642",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32642"
},
{
"name": "CVE-2025-71227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71227"
},
{
"name": "CVE-2024-46733",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46733"
},
{
"name": "CVE-2024-41014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41014"
},
{
"name": "CVE-2022-50015",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50015"
},
{
"name": "CVE-2025-40071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40071"
},
{
"name": "CVE-2024-7883",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7883"
},
{
"name": "CVE-2024-50271",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50271"
},
{
"name": "CVE-2022-50772",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50772"
},
{
"name": "CVE-2024-56717",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56717"
},
{
"name": "CVE-2025-68366",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68366"
},
{
"name": "CVE-2024-56707",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56707"
},
{
"name": "CVE-2023-54234",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54234"
},
{
"name": "CVE-2022-45885",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45885"
},
{
"name": "CVE-2022-49783",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49783"
},
{
"name": "CVE-2025-40305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40305"
},
{
"name": "CVE-2016-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2781"
},
{
"name": "CVE-2023-29383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
},
{
"name": "CVE-2025-47153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47153"
},
{
"name": "CVE-2025-40080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40080"
},
{
"name": "CVE-2024-53216",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53216"
},
{
"name": "CVE-2022-49539",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49539"
},
{
"name": "CVE-2024-36347",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36347"
},
{
"name": "CVE-2024-26869",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26869"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2025-68815",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68815"
},
{
"name": "CVE-2021-20255",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20255"
},
{
"name": "CVE-2022-48979",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48979"
},
{
"name": "CVE-2025-40307",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40307"
},
{
"name": "CVE-2025-71193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71193"
},
{
"name": "CVE-2023-54180",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54180"
},
{
"name": "CVE-2026-23095",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23095"
},
{
"name": "CVE-2024-46848",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46848"
},
{
"name": "CVE-2025-68346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68346"
},
{
"name": "CVE-2025-38081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38081"
},
{
"name": "CVE-2024-36009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36009"
},
{
"name": "CVE-2025-71163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71163"
},
{
"name": "CVE-2024-36350",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36350"
},
{
"name": "CVE-2023-25951",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25951"
},
{
"name": "CVE-2025-40211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40211"
},
{
"name": "CVE-2023-53152",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53152"
},
{
"name": "CVE-2021-0308",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0308"
},
{
"name": "CVE-2025-68315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68315"
},
{
"name": "CVE-2024-50009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50009"
},
{
"name": "CVE-2025-39850",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39850"
},
{
"name": "CVE-2022-1205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1205"
},
{
"name": "CVE-2023-45927",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45927"
},
{
"name": "CVE-2020-25742",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25742"
},
{
"name": "CVE-2022-0987",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0987"
},
{
"name": "CVE-2025-71096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71096"
},
{
"name": "CVE-2025-71095",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71095"
},
{
"name": "CVE-2025-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40217"
},
{
"name": "CVE-2025-38199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38199"
},
{
"name": "CVE-2025-39905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39905"
},
{
"name": "CVE-2025-21944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21944"
},
{
"name": "CVE-2022-50720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50720"
},
{
"name": "CVE-2025-71105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71105"
},
{
"name": "CVE-2023-50387",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50387"
},
{
"name": "CVE-2022-49529",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49529"
},
{
"name": "CVE-2025-68266",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68266"
},
{
"name": "CVE-2024-27057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27057"
},
{
"name": "CVE-2025-68771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68771"
},
{
"name": "CVE-2025-39961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39961"
},
{
"name": "CVE-2025-68363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68363"
},
{
"name": "CVE-2024-54456",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54456"
},
{
"name": "CVE-2024-26876",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26876"
},
{
"name": "CVE-2025-40248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40248"
},
{
"name": "CVE-2023-52657",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52657"
},
{
"name": "CVE-2025-37876",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37876"
},
{
"name": "CVE-2024-58089",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58089"
},
{
"name": "CVE-2024-36331",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36331"
},
{
"name": "CVE-2026-27571",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27571"
},
{
"name": "CVE-2025-39748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39748"
},
{
"name": "CVE-2026-22984",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22984"
},
{
"name": "CVE-2026-27139",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27139"
},
{
"name": "CVE-2022-49127",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49127"
},
{
"name": "CVE-2020-25741",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25741"
},
{
"name": "CVE-2022-50748",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50748"
},
{
"name": "CVE-2023-53767",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53767"
},
{
"name": "CVE-2025-21667",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21667"
},
{
"name": "CVE-2025-9230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9230"
},
{
"name": "CVE-2023-49083",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49083"
},
{
"name": "CVE-2025-21696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21696"
},
{
"name": "CVE-2025-68303",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68303"
},
{
"name": "CVE-2025-21955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21955"
},
{
"name": "CVE-2025-39863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39863"
},
{
"name": "CVE-2025-40259",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40259"
},
{
"name": "CVE-2023-53180",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53180"
},
{
"name": "CVE-2026-28419",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28419"
},
{
"name": "CVE-2025-8677",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8677"
},
{
"name": "CVE-2025-38560",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38560"
},
{
"name": "CVE-2023-53385",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53385"
},
{
"name": "CVE-2026-23206",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23206"
},
{
"name": "CVE-2025-68757",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68757"
},
{
"name": "CVE-2024-46678",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46678"
},
{
"name": "CVE-2024-58097",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58097"
},
{
"name": "CVE-2023-53620",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53620"
},
{
"name": "CVE-2022-50539",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50539"
},
{
"name": "CVE-2025-71068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71068"
},
{
"name": "CVE-2025-23130",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23130"
},
{
"name": "CVE-2022-49496",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49496"
},
{
"name": "CVE-2025-38349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38349"
},
{
"name": "CVE-2024-56782",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56782"
},
{
"name": "CVE-2025-39957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39957"
},
{
"name": "CVE-2025-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1352"
},
{
"name": "CVE-2023-53540",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53540"
},
{
"name": "CVE-2022-49552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49552"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2023-53261",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53261"
},
{
"name": "CVE-2026-23033",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23033"
},
{
"name": "CVE-2025-39726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39726"
},
{
"name": "CVE-2024-26759",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26759"
},
{
"name": "CVE-2025-39931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39931"
},
{
"name": "CVE-2023-54187",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54187"
},
{
"name": "CVE-2026-22977",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22977"
},
{
"name": "CVE-2026-23145",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23145"
},
{
"name": "CVE-2022-44032",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44032"
},
{
"name": "CVE-2024-57895",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57895"
},
{
"name": "CVE-2023-53240",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53240"
},
{
"name": "CVE-2025-13735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13735"
},
{
"name": "CVE-2023-53694",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53694"
},
{
"name": "CVE-2024-53195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53195"
},
{
"name": "CVE-2024-35794",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35794"
},
{
"name": "CVE-2023-52829",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52829"
},
{
"name": "CVE-2026-23003",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23003"
},
{
"name": "CVE-2025-21891",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21891"
},
{
"name": "CVE-2025-38716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38716"
},
{
"name": "CVE-2025-11187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11187"
},
{
"name": "CVE-2024-56660",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56660"
},
{
"name": "CVE-2026-23076",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23076"
},
{
"name": "CVE-2023-54145",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54145"
},
{
"name": "CVE-2025-38033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38033"
},
{
"name": "CVE-2024-41023",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41023"
},
{
"name": "CVE-2024-47704",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47704"
},
{
"name": "CVE-2025-21672",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21672"
},
{
"name": "CVE-2024-35801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35801"
},
{
"name": "CVE-2024-49978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49978"
},
{
"name": "CVE-2024-36910",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36910"
},
{
"name": "CVE-2025-15079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15079"
},
{
"name": "CVE-2024-49870",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49870"
},
{
"name": "CVE-2025-36366",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36366"
},
{
"name": "CVE-2024-42125",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42125"
},
{
"name": "CVE-2025-36123",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36123"
},
{
"name": "CVE-2024-56737",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56737"
},
{
"name": "CVE-2025-68168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68168"
},
{
"name": "CVE-2025-21821",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21821"
},
{
"name": "CVE-2025-68206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68206"
},
{
"name": "CVE-2020-11935",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11935"
},
{
"name": "CVE-2023-54247",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54247"
},
{
"name": "CVE-2025-68309",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68309"
},
{
"name": "CVE-2023-52905",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52905"
},
{
"name": "CVE-2024-57852",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57852"
},
{
"name": "CVE-2025-40003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40003"
},
{
"name": "CVE-2025-22042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22042"
},
{
"name": "CVE-2025-71158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71158"
},
{
"name": "CVE-2022-49803",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49803"
},
{
"name": "CVE-2024-57898",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57898"
},
{
"name": "CVE-2020-35503",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35503"
},
{
"name": "CVE-2024-49923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49923"
},
{
"name": "CVE-2024-56639",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56639"
},
{
"name": "CVE-2025-68372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68372"
},
{
"name": "CVE-2026-23171",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23171"
},
{
"name": "CVE-2024-3651",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
},
{
"name": "CVE-2023-53002",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53002"
},
{
"name": "CVE-2021-0183",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0183"
},
{
"name": "CVE-2025-39884",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39884"
},
{
"name": "CVE-2025-39747",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39747"
},
{
"name": "CVE-2024-36914",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36914"
},
{
"name": "CVE-2026-26996",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26996"
},
{
"name": "CVE-2024-35826",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35826"
},
{
"name": "CVE-2026-23112",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23112"
},
{
"name": "CVE-2022-49764",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49764"
},
{
"name": "CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"name": "CVE-2025-21651",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21651"
},
{
"name": "CVE-2025-38092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38092"
},
{
"name": "CVE-2025-22124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22124"
},
{
"name": "CVE-2025-68313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68313"
},
{
"name": "CVE-2024-58053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58053"
},
{
"name": "CVE-2023-26553",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26553"
},
{
"name": "CVE-2025-60876",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-60876"
},
{
"name": "CVE-2025-37776",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37776"
},
{
"name": "CVE-2021-23840",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23840"
},
{
"name": "CVE-2024-58077",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58077"
},
{
"name": "CVE-2024-6519",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6519"
},
{
"name": "CVE-2024-46729",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46729"
},
{
"name": "CVE-2023-53850",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53850"
},
{
"name": "CVE-2023-2975",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2975"
},
{
"name": "CVE-2022-50266",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50266"
},
{
"name": "CVE-2024-53178",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53178"
},
{
"name": "CVE-2025-71137",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71137"
},
{
"name": "CVE-2026-23084",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23084"
},
{
"name": "CVE-2023-53093",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53093"
},
{
"name": "CVE-2025-11065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11065"
},
{
"name": "CVE-2026-23190",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23190"
},
{
"name": "CVE-2025-40123",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40123"
},
{
"name": "CVE-2026-22979",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22979"
},
{
"name": "CVE-2025-68301",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68301"
},
{
"name": "CVE-2024-49991",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49991"
},
{
"name": "CVE-2022-50009",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50009"
},
{
"name": "CVE-2022-26047",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26047"
},
{
"name": "CVE-2024-53240",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53240"
},
{
"name": "CVE-2026-23011",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23011"
},
{
"name": "CVE-2024-36949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36949"
},
{
"name": "CVE-2023-53816",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53816"
},
{
"name": "CVE-2025-37877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37877"
},
{
"name": "CVE-2024-2193",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2193"
},
{
"name": "CVE-2025-4382",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4382"
},
{
"name": "CVE-2022-28693",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28693"
},
{
"name": "CVE-2025-71161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71161"
},
{
"name": "CVE-2025-39706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39706"
},
{
"name": "CVE-2025-22038",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22038"
},
{
"name": "CVE-2025-68217",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68217"
},
{
"name": "CVE-2023-54242",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54242"
},
{
"name": "CVE-2025-68289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68289"
},
{
"name": "CVE-2025-40363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40363"
},
{
"name": "CVE-2024-41062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41062"
},
{
"name": "CVE-2025-40253",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40253"
},
{
"name": "CVE-2022-48816",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48816"
},
{
"name": "CVE-2025-37800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37800"
},
{
"name": "CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"name": "CVE-2022-50518",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50518"
},
{
"name": "CVE-2022-49829",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49829"
},
{
"name": "CVE-2025-64756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64756"
},
{
"name": "CVE-2025-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21967"
},
{
"name": "CVE-2016-2568",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2568"
},
{
"name": "CVE-2020-13817",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13817"
},
{
"name": "CVE-2025-68245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68245"
},
{
"name": "CVE-2018-12929",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12929"
},
{
"name": "CVE-2024-26853",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26853"
},
{
"name": "CVE-2024-53147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53147"
},
{
"name": "CVE-2025-39952",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39952"
},
{
"name": "CVE-2025-40317",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40317"
},
{
"name": "CVE-2024-45783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45783"
},
{
"name": "CVE-2026-23110",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23110"
},
{
"name": "CVE-2023-53410",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53410"
},
{
"name": "CVE-2023-53254",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53254"
},
{
"name": "CVE-2024-34064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34064"
},
{
"name": "CVE-2023-47210",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47210"
},
{
"name": "CVE-2025-68809",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68809"
},
{
"name": "CVE-2024-36920",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36920"
},
{
"name": "CVE-2021-0165",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0165"
},
{
"name": "CVE-2025-0624",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0624"
},
{
"name": "CVE-2022-49177",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49177"
},
{
"name": "CVE-2025-38205",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38205"
},
{
"name": "CVE-2026-23100",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23100"
},
{
"name": "CVE-2025-59464",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59464"
},
{
"name": "CVE-2024-58241",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58241"
},
{
"name": "CVE-2025-21863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21863"
},
{
"name": "CVE-2025-71120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71120"
},
{
"name": "CVE-2025-38166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38166"
},
{
"name": "CVE-2022-49833",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49833"
},
{
"name": "CVE-2026-23060",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23060"
},
{
"name": "CVE-2025-38321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38321"
},
{
"name": "CVE-2025-68282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68282"
},
{
"name": "CVE-2025-39705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39705"
},
{
"name": "CVE-2025-68817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68817"
},
{
"name": "CVE-2024-36021",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36021"
},
{
"name": "CVE-2025-38045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38045"
},
{
"name": "CVE-2024-46726",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46726"
},
{
"name": "CVE-2025-40025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40025"
},
{
"name": "CVE-2024-53079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53079"
},
{
"name": "CVE-2025-68787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68787"
},
{
"name": "CVE-2025-1125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1125"
},
{
"name": "CVE-2023-53647",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53647"
},
{
"name": "CVE-2025-37954",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37954"
},
{
"name": "CVE-2025-23133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23133"
},
{
"name": "CVE-2025-0012",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0012"
},
{
"name": "CVE-2020-12313",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12313"
},
{
"name": "CVE-2025-71233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71233"
},
{
"name": "CVE-2025-68782",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68782"
},
{
"name": "CVE-2021-0166",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0166"
},
{
"name": "CVE-2025-21945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21945"
},
{
"name": "CVE-2022-3872",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3872"
},
{
"name": "CVE-2025-39744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39744"
},
{
"name": "CVE-2025-71197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71197"
},
{
"name": "CVE-2025-68177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68177"
},
{
"name": "CVE-2025-68758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68758"
},
{
"name": "CVE-2024-49931",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49931"
},
{
"name": "CVE-2024-43866",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43866"
},
{
"name": "CVE-2024-37021",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37021"
},
{
"name": "CVE-2024-47728",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47728"
},
{
"name": "CVE-2025-68191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68191"
},
{
"name": "CVE-2026-23031",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23031"
},
{
"name": "CVE-2024-46730",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46730"
},
{
"name": "CVE-2025-71113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71113"
},
{
"name": "CVE-2025-71127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71127"
},
{
"name": "CVE-2025-37786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37786"
},
{
"name": "CVE-2024-46728",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46728"
},
{
"name": "CVE-2023-53561",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53561"
},
{
"name": "CVE-2026-22998",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22998"
},
{
"name": "CVE-2023-54172",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54172"
},
{
"name": "CVE-2026-23050",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23050"
},
{
"name": "CVE-2024-58100",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58100"
},
{
"name": "CVE-2020-0256",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0256"
},
{
"name": "CVE-2025-21673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21673"
},
{
"name": "CVE-2024-26954",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26954"
},
{
"name": "CVE-2025-21634",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21634"
},
{
"name": "CVE-2024-57999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57999"
},
{
"name": "CVE-2025-38047",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38047"
},
{
"name": "CVE-2024-47738",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47738"
},
{
"name": "CVE-2025-68340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68340"
},
{
"name": "CVE-2024-41013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41013"
},
{
"name": "CVE-2023-54320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54320"
},
{
"name": "CVE-2024-43911",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43911"
},
{
"name": "CVE-2025-37959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37959"
},
{
"name": "CVE-2017-0537",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0537"
},
{
"name": "CVE-2025-38191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38191"
},
{
"name": "CVE-2023-32681",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32681"
},
{
"name": "CVE-2025-68219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68219"
},
{
"name": "CVE-2022-50232",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50232"
},
{
"name": "CVE-2025-38062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38062"
},
{
"name": "CVE-2025-38531",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38531"
},
{
"name": "CVE-2023-26112",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26112"
},
{
"name": "CVE-2018-6952",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-6952"
},
{
"name": "CVE-2020-14304",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14304"
},
{
"name": "CVE-2024-46834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46834"
},
{
"name": "CVE-2025-40288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40288"
},
{
"name": "CVE-2025-68239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68239"
},
{
"name": "CVE-2025-40258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40258"
},
{
"name": "CVE-2025-21894",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21894"
},
{
"name": "CVE-2025-40281",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40281"
},
{
"name": "CVE-2025-68185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68185"
},
{
"name": "CVE-2025-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40304"
},
{
"name": "CVE-2025-38503",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38503"
},
{
"name": "CVE-2025-40110",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40110"
},
{
"name": "CVE-2026-24001",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24001"
},
{
"name": "CVE-2025-37807",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37807"
},
{
"name": "CVE-2025-38131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38131"
},
{
"name": "CVE-2022-50016",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50016"
},
{
"name": "CVE-2025-29481",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29481"
},
{
"name": "CVE-2024-53219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53219"
},
{
"name": "CVE-2023-53009",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53009"
},
{
"name": "CVE-2025-40268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40268"
},
{
"name": "CVE-2025-61661",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61661"
},
{
"name": "CVE-2026-23111",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23111"
},
{
"name": "CVE-2024-25740",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25740"
},
{
"name": "CVE-2024-50246",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50246"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2024-57950",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57950"
},
{
"name": "CVE-2025-21759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21759"
},
{
"name": "CVE-2025-40325",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40325"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2024-42321",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42321"
},
{
"name": "CVE-2026-23113",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23113"
},
{
"name": "CVE-2021-0176",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0176"
},
{
"name": "CVE-2025-1151",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1151"
},
{
"name": "CVE-2022-48998",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48998"
},
{
"name": "CVE-2025-68798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68798"
},
{
"name": "CVE-2024-42273",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42273"
},
{
"name": "CVE-2025-68336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68336"
},
{
"name": "CVE-2023-53794",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53794"
},
{
"name": "CVE-2026-23157",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23157"
},
{
"name": "CVE-2025-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40303"
},
{
"name": "CVE-2025-68178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68178"
},
{
"name": "CVE-2022-49974",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49974"
},
{
"name": "CVE-2025-40337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40337"
},
{
"name": "CVE-2019-20633",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20633"
},
{
"name": "CVE-2025-38264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38264"
},
{
"name": "CVE-2021-3714",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3714"
},
{
"name": "CVE-2023-54071",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54071"
},
{
"name": "CVE-2024-56566",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56566"
},
{
"name": "CVE-2025-40036",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40036"
},
{
"name": "CVE-2024-57993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57993"
},
{
"name": "CVE-2024-47745",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47745"
},
{
"name": "CVE-2025-39833",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39833"
},
{
"name": "CVE-2026-23097",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23097"
},
{
"name": "CVE-2025-37980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37980"
},
{
"name": "CVE-2024-53190",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53190"
},
{
"name": "CVE-2025-40262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40262"
},
{
"name": "CVE-2024-35784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35784"
},
{
"name": "CVE-2024-56591",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56591"
},
{
"name": "CVE-2024-56544",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56544"
},
{
"name": "CVE-2024-56647",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56647"
},
{
"name": "CVE-2025-71198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71198"
},
{
"name": "CVE-2025-21649",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21649"
},
{
"name": "CVE-2024-57976",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57976"
},
{
"name": "CVE-2025-68819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68819"
},
{
"name": "CVE-2025-0685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0685"
},
{
"name": "CVE-2024-57893",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57893"
},
{
"name": "CVE-2026-23231",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23231"
},
{
"name": "CVE-2025-37879",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37879"
},
{
"name": "CVE-2022-50071",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50071"
},
{
"name": "CVE-2025-40261",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40261"
},
{
"name": "CVE-2024-56180",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56180"
},
{
"name": "CVE-2023-39333",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39333"
},
{
"name": "CVE-2025-38643",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38643"
},
{
"name": "CVE-2021-3864",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3864"
},
{
"name": "CVE-2025-39771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39771"
},
{
"name": "CVE-2023-52591",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52591"
},
{
"name": "CVE-2024-26648",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26648"
},
{
"name": "CVE-2025-66862",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66862"
},
{
"name": "CVE-2020-11868",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11868"
},
{
"name": "CVE-2020-24352",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24352"
},
{
"name": "CVE-2024-36000",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36000"
},
{
"name": "CVE-2026-23021",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23021"
},
{
"name": "CVE-2025-39819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39819"
},
{
"name": "CVE-2022-49296",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49296"
},
{
"name": "CVE-2024-49914",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49914"
},
{
"name": "CVE-2025-38360",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38360"
},
{
"name": "CVE-2025-68732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68732"
},
{
"name": "CVE-2025-39715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39715"
},
{
"name": "CVE-2025-36407",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36407"
},
{
"name": "CVE-2024-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0217"
},
{
"name": "CVE-2025-40323",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40323"
},
{
"name": "CVE-2025-21732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21732"
},
{
"name": "CVE-2021-47658",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47658"
},
{
"name": "CVE-2025-68285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68285"
},
{
"name": "CVE-2019-12067",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12067"
},
{
"name": "CVE-2024-57843",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57843"
},
{
"name": "CVE-2025-38512",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38512"
},
{
"name": "CVE-2024-50135",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50135"
},
{
"name": "CVE-2024-49916",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49916"
},
{
"name": "CVE-2025-68119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68119"
},
{
"name": "CVE-2024-49988",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49988"
},
{
"name": "CVE-2023-52648",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52648"
},
{
"name": "CVE-2024-49861",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49861"
},
{
"name": "CVE-2026-23093",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23093"
},
{
"name": "CVE-2024-49893",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49893"
},
{
"name": "CVE-2024-44963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44963"
},
{
"name": "CVE-2023-53348",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53348"
},
{
"name": "CVE-2022-48766",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48766"
},
{
"name": "CVE-2019-15794",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15794"
},
{
"name": "CVE-2024-49917",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49917"
},
{
"name": "CVE-2022-50467",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50467"
},
{
"name": "CVE-2025-37849",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37849"
},
{
"name": "CVE-2024-48875",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-48875"
},
{
"name": "CVE-2024-41935",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41935"
},
{
"name": "CVE-2025-38162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38162"
},
{
"name": "CVE-2022-23491",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23491"
},
{
"name": "CVE-2025-22873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22873"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2025-71183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71183"
},
{
"name": "CVE-2023-54047",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54047"
},
{
"name": "CVE-2023-53382",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53382"
},
{
"name": "CVE-2024-50060",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50060"
},
{
"name": "CVE-2025-39677",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39677"
},
{
"name": "CVE-2023-53651",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53651"
},
{
"name": "CVE-2025-21832",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21832"
},
{
"name": "CVE-2025-68371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68371"
},
{
"name": "CVE-2022-50383",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50383"
},
{
"name": "CVE-2025-39707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39707"
},
{
"name": "CVE-2025-40275",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40275"
},
{
"name": "CVE-2023-53387",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53387"
},
{
"name": "CVE-2026-31802",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31802"
},
{
"name": "CVE-2024-45774",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45774"
},
{
"name": "CVE-2023-54019",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54019"
},
{
"name": "CVE-2025-22053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22053"
},
{
"name": "CVE-2025-61664",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61664"
},
{
"name": "CVE-2025-68211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68211"
},
{
"name": "CVE-2026-25702",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25702"
},
{
"name": "CVE-2023-52452",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52452"
},
{
"name": "CVE-2023-42366",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42366"
},
{
"name": "CVE-2022-50863",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50863"
},
{
"name": "CVE-2025-39829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39829"
},
{
"name": "CVE-2024-35843",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35843"
},
{
"name": "CVE-2025-71091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71091"
},
{
"name": "CVE-2025-39781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39781"
},
{
"name": "CVE-2025-39762",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39762"
},
{
"name": "CVE-2024-40999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40999"
},
{
"name": "CVE-2023-53292",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53292"
},
{
"name": "CVE-2023-52576",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52576"
},
{
"name": "CVE-2024-27002",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27002"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2024-57887",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57887"
},
{
"name": "CVE-2025-21730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21730"
},
{
"name": "CVE-2024-35865",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35865"
},
{
"name": "CVE-2025-71184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71184"
},
{
"name": "CVE-2023-52660",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52660"
},
{
"name": "CVE-2024-35995",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35995"
},
{
"name": "CVE-2025-69420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69420"
},
{
"name": "CVE-2023-53371",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53371"
},
{
"name": "CVE-2025-38659",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38659"
},
{
"name": "CVE-2025-68227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68227"
},
{
"name": "CVE-2025-22041",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22041"
},
{
"name": "CVE-2025-40339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40339"
},
{
"name": "CVE-2025-22127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22127"
},
{
"name": "CVE-2025-47273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47273"
},
{
"name": "CVE-2024-27025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27025"
},
{
"name": "CVE-2025-38020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38020"
},
{
"name": "CVE-2024-27011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27011"
},
{
"name": "CVE-2025-15224",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15224"
},
{
"name": "CVE-2024-26605",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26605"
},
{
"name": "CVE-2026-27904",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27904"
},
{
"name": "CVE-2024-38543",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38543"
},
{
"name": "CVE-2025-68263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68263"
},
{
"name": "CVE-2023-53187",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53187"
},
{
"name": "CVE-2025-38689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38689"
},
{
"name": "CVE-2025-68800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68800"
},
{
"name": "CVE-2025-38275",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38275"
},
{
"name": "CVE-2025-68261",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68261"
},
{
"name": "CVE-2022-48744",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48744"
},
{
"name": "CVE-2025-38070",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38070"
},
{
"name": "CVE-2025-68755",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68755"
},
{
"name": "CVE-2025-62525",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62525"
},
{
"name": "CVE-2025-71238",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71238"
},
{
"name": "CVE-2021-0175",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0175"
},
{
"name": "CVE-2024-36012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36012"
},
{
"name": "CVE-2022-48706",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48706"
},
{
"name": "CVE-2025-40334",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40334"
},
{
"name": "CVE-2025-68767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68767"
},
{
"name": "CVE-2024-46716",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46716"
},
{
"name": "CVE-2012-4542",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4542"
},
{
"name": "CVE-2021-3773",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3773"
},
{
"name": "CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"name": "CVE-2022-49267",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49267"
},
{
"name": "CVE-2024-56592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56592"
},
{
"name": "CVE-2025-37854",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37854"
},
{
"name": "CVE-2025-38189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38189"
},
{
"name": "CVE-2022-48628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48628"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
},
{
"name": "CVE-2024-50138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50138"
},
{
"name": "CVE-2025-40319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40319"
},
{
"name": "CVE-2021-44534",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44534"
},
{
"name": "CVE-2025-14831",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14831"
},
{
"name": "CVE-2024-56565",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56565"
},
{
"name": "CVE-2025-68193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68193"
},
{
"name": "CVE-2025-68727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68727"
},
{
"name": "CVE-2024-57872",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57872"
},
{
"name": "CVE-2023-28720",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28720"
},
{
"name": "CVE-2024-53093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53093"
},
{
"name": "CVE-2026-23080",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23080"
},
{
"name": "CVE-2024-46833",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46833"
},
{
"name": "CVE-2024-47703",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47703"
},
{
"name": "CVE-2023-53742",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53742"
},
{
"name": "CVE-2025-38361",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38361"
},
{
"name": "CVE-2025-38041",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38041"
},
{
"name": "CVE-2024-53177",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53177"
},
{
"name": "CVE-2024-56588",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56588"
},
{
"name": "CVE-2023-53452",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53452"
},
{
"name": "CVE-2023-54121",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54121"
},
{
"name": "CVE-2023-6610",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6610"
},
{
"name": "CVE-2023-54261",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54261"
},
{
"name": "CVE-2022-50616",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50616"
},
{
"name": "CVE-2025-66418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66418"
},
{
"name": "CVE-2023-53544",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53544"
},
{
"name": "CVE-2025-68264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68264"
},
{
"name": "CVE-2024-49911",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49911"
},
{
"name": "CVE-2026-23154",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23154"
},
{
"name": "CVE-2022-50708",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50708"
},
{
"name": "CVE-2026-3784",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3784"
},
{
"name": "CVE-2025-68764",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68764"
},
{
"name": "CVE-2025-9301",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9301"
}
],
"initial_release_date": "2026-03-19T00:00:00",
"last_revision_date": "2026-03-19T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0316",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-03-19T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37219",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37219"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37211",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37211"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37215",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37215"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37218",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37218"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37220",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37220"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37216",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37216"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37221",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37221"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37213",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37213"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37217",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37217"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37212",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37212"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37214",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37214"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37222",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37222"
}
]
}
CERTFR-2026-AVI-0315
Vulnerability from certfr_avis - Published: 2026-03-18 - Updated: 2026-03-18
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Platform | Elastic Application Runtime for VMware Tanzu Platform versions antérieures à 10.3.6 | ||
| VMware | N/A | .NET Core Buildpack versions antérieures à 2.4.86 | ||
| VMware | N/A | Go Buildpack versions antérieures à 1.10.75 | ||
| VMware | Tanzu Platform | Tanzu Data Flow on Tanzu Platform versions antérieures à 2.0.4 | ||
| VMware | Tanzu Platform | Elastic Application Runtime for VMware Tanzu Platform versions antérieures à 6.0.26+LTS-T | ||
| VMware | Tanzu Platform | Extended App Support for Tanzu Platform versions antérieures à 1.0.17 | ||
| VMware | Tanzu Platform | Elastic Application Runtime for VMware Tanzu Platform versions antérieures à 10.2.9+LTS-T | ||
| VMware | N/A | Binary Buildpack versions antérieures à 1.1.61 | ||
| VMware | N/A | VMware Harbor Registry versions antérieures à 2.14.3 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Elastic Application Runtime for VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.3.6",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": ".NET Core Buildpack versions ant\u00e9rieures \u00e0 2.4.86",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Go Buildpack versions ant\u00e9rieures \u00e0 1.10.75",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Data Flow on Tanzu Platform versions ant\u00e9rieures \u00e0 2.0.4",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime for VMware Tanzu Platform versions ant\u00e9rieures \u00e0 6.0.26+LTS-T",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Extended App Support for Tanzu Platform versions ant\u00e9rieures \u00e0 1.0.17",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime for VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.2.9+LTS-T",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Binary Buildpack versions ant\u00e9rieures \u00e0 1.1.61",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware Harbor Registry versions ant\u00e9rieures \u00e0 2.14.3",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-61730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61730"
},
{
"name": "CVE-2026-21933",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21933"
},
{
"name": "CVE-2025-31115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31115"
},
{
"name": "CVE-2025-58183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58183"
},
{
"name": "CVE-2026-21932",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21932"
},
{
"name": "CVE-2025-15282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15282"
},
{
"name": "CVE-2026-21637",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21637"
},
{
"name": "CVE-2024-3220",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3220"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2025-66614",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66614"
},
{
"name": "CVE-2026-1965",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1965"
},
{
"name": "CVE-2025-12084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12084"
},
{
"name": "CVE-2025-27219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27219"
},
{
"name": "CVE-2024-47611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47611"
},
{
"name": "CVE-2026-1642",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1642"
},
{
"name": "CVE-2026-27138",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27138"
},
{
"name": "CVE-2025-11468",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11468"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2025-69419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69419"
},
{
"name": "CVE-2026-3783",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3783"
},
{
"name": "CVE-2025-6075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6075"
},
{
"name": "CVE-2026-23831",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23831"
},
{
"name": "CVE-2026-22701",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22701"
},
{
"name": "CVE-2025-58185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58185"
},
{
"name": "CVE-2025-61731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61731"
},
{
"name": "CVE-2026-27137",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27137"
},
{
"name": "CVE-2025-13837",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13837"
},
{
"name": "CVE-2025-15367",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15367"
},
{
"name": "CVE-2026-2006",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2006"
},
{
"name": "CVE-2025-55130",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55130"
},
{
"name": "CVE-2025-55131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55131"
},
{
"name": "CVE-2026-2005",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2005"
},
{
"name": "CVE-2025-50106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50106"
},
{
"name": "CVE-2025-59465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59465"
},
{
"name": "CVE-2025-29923",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29923"
},
{
"name": "CVE-2025-8291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8291"
},
{
"name": "CVE-2026-22795",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22795"
},
{
"name": "CVE-2025-61727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61727"
},
{
"name": "CVE-2026-21925",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21925"
},
{
"name": "CVE-2025-30754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30754"
},
{
"name": "CVE-2025-53859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53859"
},
{
"name": "CVE-2025-47910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47910"
},
{
"name": "CVE-2026-1703",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1703"
},
{
"name": "CVE-2026-27142",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27142"
},
{
"name": "CVE-2025-8194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
},
{
"name": "CVE-2025-69421",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69421"
},
{
"name": "CVE-2025-12781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12781"
},
{
"name": "CVE-2025-58188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58188"
},
{
"name": "CVE-2026-26958",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26958"
},
{
"name": "CVE-2023-38037",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38037"
},
{
"name": "CVE-2026-25934",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25934"
},
{
"name": "CVE-2026-22796",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22796"
},
{
"name": "CVE-2025-61724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61724"
},
{
"name": "CVE-2023-28120",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28120"
},
{
"name": "CVE-2025-61732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61732"
},
{
"name": "CVE-2025-61723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61723"
},
{
"name": "CVE-2025-55132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55132"
},
{
"name": "CVE-2026-22702",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22702"
},
{
"name": "CVE-2026-25679",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25679"
},
{
"name": "CVE-2025-14017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14017"
},
{
"name": "CVE-2026-3805",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3805"
},
{
"name": "CVE-2025-13836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13836"
},
{
"name": "CVE-2026-1229",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1229"
},
{
"name": "CVE-2025-61725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61725"
},
{
"name": "CVE-2025-27220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27220"
},
{
"name": "CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"name": "CVE-2025-15366",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15366"
},
{
"name": "CVE-2025-13462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13462"
},
{
"name": "CVE-2026-0865",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0865"
},
{
"name": "CVE-2025-50059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50059"
},
{
"name": "CVE-2026-24117",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24117"
},
{
"name": "CVE-2025-47912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47912"
},
{
"name": "CVE-2025-68160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68160"
},
{
"name": "CVE-2025-54410",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54410"
},
{
"name": "CVE-2025-67735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-67735"
},
{
"name": "CVE-2025-61728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61728"
},
{
"name": "CVE-2025-58186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58186"
},
{
"name": "CVE-2025-13034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13034"
},
{
"name": "CVE-2025-8869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8869"
},
{
"name": "CVE-2025-58187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58187"
},
{
"name": "CVE-2025-14524",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14524"
},
{
"name": "CVE-2026-2297",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2297"
},
{
"name": "CVE-2025-58181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58181"
},
{
"name": "CVE-2025-47914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47914"
},
{
"name": "CVE-2025-69418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69418"
},
{
"name": "CVE-2025-59466",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59466"
},
{
"name": "CVE-2026-1299",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1299"
},
{
"name": "CVE-2025-58189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58189"
},
{
"name": "CVE-2026-21945",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21945"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2025-24358",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24358"
},
{
"name": "CVE-2025-30749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30749"
},
{
"name": "CVE-2025-61748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61748"
},
{
"name": "CVE-2026-27139",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27139"
},
{
"name": "CVE-2026-24733",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24733"
},
{
"name": "CVE-2025-66564",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66564"
},
{
"name": "CVE-2026-2003",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2003"
},
{
"name": "CVE-2025-15079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15079"
},
{
"name": "CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"name": "CVE-2025-14819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14819"
},
{
"name": "CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"name": "CVE-2025-47909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47909"
},
{
"name": "CVE-2026-2004",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2004"
},
{
"name": "CVE-2026-0672",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0672"
},
{
"name": "CVE-2026-24137",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24137"
},
{
"name": "CVE-2017-8806",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-8806"
},
{
"name": "CVE-2025-53057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53057"
},
{
"name": "CVE-2023-22796",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22796"
},
{
"name": "CVE-2025-68119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68119"
},
{
"name": "CVE-2025-53066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53066"
},
{
"name": "CVE-2025-69420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69420"
},
{
"name": "CVE-2025-47273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47273"
},
{
"name": "CVE-2025-15224",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15224"
},
{
"name": "CVE-2026-1225",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1225"
},
{
"name": "CVE-2026-22703",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22703"
},
{
"name": "CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
},
{
"name": "CVE-2026-3784",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3784"
}
],
"initial_release_date": "2026-03-18T00:00:00",
"last_revision_date": "2026-03-18T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0315",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-03-18T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37197",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37197"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37202",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37202"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37200",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37200"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37209",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37209"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37198",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37198"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37208",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37208"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37206",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37206"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37204",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37204"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37203",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37203"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37207",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37207"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37199",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37199"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37210",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37210"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37205",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37205"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37201",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37201"
}
]
}
CERTFR-2026-AVI-0339
Vulnerability from certfr_avis - Published: 2026-03-23 - Updated: 2026-03-23
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Kubernetes Runtime | Stemcells (Windows) versions antérieures à 2019.96.x | ||
| VMware | Tanzu Gemfire | Tanzu GemFire sur Tanzu Platform 2.2.x versions antérieures à 2.2.2 | ||
| VMware | Platform Services | Platform Services pour Tanzu Platform versions antérieures à 10.3.6 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy) versions antérieures à 1.1107.x | ||
| VMware | Tanzu Gemfire | Tanzu GemFire sur Tanzu Platform 2.1.x versions antérieures à 2.1.4 | ||
| VMware | Tanzu | Tanzu pour Postgres sur Tanzu Platform versions antérieures à 10.2.3 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Noble) versions antérieures à 1.261.x |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Stemcells (Windows) versions ant\u00e9rieures \u00e0 2019.96.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu GemFire sur Tanzu Platform 2.2.x versions ant\u00e9rieures \u00e0 2.2.2",
"product": {
"name": "Tanzu Gemfire",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Platform Services pour Tanzu Platform versions ant\u00e9rieures \u00e0 10.3.6",
"product": {
"name": "Platform Services",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy) versions ant\u00e9rieures \u00e0 1.1107.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu GemFire sur Tanzu Platform 2.1.x versions ant\u00e9rieures \u00e0 2.1.4",
"product": {
"name": "Tanzu Gemfire",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres sur Tanzu Platform versions ant\u00e9rieures \u00e0 10.2.3",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Noble) versions ant\u00e9rieures \u00e0 1.261.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2026-26007",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26007"
},
{
"name": "CVE-2024-24790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24790"
},
{
"name": "CVE-2025-61730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61730"
},
{
"name": "CVE-2022-32189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32189"
},
{
"name": "CVE-2026-21933",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21933"
},
{
"name": "CVE-2025-58183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58183"
},
{
"name": "CVE-2026-21932",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21932"
},
{
"name": "CVE-2022-30631",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30631"
},
{
"name": "CVE-2026-30227",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-30227"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2023-29404",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29404"
},
{
"name": "CVE-2026-1965",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1965"
},
{
"name": "CVE-2026-3497",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3497"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"name": "CVE-2023-45283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45283"
},
{
"name": "CVE-2026-27138",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27138"
},
{
"name": "CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"name": "CVE-2026-3783",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3783"
},
{
"name": "CVE-2022-41725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41725"
},
{
"name": "CVE-2022-30635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30635"
},
{
"name": "CVE-2025-58185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58185"
},
{
"name": "CVE-2022-41715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41715"
},
{
"name": "CVE-2022-41722",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41722"
},
{
"name": "CVE-2025-61731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61731"
},
{
"name": "CVE-2026-27137",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27137"
},
{
"name": "CVE-2023-45285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45285"
},
{
"name": "CVE-2024-24783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24783"
},
{
"name": "CVE-2023-45284",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45284"
},
{
"name": "CVE-2023-29403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29403"
},
{
"name": "CVE-2024-24791",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24791"
},
{
"name": "CVE-2024-45341",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45341"
},
{
"name": "CVE-2025-9820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9820"
},
{
"name": "CVE-2023-29405",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29405"
},
{
"name": "CVE-2022-30629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30629"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2023-45289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45289"
},
{
"name": "CVE-2025-61985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61985"
},
{
"name": "CVE-2022-32148",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32148"
},
{
"name": "CVE-2026-24051",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24051"
},
{
"name": "CVE-2023-45290",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45290"
},
{
"name": "CVE-2025-61727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61727"
},
{
"name": "CVE-2025-22866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22866"
},
{
"name": "CVE-2026-21925",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21925"
},
{
"name": "CVE-2024-34158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34158"
},
{
"name": "CVE-2022-30630",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30630"
},
{
"name": "CVE-2025-47910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47910"
},
{
"name": "CVE-2024-51744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51744"
},
{
"name": "CVE-2026-27142",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27142"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2025-47906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47906"
},
{
"name": "CVE-2022-1705",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1705"
},
{
"name": "CVE-2025-58063",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58063"
},
{
"name": "CVE-2025-58188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58188"
},
{
"name": "CVE-2023-39318",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39318"
},
{
"name": "CVE-2022-41720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41720"
},
{
"name": "CVE-2025-4674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
},
{
"name": "CVE-2022-41716",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41716"
},
{
"name": "CVE-2022-29526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29526"
},
{
"name": "CVE-2022-30633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30633"
},
{
"name": "CVE-2025-61984",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61984"
},
{
"name": "CVE-2024-45336",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45336"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2025-61724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61724"
},
{
"name": "CVE-2022-30632",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30632"
},
{
"name": "CVE-2025-61732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61732"
},
{
"name": "CVE-2025-61723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61723"
},
{
"name": "CVE-2023-29406",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29406"
},
{
"name": "CVE-2023-39319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39319"
},
{
"name": "CVE-2026-27903",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27903"
},
{
"name": "CVE-2024-24785",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24785"
},
{
"name": "CVE-2026-25679",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25679"
},
{
"name": "CVE-2022-1962",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1962"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2022-41717",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41717"
},
{
"name": "CVE-2026-1229",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1229"
},
{
"name": "CVE-2025-61725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61725"
},
{
"name": "CVE-2026-25210",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25210"
},
{
"name": "CVE-2023-24536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24536"
},
{
"name": "CVE-2022-28131",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28131"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2026-24515",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24515"
},
{
"name": "CVE-2024-34156",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34156"
},
{
"name": "CVE-2022-2880",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2880"
},
{
"name": "CVE-2023-24539",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24539"
},
{
"name": "CVE-2025-47912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47912"
},
{
"name": "CVE-2025-69873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69873"
},
{
"name": "CVE-2022-2879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2879"
},
{
"name": "CVE-2023-24532",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24532"
},
{
"name": "CVE-2025-61728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61728"
},
{
"name": "CVE-2025-58186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58186"
},
{
"name": "CVE-2025-58187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58187"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2023-29400",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29400"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2024-24787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24787"
},
{
"name": "CVE-2022-41724",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41724"
},
{
"name": "CVE-2022-30634",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30634"
},
{
"name": "CVE-2025-58181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58181"
},
{
"name": "CVE-2025-47914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47914"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2026-25639",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25639"
},
{
"name": "CVE-2025-58189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58189"
},
{
"name": "CVE-2023-24540",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24540"
},
{
"name": "CVE-2026-21945",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21945"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2023-24537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24537"
},
{
"name": "CVE-2026-27571",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27571"
},
{
"name": "CVE-2026-27139",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27139"
},
{
"name": "CVE-2023-45287",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45287"
},
{
"name": "CVE-2022-30580",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30580"
},
{
"name": "CVE-2026-26996",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26996"
},
{
"name": "CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"name": "CVE-2023-24531",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24531"
},
{
"name": "CVE-2023-24538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24538"
},
{
"name": "CVE-2025-11065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11065"
},
{
"name": "CVE-2022-29804",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29804"
},
{
"name": "CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"name": "CVE-2022-41723",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41723"
},
{
"name": "CVE-2023-39323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39323"
},
{
"name": "CVE-2023-29402",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29402"
},
{
"name": "CVE-2023-39326",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39326"
},
{
"name": "CVE-2023-29409",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29409"
},
{
"name": "CVE-2025-30204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30204"
},
{
"name": "CVE-2023-24534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24534"
},
{
"name": "CVE-2024-24786",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24786"
},
{
"name": "CVE-2024-34155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34155"
},
{
"name": "CVE-2025-68119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68119"
},
{
"name": "CVE-2025-22873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22873"
},
{
"name": "CVE-2024-24784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24784"
},
{
"name": "CVE-2025-13465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13465"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2025-64702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64702"
},
{
"name": "CVE-2024-24789",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24789"
},
{
"name": "CVE-2026-27904",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27904"
},
{
"name": "CVE-2022-27664",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27664"
},
{
"name": "CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"name": "CVE-2025-14831",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14831"
},
{
"name": "CVE-2025-68151",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68151"
},
{
"name": "CVE-2026-3784",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3784"
},
{
"name": "CVE-2026-25646",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25646"
}
],
"initial_release_date": "2026-03-23T00:00:00",
"last_revision_date": "2026-03-23T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0339",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-03-23T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2026-03-20",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37283",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37283"
},
{
"published_at": "2026-03-20",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37288",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37288"
},
{
"published_at": "2026-03-20",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37281",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37281"
},
{
"published_at": "2026-03-20",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37278",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37278"
},
{
"published_at": "2026-03-20",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37282",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37282"
},
{
"published_at": "2026-03-20",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37286",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37286"
},
{
"published_at": "2026-03-20",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37279",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37279"
},
{
"published_at": "2026-03-20",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37280",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37280"
},
{
"published_at": "2026-03-20",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37284",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37284"
},
{
"published_at": "2026-03-20",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37277",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37277"
},
{
"published_at": "2026-03-20",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37285",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37285"
},
{
"published_at": "2026-03-20",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37287",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37287"
}
]
}
FKIE_CVE-2026-27137
Vulnerability from fkie_nvd - Published: 2026-03-06 22:16 - Updated: 2026-04-21 14:40| URL | Tags | ||
|---|---|---|---|
| security@golang.org | https://go.dev/cl/752182 | Mailing List | |
| security@golang.org | https://go.dev/issue/77952 | Issue Tracking | |
| security@golang.org | https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk | Release Notes | |
| security@golang.org | https://pkg.go.dev/vuln/GO-2026-4599 | Vendor Advisory |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:golang:go:1.26.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A40FE3CB-0D03-462B-8A19-4DF1920ABE82",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "When verifying a certificate chain which contains a certificate containing multiple email address constraints which share common local portions but different domain portions, these constraints will not be properly applied, and only the last constraint will be considered."
},
{
"lang": "es",
"value": "Al verificar una cadena de certificados que contiene un certificado con m\u00faltiples restricciones de direcci\u00f3n de correo electr\u00f3nico que comparten porciones locales comunes pero porciones de dominio diferentes, estas restricciones no se aplicar\u00e1n correctamente, y solo la \u00faltima restricci\u00f3n ser\u00e1 considerada."
}
],
"id": "CVE-2026-27137",
"lastModified": "2026-04-21T14:40:31.187",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2026-03-06T22:16:00.850",
"references": [
{
"source": "security@golang.org",
"tags": [
"Mailing List"
],
"url": "https://go.dev/cl/752182"
},
{
"source": "security@golang.org",
"tags": [
"Issue Tracking"
],
"url": "https://go.dev/issue/77952"
},
{
"source": "security@golang.org",
"tags": [
"Release Notes"
],
"url": "https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk"
},
{
"source": "security@golang.org",
"tags": [
"Vendor Advisory"
],
"url": "https://pkg.go.dev/vuln/GO-2026-4599"
}
],
"sourceIdentifier": "security@golang.org",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-295"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
MSRC_CVE-2026-27137
Vulnerability from csaf_microsoft - Published: 2026-03-02 00:00 - Updated: 2026-03-14 01:37| URL | Category | |
|---|---|---|
{
"document": {
"category": "csaf_vex",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2026-27137 Incorrect enforcement of email constraints in crypto/x509 - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2026/msrc_cve-2026-27137.json"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "Incorrect enforcement of email constraints in crypto/x509",
"tracking": {
"current_release_date": "2026-03-14T01:37:36.000Z",
"generator": {
"date": "2026-03-14T07:12:41.883Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2026-27137",
"initial_release_date": "2026-03-02T00:00:00.000Z",
"revision_history": [
{
"date": "2026-03-11T01:03:44.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
},
{
"date": "2026-03-14T01:37:36.000Z",
"legacy_version": "2",
"number": "2",
"summary": "Information published."
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "3.0",
"product": {
"name": "Azure Linux 3.0",
"product_id": "17084"
}
}
],
"category": "product_name",
"name": "Azure Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cazl3 golang 1.25.7-1",
"product": {
"name": "\u003cazl3 golang 1.25.7-1",
"product_id": "1"
}
},
{
"category": "product_version",
"name": "azl3 golang 1.25.7-1",
"product": {
"name": "azl3 golang 1.25.7-1",
"product_id": "21051"
}
},
{
"category": "product_version_range",
"name": "\u003cazl3 golang 1.26.0-1",
"product": {
"name": "\u003cazl3 golang 1.26.0-1",
"product_id": "2"
}
},
{
"category": "product_version",
"name": "azl3 golang 1.26.0-1",
"product": {
"name": "azl3 golang 1.26.0-1",
"product_id": "20973"
}
}
],
"category": "product_name",
"name": "golang"
}
],
"category": "vendor",
"name": "Microsoft"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 golang 1.25.7-1 as a component of Azure Linux 3.0",
"product_id": "17084-1"
},
"product_reference": "1",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 golang 1.25.7-1 as a component of Azure Linux 3.0",
"product_id": "21051-17084"
},
"product_reference": "21051",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 golang 1.26.0-1 as a component of Azure Linux 3.0",
"product_id": "17084-2"
},
"product_reference": "2",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 golang 1.26.0-1 as a component of Azure Linux 3.0",
"product_id": "20973-17084"
},
"product_reference": "20973",
"relates_to_product_reference": "17084"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-27137",
"notes": [
{
"category": "general",
"text": "Go",
"title": "Assigning CNA"
}
],
"product_status": {
"fixed": [
"21051-17084",
"20973-17084"
],
"known_affected": [
"17084-1",
"17084-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-27137 Incorrect enforcement of email constraints in crypto/x509 - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2026/msrc_cve-2026-27137.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-11T01:03:44.000Z",
"details": "1.25.8-1:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17084-1"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2026-03-11T01:03:44.000Z",
"details": "1.26.1-1:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17084-2"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"environmentalsScore": 0.0,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.5,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"17084-1",
"17084-2"
]
}
],
"title": "Incorrect enforcement of email constraints in crypto/x509"
}
]
}
bit-golang-2026-27137
Vulnerability from bitnami_vulndb
When verifying a certificate chain which contains a certificate containing multiple email address constraints which share common local portions but different domain portions, these constraints will not be properly applied, and only the last constraint will be considered.
{
"affected": [
{
"package": {
"ecosystem": "Bitnami",
"name": "golang",
"purl": "pkg:bitnami/golang"
},
"ranges": [
{
"events": [
{
"introduced": "1.26.0-0"
},
{
"fixed": "1.26.1"
}
],
"type": "SEMVER"
}
],
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
]
}
],
"aliases": [
"CVE-2026-27137"
],
"database_specific": {
"cpes": [
"cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*"
],
"severity": "High"
},
"details": "When verifying a certificate chain which contains a certificate containing multiple email address constraints which share common local portions but different domain portions, these constraints will not be properly applied, and only the last constraint will be considered.",
"id": "BIT-golang-2026-27137",
"modified": "2026-03-11T09:11:40.352Z",
"published": "2026-03-10T08:44:11.145Z",
"references": [
{
"type": "WEB",
"url": "https://go.dev/cl/752182"
},
{
"type": "WEB",
"url": "https://go.dev/issue/77952"
},
{
"type": "WEB",
"url": "https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27137"
},
{
"type": "WEB",
"url": "https://pkg.go.dev/vuln/GO-2026-4599"
}
],
"schema_version": "1.6.2",
"summary": "Incorrect enforcement of email constraints in crypto/x509"
}
WID-SEC-W-2026-0548
Vulnerability from csaf_certbund - Published: 2026-02-26 23:00 - Updated: 2026-04-09 22:00| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Go ist eine quelloffene Programmiersprache.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in Golang Go ausnutzen, um einen nicht n\u00e4her spezifizierten Angriff durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- Sonstiges\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2026-0548 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-0548.json"
},
{
"category": "self",
"summary": "WID-SEC-2026-0548 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0548"
},
{
"category": "external",
"summary": "Go 1.26.1 and Go 1.25.8 pre-announcement vom 2026-02-26",
"url": "https://groups.google.com/g/golang-announce/c/qbkuaO2xasI/m/hmaB1OGBBQAJ?pli=1"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2026:10310-1 vom 2026-03-09",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/B2IXB7BTZPU5M6YJC45KXVXGXWNVXGGJ/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0875-1 vom 2026-03-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024674.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0876-1 vom 2026-03-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024673.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2-2026-3203 vom 2026-03-19",
"url": "https://alas.aws.amazon.com/AL2/ALAS2-2026-3203.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2-2026-3202 vom 2026-03-19",
"url": "https://alas.aws.amazon.com/AL2/ALAS2-2026-3202.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0947-1 vom 2026-03-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024783.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:5192 vom 2026-03-20",
"url": "https://access.redhat.com/errata/RHSA-2026:5192"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:5549 vom 2026-03-24",
"url": "https://access.redhat.com/errata/RHSA-2026:5549"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0976-1 vom 2026-03-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024821.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0977-1 vom 2026-03-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024820.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0993-1 vom 2026-03-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024870.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-5942 vom 2026-03-27",
"url": "http://linux.oracle.com/errata/ELSA-2026-5942.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-5941 vom 2026-03-26",
"url": "https://linux.oracle.com/errata/ELSA-2026-5941.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-5942 vom 2026-03-27",
"url": "https://linux.oracle.com/errata/ELSA-2026-5942.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:5941 vom 2026-03-26",
"url": "https://access.redhat.com/errata/RHSA-2026:5941"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:5942 vom 2026-03-26",
"url": "https://access.redhat.com/errata/RHSA-2026:5942"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:5944 vom 2026-03-26",
"url": "https://access.redhat.com/errata/RHSA-2026:5944"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:6341 vom 2026-04-01",
"url": "https://access.redhat.com/errata/RHSA-2026:6341"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:6344 vom 2026-04-01",
"url": "https://access.redhat.com/errata/RHSA-2026:6344"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-6344 vom 2026-04-01",
"url": "https://linux.oracle.com/errata/ELSA-2026-6344.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:6388 vom 2026-04-01",
"url": "https://access.redhat.com/errata/RHSA-2026:6388"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:6383 vom 2026-04-01",
"url": "https://access.redhat.com/errata/RHSA-2026:6383"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-6388 vom 2026-04-01",
"url": "https://linux.oracle.com/errata/ELSA-2026-6388.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:6382 vom 2026-04-01",
"url": "https://access.redhat.com/errata/RHSA-2026:6382"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-6382 vom 2026-04-02",
"url": "https://linux.oracle.com/errata/ELSA-2026-6382.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-6383 vom 2026-04-02",
"url": "https://linux.oracle.com/errata/ELSA-2026-6383.html"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:6949 vom 2026-04-08",
"url": "https://errata.build.resf.org/RLSA-2026:6949"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:6949 vom 2026-04-08",
"url": "https://access.redhat.com/errata/RHSA-2026:6949"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:5942 vom 2026-04-07",
"url": "https://errata.build.resf.org/RLSA-2026:5942"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:7005 vom 2026-04-08",
"url": "https://access.redhat.com/errata/RHSA-2026:7005"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:7009 vom 2026-04-09",
"url": "https://access.redhat.com/errata/RHSA-2026:7009"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:7011 vom 2026-04-09",
"url": "https://access.redhat.com/errata/RHSA-2026:7011"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:7259 vom 2026-04-09",
"url": "https://access.redhat.com/errata/RHSA-2026:7259"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:7328 vom 2026-04-09",
"url": "https://access.redhat.com/errata/RHSA-2026:7328"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-6949 vom 2026-04-09",
"url": "https://linux.oracle.com/errata/ELSA-2026-6949.html"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:5941 vom 2026-04-09",
"url": "https://errata.build.resf.org/RLSA-2026:5941"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:7315 vom 2026-04-09",
"url": "https://access.redhat.com/errata/RHSA-2026:7315"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:6564 vom 2026-04-09",
"url": "https://access.redhat.com/errata/RHSA-2026:6564"
}
],
"source_lang": "en-US",
"title": "Golang Go: Mehrere Schwachstellen erm\u00f6glichen nicht spezifizierten Angriff",
"tracking": {
"current_release_date": "2026-04-09T22:00:00.000+00:00",
"generator": {
"date": "2026-04-10T07:16:53.557+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2026-0548",
"initial_release_date": "2026-02-26T23:00:00.000+00:00",
"revision_history": [
{
"date": "2026-02-26T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2026-03-05T23:00:00.000+00:00",
"number": "2",
"summary": "CVE erg\u00e4nzt"
},
{
"date": "2026-03-08T23:00:00.000+00:00",
"number": "3",
"summary": "Referenz(en) aufgenommen: EUVD-2026-10088, EUVD-2026-10085, EUVD-2026-10084, EUVD-2026-10086, EUVD-2026-10087"
},
{
"date": "2026-03-09T23:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von openSUSE aufgenommen"
},
{
"date": "2026-03-11T23:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-03-19T23:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2026-03-22T23:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von SUSE und Red Hat aufgenommen"
},
{
"date": "2026-03-23T23:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Red Hat und SUSE aufgenommen"
},
{
"date": "2026-03-24T23:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-03-26T23:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von Oracle Linux und Red Hat aufgenommen"
},
{
"date": "2026-03-31T22:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-04-01T22:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von Oracle Linux und Red Hat aufgenommen"
},
{
"date": "2026-04-07T22:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von Rocky Enterprise Software Foundation und Red Hat aufgenommen"
},
{
"date": "2026-04-08T22:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-04-09T22:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von Red Hat, Oracle Linux und Rocky Enterprise Software Foundation aufgenommen"
}
],
"status": "final",
"version": "15"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c1.26.1",
"product": {
"name": "Golang Go \u003c1.26.1",
"product_id": "T051309"
}
},
{
"category": "product_version",
"name": "1.26.1",
"product": {
"name": "Golang Go 1.26.1",
"product_id": "T051309-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:golang:go:1.26.1"
}
}
},
{
"category": "product_version_range",
"name": "\u003c1.25.8",
"product": {
"name": "Golang Go \u003c1.25.8",
"product_id": "T051310"
}
},
{
"category": "product_version",
"name": "1.25.8",
"product": {
"name": "Golang Go 1.25.8",
"product_id": "T051310-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:golang:go:1.25.8"
}
}
}
],
"category": "product_name",
"name": "Go"
}
],
"category": "vendor",
"name": "Golang"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "RESF Rocky Linux",
"product": {
"name": "RESF Rocky Linux",
"product_id": "T032255",
"product_identification_helper": {
"cpe": "cpe:/o:resf:rocky_linux:-"
}
}
}
],
"category": "vendor",
"name": "RESF"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
},
{
"branches": [
{
"category": "product_version_range",
"name": "Container Platform \u003c4.20.18",
"product": {
"name": "Red Hat OpenShift Container Platform \u003c4.20.18",
"product_id": "T052609"
}
},
{
"category": "product_version",
"name": "Container Platform 4.20.18",
"product": {
"name": "Red Hat OpenShift Container Platform 4.20.18",
"product_id": "T052609-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:container_platform__4.20.18"
}
}
}
],
"category": "product_name",
"name": "OpenShift"
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
},
{
"category": "product_name",
"name": "SUSE openSUSE",
"product": {
"name": "SUSE openSUSE",
"product_id": "T027843",
"product_identification_helper": {
"cpe": "cpe:/o:suse:opensuse:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-25679",
"product_status": {
"known_affected": [
"T052609",
"T051309",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T051310"
]
},
"release_date": "2026-02-26T23:00:00.000+00:00",
"title": "CVE-2026-25679"
},
{
"cve": "CVE-2026-27137",
"product_status": {
"known_affected": [
"T052609",
"T051309",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T051310"
]
},
"release_date": "2026-02-26T23:00:00.000+00:00",
"title": "CVE-2026-27137"
},
{
"cve": "CVE-2026-27138",
"product_status": {
"known_affected": [
"T052609",
"T051309",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T051310"
]
},
"release_date": "2026-02-26T23:00:00.000+00:00",
"title": "CVE-2026-27138"
},
{
"cve": "CVE-2026-27139",
"product_status": {
"known_affected": [
"T052609",
"T051309",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T051310"
]
},
"release_date": "2026-02-26T23:00:00.000+00:00",
"title": "CVE-2026-27139"
},
{
"cve": "CVE-2026-27142",
"product_status": {
"known_affected": [
"T052609",
"T051309",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T051310"
]
},
"release_date": "2026-02-26T23:00:00.000+00:00",
"title": "CVE-2026-27142"
}
]
}
GHSA-7HFW-R8QC-89V4
Vulnerability from github – Published: 2026-03-07 00:30 – Updated: 2026-03-10 18:31When verifying a certificate chain which contains a certificate containing multiple email address constraints which share common local portions but different domain portions, these constraints will not be properly applied, and only the last constraint will be considered.
{
"affected": [],
"aliases": [
"CVE-2026-27137"
],
"database_specific": {
"cwe_ids": [
"CWE-295"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2026-03-06T22:16:00Z",
"severity": "HIGH"
},
"details": "When verifying a certificate chain which contains a certificate containing multiple email address constraints which share common local portions but different domain portions, these constraints will not be properly applied, and only the last constraint will be considered.",
"id": "GHSA-7hfw-r8qc-89v4",
"modified": "2026-03-10T18:31:14Z",
"published": "2026-03-07T00:30:28Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27137"
},
{
"type": "WEB",
"url": "https://go.dev/cl/752182"
},
{
"type": "WEB",
"url": "https://go.dev/issue/77952"
},
{
"type": "WEB",
"url": "https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk"
},
{
"type": "WEB",
"url": "https://pkg.go.dev/vuln/GO-2026-4599"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
]
}
alsa-2026:8842
Vulnerability from osv_almalinux
Delve is a debugger for the Go programming language. The goal of the project is to provide a simple, full featured debugging tool for Go. Delve should be easy to invoke and easy to use. Chances are if you're using a debugger, things aren't going your way. With that in mind, Delve should stay out of your way as much as possible.
Security Fix(es):
- crypto/x509: Incorrect enforcement of email constraints in crypto/x509 (CVE-2026-27137)
- net/url: Incorrect parsing of IPv6 host literals in net/url (CVE-2026-25679)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
| URL | Type | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "AlmaLinux:10",
"name": "delve"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.25.2-3.el10_1"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"details": "Delve is a debugger for the Go programming language. The goal of the project is to provide a simple, full featured debugging tool for Go. Delve should be easy to invoke and easy to use. Chances are if you\u0027re using a debugger, things aren\u0027t going your way. With that in mind, Delve should stay out of your way as much as possible. \n\nSecurity Fix(es): \n\n * crypto/x509: Incorrect enforcement of email constraints in crypto/x509 (CVE-2026-27137)\n * net/url: Incorrect parsing of IPv6 host literals in net/url (CVE-2026-25679)\n\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n",
"id": "ALSA-2026:8842",
"modified": "2026-04-20T08:31:59Z",
"published": "2026-04-20T00:00:00Z",
"references": [
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2026:8842"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2026-25679"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2026-27137"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2445345"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2445356"
},
{
"type": "ADVISORY",
"url": "https://errata.almalinux.org/10/ALSA-2026-8842.html"
}
],
"related": [
"CVE-2026-27137",
"CVE-2026-25679"
],
"summary": "Important: delve security update"
}
OPENSUSE-SU-2026:20342-1
Vulnerability from csaf_opensuse - Published: 2026-03-11 09:09 - Updated: 2026-03-11 09:09| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for go1.26",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for go1.26 fixes the following issues:\n\nChanges in go1.26:\n\ngo1.26.1 (released 2026-03-05) includes security fixes to the\ncrypto/x509, html/template, net/url, and os packages, as well as\nbug fixes to the go command, the go fix command, the compiler,\nand the os and reflect packages. ( boo#1255111)\n\n CVE-2026-25679 CVE-2026-27142 CVE-2026-27137 CVE-2026-27138 CVE-2026-27139\n\n * go#77970 go#77578 boo#1259264 security: fix CVE-2026-25679 net/url: reject IPv6 literal not at start of host\n * go#77972 go#77954 boo#1259265 security: fix CVE-2026-27142 html/template: URLs in meta content attribute actions are not escaped\n * go#77973 go#77952 boo#1259266 security: fix CVE-2026-27137 crypto/x509: incorrect enforcement of email constraints\n * go#77974 go#77953 boo#1259267 security: fix CVE-2026-27138 crypto/x509: panic in name constraint checking for malformed certificates\n * go#77834 go#77827 boo#1259268 security: fix CVE-2026-27139 os: FileInfo can escape from a Root\n\n * go#77252 cmd/compile: miscompile of global array initialization\n * go#77407 os: Go 1.25.x regression on RemoveAll for windows\n * go#77474 cmd/go: CGO compilation fails after upgrading from Go 1.25.5 to 1.25.6 due to --define-variable flag in pkg-config\n * go#77529 cmd/fix, x/tools/go/analysis/passes/modernize: stringscut: OOB panic in indexArgValid analyzing \"buf.Bytes()\" call\n * go#77532 net/smtp: expiry date of localhostCert for testing is too short\n * go#77536 cmd/compile: internal compiler error: \u0027main.func1\u0027: not lowered: v15, Load STRUCT PTR SSA\n * go#77618 strings: HasSuffix doesn\u0027t work correctly for multibyte runes in go 1.26\n * go#77623 cmd/compile: internal compiler error on : \"tried to free an already free register\" with generic function and type \u003e= 192 bytes\n * go#77624 cmd/fix, x/tools/go/analysis/passes/modernize: stringsbuilder breaks code when combining two strings.Builders\n * go#77680 cmd/link: TestFlagW/-w_-linkmode=external fails on illumos\n * go#77766 cmd/fix,x/tools/go/analysis/passes/modernize: rangeint uses target platform\u0027s type in the range expression, breaking other platforms\n * go#77780 reflect: breaking change for reflect.Value.Interface behaviour\n * go#77786 cmd/compile: rewriteFixedLoad does not properly sign extend AuxInt\n * go#77803 cmd/fix,x/tools/go/analysis/passes/modernize: reflect.TypeOf(nil) transformed into reflect.TypeFor[untyped nil]()\n * go#77804 cmd/fix,x/tools/go/analysis/passes/modernize: minmax breaks select statements\n * go#77805 cmd/fix, x/tools/go/analysis/passes/modernize: waitgroup leads to a compilation error\n * go#77807 cmd/fix,x/tools/go/analysis/passes/modernize: stringsbuilder ignores variables if they are used multiple times\n * go#77849 cmd/fix,x/tools/go/analysis/passes/modernize: stringscut rewrite changes behavior\n * go#77860 cmd/go: change go mod init default go directive back to 1.N\n * go#77899 cmd/fix, x/tools/go/analysis/passes/modernize: bad rangeint rewriting\n * go#77904 x/tools/go/analysis/passes/modernize: stringsbuilder breaks code when GenDecl is a block declaration\n\ngo1.26.0 (released 2026-02-10) is a major release of Go.\ngo1.26.x minor releases will be provided through February 2027.\nhttps://github.com/golang/go/wiki/Go-Release-Cycle\ngo1.26 arrives six months after Go 1.25. Most of its changes are\nin the implementation of the toolchain, runtime, and\nlibraries. As always, the release maintains the Go 1 promise of\ncompatibility. We expect almost all Go programs to continue to\ncompile and run as before. (boo#1255111)\n\n * Language change: The built-in new function, which creates a new\n variable, now allows its operand to be an expression,\n specifying the initial value of the variable.\n * Language change: The restriction that a generic type may not\n refer to itself in its type parameter list has been lifted. It\n is now possible to specify type constraints that refer to the\n generic type being constrained.\n * go command: The venerable go fix command has been completely\n revamped and is now the home of Go\u2019s modernizers. It provides a\n dependable, push-button way to update Go code bases to the\n latest idioms and core library APIs. The initial suite of\n modernizers includes dozens of fixers to make use of modern\n features of the Go language and library, as well a source-level\n inliner that allows users to automate their own API migrations\n using //go:fix inline directives. These fixers should not\n change the behavior of your program, so if you encounter any\n issues with a fix performed by go fix, please report it.\n * go command: The rewritten go fix command builds atop the exact\n same Go analysis framework as go vet. This means the same\n analyzers that provide diagnostics in go vet can be used to\n suggest and apply fixes in go fix. The go fix command\u2019s\n historical fixers, all of which were obsolete, have been\n removed.\n * go command: Two upcoming Go blog posts will go into more detail\n on modernizers, the inliner, and how to get the most out of go\n fix.\n * go command: go mod init now defaults to a lower go version in\n new go.mod files. Running go mod init using a toolchain of\n version 1.N.X will create a go.mod file specifying the Go\n version go 1.(N-1).0. Pre-release versions of 1.N will create\n go.mod files specifying go 1.(N-2).0. For example, the Go 1.26\n release candidates will create go.mod files with go 1.24.0, and\n Go 1.26 and its minor releases will create go.mod files with go\n 1.25.0. This is intended to encourage the creation of modules\n that are compatible with currently supported versions of\n Go. For additional control over the go version in new modules,\n go mod init can be followed up with go get go@version.\n * go command: cmd/doc, and go tool doc have been deleted. go doc\n can be used as a replacement for go tool doc: it takes the same\n flags and arguments and has the same behavior.\n * pprof: The pprof tool web UI, enabled with the -http flag, now\n defaults to the flame graph view. The previous graph view is\n available in the \u201cView -\u003e Graph\u201d menu, or via /ui/graph.\n * Runtime: The new Green Tea garbage collector, previously\n available as an experiment in Go 1.25, is now enabled by\n default after incorporating feedback. This garbage collector\u2019s\n design improves the performance of marking and scanning small\n objects through better locality and CPU scalability. Benchmark\n results vary, but we expect somewhere between a 10\u201340%\n reduction in garbage collection overhead in real-world programs\n that heavily use the garbage collector. Further improvements,\n on the order of 10% in garbage collection overhead, are\n expected when running on newer amd64-based CPU platforms (Intel\n Ice Lake or AMD Zen 4 and newer), as the garbage collector now\n leverages vector instructions for scanning small objects when\n possible. The new garbage collector may be disabled by setting\n GOEXPERIMENT=nogreenteagc at build time. This opt-out setting\n is expected to be removed in Go 1.27. If you disable the new\n garbage collector for any reason related to its performance or\n behavior, please file an issue.\n * Runtime: cgo: The baseline runtime overhead of cgo calls has\n been reduced by ~30%.\n * Runtime: Heap base address randomization: On 64-bit platforms,\n the runtime now randomizes the heap base address at\n startup. This is a security enhancement that makes it harder\n for attackers to predict memory addresses and exploit\n vulnerabilities when using cgo. This feature may be disabled by\n setting GOEXPERIMENT=norandomizedheapbase64 at build time. This\n opt-out setting is expected to be removed in a future Go\n release.\n * Runtime: Experimental goroutine leak profile: A new profile\n type that reports leaked goroutines is now available as an\n experiment. The new profile type, named goroutineleak in the\n runtime/pprof package, may be enabled by setting\n GOEXPERIMENT=goroutineleakprofile at build time. Enabling the\n experiment also makes the profile available as a net/http/pprof\n endpoint, /debug/pprof/goroutineleak. A leaked goroutine is a\n goroutine blocked on some concurrency primitive (channels,\n sync.Mutex, sync.Cond, etc) that cannot possibly become\n unblocked. The runtime detects leaked goroutines using the\n garbage collector: if a goroutine G is blocked on concurrency\n primitive P, and P is unreachable from any runnable goroutine\n or any goroutine that those could unblock, then P cannot be\n unblocked, so goroutine G can never wake up. While it is\n impossible to detect permanently blocked goroutines in all\n cases, this approach detects a large class of such\n leaks. Because this technique builds on reachability, the\n runtime may fail to identify leaks caused by blocking on\n concurrency primitives reachable through global variables or\n the local variables of runnable goroutines. Special thanks to\n Vlad Saioc at Uber for contributing this work. The underlying\n theory is presented in detail in a publication by Saioc et\n al. The implementation is production-ready, and is only\n considered an experiment for the purposes of collecting\n feedback on the API, specifically the choice to make it a new\n profile. The feature is also designed to not incur any\n additional run-time overhead unless it is actively in-use. We\n encourage users to try out the new feature in the Go\n playground, in tests, in continuous integration, and in\n production. We welcome additional feedback on the proposal\n issue. We aim to enable goroutine leak profiles by default in\n Go 1.27.\n * Compiler: The compiler can now allocate the backing store for\n slices on the stack in more situations, which improves\n performance. If this change is causing trouble, the bisect tool\n can be used to find the allocation causing trouble using the\n -compile=variablemake flag. All such new stack allocations can\n also be turned off using -gcflags=all=-d=variablemakehash=n. If\n you encounter issues with this optimization, please file an\n issue.\n * Linker: On 64-bit ARM-based Windows (the windows/arm64 port),\n the linker now supports internal linking mode of cgo programs,\n which can be requested with the -ldflags=-linkmode=internal\n flag.\n * Linker: There are several minor changes to executable\n files. These changes do not affect running Go programs. They\n may affect programs that analyze Go executables, and they may\n affect people who use external linking mode with custom linker\n scripts.\n * Linker: The moduledata structure is now in its own section,\n named .go.module.\n * Linker: The moduledata cutab field, which is a slice, now has\n the correct length; previously the length was four times too\n large.\n * Linker: The pcHeader found at the start of the .gopclntab\n section no longer records the start of the text section. That\n field is now always zero.\n * Linker: That pcHeader change was made so that the .gopclntab\n section no longer contains any relocations. On platforms that\n support relro, the section has moved from the relro segment to\n the rodata segment.\n * Linker: The funcdata symbols and the findfunctab have moved\n from the .rodata section to the .gopclntab section.\n * Linker: The .gosymtab section has been removed. It was\n previously always present but empty.\n * Linker: When using internal linking, ELF sections now appear in\n the section header list sorted by address. The previous order\n was somewhat unpredictable.\n * Linker: The references to section names here use the ELF names\n as seen on Linux and other systems. The Mach-O names as seen on\n Darwin start with a double underscore and do not contain any\n dots.\n * Bootstrap: As mentioned in the Go 1.24 release notes, Go 1.26\n now requires Go 1.24.6 or later for bootstrap. We expect that\n Go 1.28 will require a minor release of Go 1.26 or later for\n bootstrap.\n * Standard Library: New crypto/hpke package: The new crypto/hpke\n package implements Hybrid Public Key Encryption (HPKE) as\n specified in RFC 9180, including support for post-quantum\n hybrid KEMs.\n * Standard Library: New experimental simd/archsimd package: Go\n 1.26 introduces a new experimental simd/archsimd package, which\n can be enabled by setting the environment variable\n GOEXPERIMENT=simd at build time. This package provides access\n to architecture-specific SIMD operations. It is currently\n available on the amd64 architecture and supports 128-bit,\n 256-bit, and 512-bit vector types, such as Int8x16 and\n Float64x8, with operations such as Int8x16.Add. The API is not\n yet considered stable. We intend to provide support for other\n architectures in future versions, but the API intentionally\n architecture-specific and thus non-portable. In addition, we\n plan to develop a high-level portable SIMD package in the\n future.\n * Standard Library: New experimental runtime/secret package: The\n new runtime/secret package is available as an experiment, which\n can be enabled by setting the environment variable\n GOEXPERIMENT=runtimesecret at build time. It provides a\n facility for securely erasing temporaries used in code that\n manipulates secret information\u2014typically cryptographic in\n nature\u2014such as registers, stack, new heap allocations. This\n package is intended to make it easier to ensure forward\n secrecy. It currently supports the amd64 and arm64\n architectures on Linux.\n * bytes: The new Buffer.Peek method returns the next n bytes from\n the buffer without advancing it.\n * crypto: The new Encapsulator and Decapsulator interfaces allow\n accepting abstract KEM encapsulation or decapsulation keys.\n * crypto/dsa: The random parameter to GenerateKey is now\n ignored. Instead, it now always uses a secure source of\n cryptographically random bytes. For deterministic testing, use\n the new testing/cryptotest.SetGlobalRandom function. The new\n GODEBUG setting cryptocustomrand=1 temporarily restores the old\n behavior.\n * crypto/ecdh: The random parameter to Curve.GenerateKey is now\n ignored. Instead, it now always uses a secure source of\n cryptographically random bytes. For deterministic testing, use\n the new testing/cryptotest.SetGlobalRandom function. The new\n GODEBUG setting cryptocustomrand=1 temporarily restores the old\n behavior. The new KeyExchanger interface, implemented by\n PrivateKey, makes it possible to accept abstract ECDH private\n keys, e.g. those implemented in hardware.\n * crypto/ecdsa: The big.Int fields of PublicKey and PrivateKey\n are now deprecated. The random parameter to GenerateKey,\n SignASN1, Sign, and PrivateKey.Sign is now ignored. Instead,\n they now always use a secure source of cryptographically random\n bytes. For deterministic testing, use the new\n testing/cryptotest.SetGlobalRandom function. The new GODEBUG\n setting cryptocustomrand=1 temporarily restores the old\n behavior.\n * crypto/ed25519: If the random parameter to GenerateKey is nil,\n GenerateKey now always uses a secure source of\n cryptographically random bytes, instead of crypto/rand.Reader\n (which could have been overridden). The new GODEBUG setting\n cryptocustomrand=1 temporarily restores the old behavior.\n * crypto/fips140: The new WithoutEnforcement and Enforced\n functions now allow running in GODEBUG=fips140=only mode while\n selectively disabling the strict FIPS 140-3 checks. Version\n returns the resolved FIPS 140-3 Go Cryptographic Module version\n when building against a frozen module with GOFIPS140.\n * crypto/mlkem: The new DecapsulationKey768.Encapsulator and\n DecapsulationKey1024.Encapsulator methods implement the new\n crypto.Decapsulator interface.\n * crypto/mlkem/mlkemtest: The new crypto/mlkem/mlkemtest package\n exposes the Encapsulate768 and Encapsulate1024 functions which\n implement derandomized ML-KEM encapsulation, for use with\n known-answer tests.\n * crypto/rand: The random parameter to Prime is now\n ignored. Instead, it now always uses a secure source of\n cryptographically random bytes. For deterministic testing, use\n the new testing/cryptotest.SetGlobalRandom function. The new\n GODEBUG setting cryptocustomrand=1 temporarily restores the old\n behavior.\n * crypto/rsa: The new EncryptOAEPWithOptions function allows\n specifying different hash functions for OAEP padding and MGF1\n mask generation.\n * crypto/rsa: The random parameter to GenerateKey,\n GenerateMultiPrimeKey, and EncryptPKCS1v15 is now\n ignored. Instead, they now always use a secure source of\n cryptographically random bytes. For deterministic testing, use\n the new testing/cryptotest.SetGlobalRandom function. The new\n GODEBUG setting cryptocustomrand=1 temporarily restores the old\n behavior.\n * crypto/rsa: If PrivateKey fields are modified after calling\n PrivateKey.Precompute, PrivateKey.Validate now fails.\n * crypto/rsa: PrivateKey.D is now checked for consistency with\n precomputed values, even if it is not used.\n * crypto/rsa: Unsafe PKCS #1 v1.5 encryption padding (implemented\n by EncryptPKCS1v15, DecryptPKCS1v15, and\n DecryptPKCS1v15SessionKey) is now deprecated.\n * crypto/subtle: The WithDataIndependentTiming function no longer\n locks the calling goroutine to the OS thread while executing\n the passed function. Additionally, any goroutines which are\n spawned during the execution of the passed function and their\n descendants now inherit the properties of\n WithDataIndependentTiming for their lifetime. This change also\n affects cgo in the following ways:\n * crypto/subtle: Any C code called via cgo from within the\n function passed to WithDataIndependentTiming, or from a\n goroutine spawned by the function passed to\n WithDataIndependentTiming and its descendants, will also have\n data independent timing enabled for the duration of the\n call. If the C code disables data independent timing, it will\n be re-enabled on return to Go.\n * crypto/subtle: If C code called via cgo, from the function\n passed to WithDataIndependentTiming or elsewhere, enables or\n disables data independent timing then calling into Go will\n preserve that state for the duration of the call.\n * crypto/tls: The hybrid SecP256r1MLKEM768 and SecP384r1MLKEM1024\n post-quantum key exchanges are now enabled by default. They can\n be disabled by setting Config.CurvePreferences or with the\n tlssecpmlkem=0 GODEBUG setting.\n * crypto/tls: The new ClientHelloInfo.HelloRetryRequest field\n indicates if the ClientHello was sent in response to a\n HelloRetryRequest message. The new\n ConnectionState.HelloRetryRequest field indicates if the server\n sent a HelloRetryRequest, or if the client received a\n HelloRetryRequest, depending on connection role.\n * crypto/tls: The QUICConn type used by QUIC implementations\n includes a new event for reporting TLS handshake errors.\n * crypto/tls: If Certificate.PrivateKey implements\n crypto.MessageSigner, its SignMessage method is used instead of\n Sign in TLS 1.2 and later.\n * crypto/tls: The following GODEBUG settings introduced in Go\n 1.22 and Go 1.23 will be removed in the next major Go\n release. Starting in Go 1.27, the new behavior will apply\n regardless of GODEBUG setting or go.mod language version.\n * crypto/tls: GODEBUG tlsunsafeekm:\n ConnectionState.ExportKeyingMaterial will require TLS 1.3 or\n Extended Master Secret.\n * crypto/tls: GODEBUG tlsrsakex: legacy RSA-only key exchanges\n without ECDH won\u2019t be enabled by default.\n * crypto/tls: GODEBUG tls10server: the default minimum TLS\n version for both clients and servers will be TLS 1.2.\n * crypto/tls: GODEBUG tls3des: the default cipher suites will not\n include 3DES.\n * crypto/tls: GODEBUG x509keypairleaf: X509KeyPair and\n LoadX509KeyPair will always populate the Certificate.Leaf\n field.\n * crypto/x509: The ExtKeyUsage and KeyUsage types now have String\n methods that return the corresponding OID names as defined in\n RFC 5280 and other registries.\n * crypto/x509: The ExtKeyUsage type now has an OID method that\n returns the corresponding OID for the EKU.\n * crypto/x509: The new OIDFromASN1OID function allows converting\n an encoding/asn1.ObjectIdentifier into an OID.\n * debug/elf: Additional R_LARCH_* constants from LoongArch ELF\n psABI v20250521 (global version v2.40) are defined for use with\n LoongArch systems.\n * errors: The new AsType function is a generic version of As. It\n is type-safe, faster, and, in most cases, easier to use.\n * fmt: For unformatted strings, fmt.Errorf(\"x\") now allocates\n less and generally matches the allocations for errors.New(\"x\").\n * go/ast: The new ParseDirective function parses directive\n comments, which are comments such as //go:generate. Source code\n tools can support their own directive comments and this new API\n should help them implement the conventional syntax.\n * go/ast: The new BasicLit.ValueEnd field records the precise end\n position of a literal so that the BasicLit.End method can now\n always return the correct answer. (Previously it was computed\n using a heuristic that was incorrect for multi-line raw string\n literals in Windows source files, due to removal of carriage\n returns.)\n * go/ast: Programs that update the ValuePos field of BasicLits\n produced by the parser may need to also update or clear the\n ValueEnd field to avoid minor differences in formatted output.\n * go/token: The new File.End convenience method returns the\n file\u2019s end position.\n * go/types: The gotypesalias GODEBUG setting introduced in Go\n 1.22 will be removed in the next major Go release. Starting in\n Go 1.27, the go/types package will always produce an Alias type\n for the representation of type aliases regardless of GODEBUG\n setting or go.mod language version.\n * image/jpeg: The JPEG encoder and decoder have been replaced\n with new, faster, more accurate implementations. Code that\n expects specific bit-for-bit outputs from the encoder or\n decoder may need to be updated.\n * io: ReadAll now allocates less intermediate memory and returns\n a minimally sized final slice. It is often about two times\n faster while typically allocating around half as much total\n memory, with more benefit for larger inputs.\n * log/slog: The NewMultiHandler function creates a MultiHandler\n that invokes all the given Handlers. Its Enabled method reports\n whether any of the handlers\u2019 Enabled methods return true. Its\n Handle, WithAttrs and WithGroup methods call the corresponding\n method on each of the enabled handlers.\n * net: The new Dialer methods DialIP, DialTCP, DialUDP, and\n DialUnix permit dialing specific network types with context\n values.\n * net/http: The new HTTP2Config.StrictMaxConcurrentRequests field\n controls whether a new connection should be opened if an\n existing HTTP/2 connection has exceeded its stream limit.\n * net/http: The new Transport.NewClientConn method returns a\n client connection to an HTTP server. Most users should continue\n to use Transport.RoundTrip to make requests, which manages a\n pool of connections. NewClientConn is useful for users who need\n to implement their own connection management.\n * net/http: Client now uses and sets cookies scoped to URLs with\n the host portion matching Request.Host when\n available. Previously, the connection address host was always\n used.\n * net/http/httptest: The HTTP client returned by Server.Client\n will now redirect requests for example.com and any subdomains\n to the server being tested.\n * net/http/httputil: The ReverseProxy.Director configuration\n field is deprecated in favor of ReverseProxy.Rewrite.\n * net/http/httputil: A malicious client can remove headers added\n by a Director function by designating those headers as\n hop-by-hop. Since there is no way to address this problem\n within the scope of the Director API, we added a new Rewrite\n hook in Go 1.20. Rewrite hooks are provided with both the\n unmodified inbound request received by the proxy and the\n outbound request which will be sent by the proxy. Since the\n Director hook is fundamentally unsafe, we are now deprecating\n it.\n * net/netip: The new Prefix.Compare method compares two prefixes.\n * net/url: Parse now rejects malformed URLs containing colons in\n the host subcomponent, such as http://::1/ or\n http://localhost:80:80/. URLs containing bracketed IPv6\n addresses, such as http://[::1]/ are still accepted. The new\n GODEBUG setting urlstrictcolons=0 restores the old behavior.\n * os: The new Process.WithHandle method provides access to an\n internal process handle on supported platforms (pidfd on Linux\n 5.4 or later, Handle on Windows).\n * os: On Windows, the OpenFile flag parameter can now contain any\n combination of Windows-specific file flags, such as\n FILE_FLAG_OVERLAPPED and FILE_FLAG_SEQUENTIAL_SCAN, for control\n of file or device caching behavior, access modes, and other\n special-purpose flags.\n * os/signal: NotifyContext now cancels the returned context with\n context.CancelCauseFunc and an error indicating which signal\n was received.\n * reflect: The new methods Type.Fields, Type.Methods, Type.Ins\n and Type.Outs return iterators for a type\u2019s fields (for a\n struct type), methods, inputs and outputs parameters (for a\n function type), respectively. Similarly, the new methods\n Value.Fields and Value.Methods return iterators over a value\u2019s\n fields or methods, respectively. Each iteration yields the type\n information (StructField or Method) of a field or method, along\n with the field or method Value.\n * runtime/metrics: Several new scheduler metrics have been added,\n including counts of goroutines in various states (waiting,\n runnable, etc.) under the /sched/goroutines prefix, the number\n of OS threads the runtime is aware of with\n /sched/threads:threads, and the total number of goroutines\n created by the program with\n /sched/goroutines-created:goroutines.\n * testing: The new methods T.ArtifactDir, B.ArtifactDir, and\n F.ArtifactDir return a directory in which to write test output\n files (artifacts).\n * testing: When the -artifacts flag is provided to go test, this\n directory will be located under the output directory (specified\n with -outputdir, or the current directory by\n default). Otherwise, artifacts are stored in a temporary\n directory which is removed after the test completes.\n * testing: The first call to ArtifactDir when -artifacts is\n provided writes the location of the directory to the test log.\n * testing: The B.Loop method no longer prevents inlining in the\n loop body, which could lead to unanticipated allocation and\n slower benchmarks. With this fix, we expect that all benchmarks\n can be converted from the old B.N style to the new B.Loop style\n with no ill effects. Within the body of a for b.Loop() { ... }\n loop, function call parameters, results, and assigned variables\n are still kept alive, preventing the compiler from optimizing\n away entire parts of the benchmark.\n * testing/cryptotest: The new SetGlobalRandom function configures\n a global, deterministic cryptographic randomness source for the\n duration of the test. It affects crypto/rand, and all implicit\n sources of cryptographic randomness in the crypto/... packages.\n * time: The asynctimerchan GODEBUG setting introduced in Go 1.23\n will be removed in the next major Go release. Starting in Go\n 1.27, the time package will always use unbuffered (synchronous)\n channels for timers regardless of GODEBUG setting or go.mod\n language version.\n * Ports: Darwin: Go 1.26 is the last release that will run on\n macOS 12 Monterey. Go 1.27 will require macOS 13 Ventura or\n later.\n * Ports: FreeBSD: The freebsd/riscv64 port (GOOS=freebsd\n GOARCH=riscv64) has been marked broken. See issue 76475 for\n details.\n * Ports: Windows: As announced in the Go 1.25 release notes, the\n broken 32-bit windows/arm port (GOOS=windows GOARCH=arm) has\n been removed.\n * Ports: PowerPC: Go 1.26 is the last release that supports the\n ELFv1 ABI on the big-endian 64-bit PowerPC port on Linux\n (GOOS=linux GOARCH=ppc64). It will switch to the ELFv2 ABI in\n Go 1.27. As the port does not currently support linking against\n other ELF objects, we expect this change to be transparent to\n users.\n * Ports: RISC-V: The linux/riscv64 port now supports the race\n detector.\n * Ports: S390X: The s390x port now supports passing function\n arguments and results using registers.\n * Ports: WebAssembly: The compiler now unconditionally makes use\n of the sign extension and non-trapping floating-point to\n integer conversion instructions. These features have been\n standardized since at least Wasm 2.0. The corresponding GOWASM\n settings, signext and satconv, are now ignored.\n * Ports: WebAssembly: For WebAssembly applications, the runtime\n now manages chunks of heap memory in much smaller increments,\n leading to significantly reduced memory usage for applications\n with heaps less than around 16 MiB in size.\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Leap-16.0-371",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2026_20342-1.json"
},
{
"category": "self",
"summary": "SUSE Bug 1255111",
"url": "https://bugzilla.suse.com/1255111"
},
{
"category": "self",
"summary": "SUSE Bug 1259264",
"url": "https://bugzilla.suse.com/1259264"
},
{
"category": "self",
"summary": "SUSE Bug 1259265",
"url": "https://bugzilla.suse.com/1259265"
},
{
"category": "self",
"summary": "SUSE Bug 1259266",
"url": "https://bugzilla.suse.com/1259266"
},
{
"category": "self",
"summary": "SUSE Bug 1259267",
"url": "https://bugzilla.suse.com/1259267"
},
{
"category": "self",
"summary": "SUSE Bug 1259268",
"url": "https://bugzilla.suse.com/1259268"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-25679 page",
"url": "https://www.suse.com/security/cve/CVE-2026-25679/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-27137 page",
"url": "https://www.suse.com/security/cve/CVE-2026-27137/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-27138 page",
"url": "https://www.suse.com/security/cve/CVE-2026-27138/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-27139 page",
"url": "https://www.suse.com/security/cve/CVE-2026-27139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-27142 page",
"url": "https://www.suse.com/security/cve/CVE-2026-27142/"
}
],
"title": "Security update for go1.26",
"tracking": {
"current_release_date": "2026-03-11T09:09:25Z",
"generator": {
"date": "2026-03-11T09:09:25Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2026:20342-1",
"initial_release_date": "2026-03-11T09:09:25Z",
"revision_history": [
{
"date": "2026-03-11T09:09:25Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "go1.26-1.26.1-160000.1.1.aarch64",
"product": {
"name": "go1.26-1.26.1-160000.1.1.aarch64",
"product_id": "go1.26-1.26.1-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.26-doc-1.26.1-160000.1.1.aarch64",
"product": {
"name": "go1.26-doc-1.26.1-160000.1.1.aarch64",
"product_id": "go1.26-doc-1.26.1-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.26-libstd-1.26.1-160000.1.1.aarch64",
"product": {
"name": "go1.26-libstd-1.26.1-160000.1.1.aarch64",
"product_id": "go1.26-libstd-1.26.1-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.26-race-1.26.1-160000.1.1.aarch64",
"product": {
"name": "go1.26-race-1.26.1-160000.1.1.aarch64",
"product_id": "go1.26-race-1.26.1-160000.1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.26-1.26.1-160000.1.1.ppc64le",
"product": {
"name": "go1.26-1.26.1-160000.1.1.ppc64le",
"product_id": "go1.26-1.26.1-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.26-doc-1.26.1-160000.1.1.ppc64le",
"product": {
"name": "go1.26-doc-1.26.1-160000.1.1.ppc64le",
"product_id": "go1.26-doc-1.26.1-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.26-race-1.26.1-160000.1.1.ppc64le",
"product": {
"name": "go1.26-race-1.26.1-160000.1.1.ppc64le",
"product_id": "go1.26-race-1.26.1-160000.1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.26-1.26.1-160000.1.1.s390x",
"product": {
"name": "go1.26-1.26.1-160000.1.1.s390x",
"product_id": "go1.26-1.26.1-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.26-doc-1.26.1-160000.1.1.s390x",
"product": {
"name": "go1.26-doc-1.26.1-160000.1.1.s390x",
"product_id": "go1.26-doc-1.26.1-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.26-race-1.26.1-160000.1.1.s390x",
"product": {
"name": "go1.26-race-1.26.1-160000.1.1.s390x",
"product_id": "go1.26-race-1.26.1-160000.1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.26-1.26.1-160000.1.1.x86_64",
"product": {
"name": "go1.26-1.26.1-160000.1.1.x86_64",
"product_id": "go1.26-1.26.1-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.26-doc-1.26.1-160000.1.1.x86_64",
"product": {
"name": "go1.26-doc-1.26.1-160000.1.1.x86_64",
"product_id": "go1.26-doc-1.26.1-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.26-libstd-1.26.1-160000.1.1.x86_64",
"product": {
"name": "go1.26-libstd-1.26.1-160000.1.1.x86_64",
"product_id": "go1.26-libstd-1.26.1-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.26-race-1.26.1-160000.1.1.x86_64",
"product": {
"name": "go1.26-race-1.26.1-160000.1.1.x86_64",
"product_id": "go1.26-race-1.26.1-160000.1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 16.0",
"product": {
"name": "openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0"
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.1-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.26-1.26.1-160000.1.1.aarch64"
},
"product_reference": "go1.26-1.26.1-160000.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.1-160000.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.26-1.26.1-160000.1.1.ppc64le"
},
"product_reference": "go1.26-1.26.1-160000.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.1-160000.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.26-1.26.1-160000.1.1.s390x"
},
"product_reference": "go1.26-1.26.1-160000.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.1-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.26-1.26.1-160000.1.1.x86_64"
},
"product_reference": "go1.26-1.26.1-160000.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.1-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.26-doc-1.26.1-160000.1.1.aarch64"
},
"product_reference": "go1.26-doc-1.26.1-160000.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.1-160000.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.26-doc-1.26.1-160000.1.1.ppc64le"
},
"product_reference": "go1.26-doc-1.26.1-160000.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.1-160000.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.26-doc-1.26.1-160000.1.1.s390x"
},
"product_reference": "go1.26-doc-1.26.1-160000.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.1-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.26-doc-1.26.1-160000.1.1.x86_64"
},
"product_reference": "go1.26-doc-1.26.1-160000.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-libstd-1.26.1-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.26-libstd-1.26.1-160000.1.1.aarch64"
},
"product_reference": "go1.26-libstd-1.26.1-160000.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-libstd-1.26.1-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.26-libstd-1.26.1-160000.1.1.x86_64"
},
"product_reference": "go1.26-libstd-1.26.1-160000.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.1-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.26-race-1.26.1-160000.1.1.aarch64"
},
"product_reference": "go1.26-race-1.26.1-160000.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.1-160000.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.26-race-1.26.1-160000.1.1.ppc64le"
},
"product_reference": "go1.26-race-1.26.1-160000.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.1-160000.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.26-race-1.26.1-160000.1.1.s390x"
},
"product_reference": "go1.26-race-1.26.1-160000.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.1-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.26-race-1.26.1-160000.1.1.x86_64"
},
"product_reference": "go1.26-race-1.26.1-160000.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-25679",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-25679"
}
],
"notes": [
{
"category": "general",
"text": "url.Parse insufficiently validated the host/authority component and accepted some invalid URLs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:go1.26-1.26.1-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.26-1.26.1-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.26-1.26.1-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.26-1.26.1-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.26-doc-1.26.1-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.26-doc-1.26.1-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.26-doc-1.26.1-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.26-doc-1.26.1-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.26-libstd-1.26.1-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.26-libstd-1.26.1-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.26-race-1.26.1-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.26-race-1.26.1-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.26-race-1.26.1-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.26-race-1.26.1-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-25679",
"url": "https://www.suse.com/security/cve/CVE-2026-25679"
},
{
"category": "external",
"summary": "SUSE Bug 1259264 for CVE-2026-25679",
"url": "https://bugzilla.suse.com/1259264"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:go1.26-1.26.1-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.26-1.26.1-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.26-1.26.1-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.26-1.26.1-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.26-doc-1.26.1-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.26-doc-1.26.1-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.26-doc-1.26.1-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.26-doc-1.26.1-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.26-libstd-1.26.1-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.26-libstd-1.26.1-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.26-race-1.26.1-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.26-race-1.26.1-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.26-race-1.26.1-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.26-race-1.26.1-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:go1.26-1.26.1-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.26-1.26.1-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.26-1.26.1-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.26-1.26.1-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.26-doc-1.26.1-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.26-doc-1.26.1-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.26-doc-1.26.1-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.26-doc-1.26.1-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.26-libstd-1.26.1-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.26-libstd-1.26.1-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.26-race-1.26.1-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.26-race-1.26.1-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.26-race-1.26.1-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.26-race-1.26.1-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T09:09:25Z",
"details": "moderate"
}
],
"title": "CVE-2026-25679"
},
{
"cve": "CVE-2026-27137",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-27137"
}
],
"notes": [
{
"category": "general",
"text": "When verifying a certificate chain which contains a certificate containing multiple email address constraints which share common local portions but different domain portions, these constraints will not be properly applied, and only the last constraint will be considered.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:go1.26-1.26.1-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.26-1.26.1-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.26-1.26.1-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.26-1.26.1-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.26-doc-1.26.1-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.26-doc-1.26.1-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.26-doc-1.26.1-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.26-doc-1.26.1-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.26-libstd-1.26.1-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.26-libstd-1.26.1-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.26-race-1.26.1-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.26-race-1.26.1-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.26-race-1.26.1-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.26-race-1.26.1-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-27137",
"url": "https://www.suse.com/security/cve/CVE-2026-27137"
},
{
"category": "external",
"summary": "SUSE Bug 1259266 for CVE-2026-27137",
"url": "https://bugzilla.suse.com/1259266"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:go1.26-1.26.1-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.26-1.26.1-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.26-1.26.1-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.26-1.26.1-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.26-doc-1.26.1-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.26-doc-1.26.1-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.26-doc-1.26.1-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.26-doc-1.26.1-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.26-libstd-1.26.1-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.26-libstd-1.26.1-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.26-race-1.26.1-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.26-race-1.26.1-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.26-race-1.26.1-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.26-race-1.26.1-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:go1.26-1.26.1-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.26-1.26.1-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.26-1.26.1-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.26-1.26.1-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.26-doc-1.26.1-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.26-doc-1.26.1-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.26-doc-1.26.1-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.26-doc-1.26.1-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.26-libstd-1.26.1-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.26-libstd-1.26.1-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.26-race-1.26.1-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.26-race-1.26.1-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.26-race-1.26.1-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.26-race-1.26.1-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T09:09:25Z",
"details": "moderate"
}
],
"title": "CVE-2026-27137"
},
{
"cve": "CVE-2026-27138",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-27138"
}
],
"notes": [
{
"category": "general",
"text": "Certificate verification can panic when a certificate in the chain has an empty DNS name and another certificate in the chain has excluded name constraints. This can crash programs that are either directly verifying X.509 certificate chains, or those that use TLS.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:go1.26-1.26.1-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.26-1.26.1-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.26-1.26.1-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.26-1.26.1-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.26-doc-1.26.1-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.26-doc-1.26.1-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.26-doc-1.26.1-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.26-doc-1.26.1-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.26-libstd-1.26.1-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.26-libstd-1.26.1-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.26-race-1.26.1-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.26-race-1.26.1-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.26-race-1.26.1-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.26-race-1.26.1-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-27138",
"url": "https://www.suse.com/security/cve/CVE-2026-27138"
},
{
"category": "external",
"summary": "SUSE Bug 1259267 for CVE-2026-27138",
"url": "https://bugzilla.suse.com/1259267"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:go1.26-1.26.1-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.26-1.26.1-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.26-1.26.1-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.26-1.26.1-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.26-doc-1.26.1-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.26-doc-1.26.1-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.26-doc-1.26.1-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.26-doc-1.26.1-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.26-libstd-1.26.1-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.26-libstd-1.26.1-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.26-race-1.26.1-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.26-race-1.26.1-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.26-race-1.26.1-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.26-race-1.26.1-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:go1.26-1.26.1-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.26-1.26.1-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.26-1.26.1-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.26-1.26.1-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.26-doc-1.26.1-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.26-doc-1.26.1-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.26-doc-1.26.1-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.26-doc-1.26.1-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.26-libstd-1.26.1-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.26-libstd-1.26.1-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.26-race-1.26.1-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.26-race-1.26.1-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.26-race-1.26.1-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.26-race-1.26.1-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T09:09:25Z",
"details": "important"
}
],
"title": "CVE-2026-27138"
},
{
"cve": "CVE-2026-27139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-27139"
}
],
"notes": [
{
"category": "general",
"text": "On Unix platforms, when listing the contents of a directory using File.ReadDir or File.Readdir the returned FileInfo could reference a file outside of the Root in which the File was opened. The impact of this escape is limited to reading metadata provided by lstat from arbitrary locations on the filesystem without permitting reading or writing files outside the root.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:go1.26-1.26.1-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.26-1.26.1-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.26-1.26.1-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.26-1.26.1-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.26-doc-1.26.1-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.26-doc-1.26.1-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.26-doc-1.26.1-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.26-doc-1.26.1-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.26-libstd-1.26.1-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.26-libstd-1.26.1-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.26-race-1.26.1-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.26-race-1.26.1-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.26-race-1.26.1-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.26-race-1.26.1-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-27139",
"url": "https://www.suse.com/security/cve/CVE-2026-27139"
},
{
"category": "external",
"summary": "SUSE Bug 1259268 for CVE-2026-27139",
"url": "https://bugzilla.suse.com/1259268"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:go1.26-1.26.1-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.26-1.26.1-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.26-1.26.1-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.26-1.26.1-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.26-doc-1.26.1-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.26-doc-1.26.1-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.26-doc-1.26.1-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.26-doc-1.26.1-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.26-libstd-1.26.1-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.26-libstd-1.26.1-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.26-race-1.26.1-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.26-race-1.26.1-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.26-race-1.26.1-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.26-race-1.26.1-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:go1.26-1.26.1-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.26-1.26.1-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.26-1.26.1-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.26-1.26.1-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.26-doc-1.26.1-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.26-doc-1.26.1-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.26-doc-1.26.1-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.26-doc-1.26.1-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.26-libstd-1.26.1-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.26-libstd-1.26.1-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.26-race-1.26.1-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.26-race-1.26.1-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.26-race-1.26.1-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.26-race-1.26.1-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T09:09:25Z",
"details": "moderate"
}
],
"title": "CVE-2026-27139"
},
{
"cve": "CVE-2026-27142",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-27142"
}
],
"notes": [
{
"category": "general",
"text": "Actions which insert URLs into the content attribute of HTML meta tags are not escaped. This can allow XSS if the meta tag also has an http-equiv attribute with the value \"refresh\". A new GODEBUG setting has been added, htmlmetacontenturlescape, which can be used to disable escaping URLs in actions in the meta content attribute which follow \"url=\" by setting htmlmetacontenturlescape=0.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:go1.26-1.26.1-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.26-1.26.1-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.26-1.26.1-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.26-1.26.1-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.26-doc-1.26.1-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.26-doc-1.26.1-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.26-doc-1.26.1-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.26-doc-1.26.1-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.26-libstd-1.26.1-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.26-libstd-1.26.1-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.26-race-1.26.1-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.26-race-1.26.1-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.26-race-1.26.1-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.26-race-1.26.1-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-27142",
"url": "https://www.suse.com/security/cve/CVE-2026-27142"
},
{
"category": "external",
"summary": "SUSE Bug 1259265 for CVE-2026-27142",
"url": "https://bugzilla.suse.com/1259265"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:go1.26-1.26.1-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.26-1.26.1-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.26-1.26.1-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.26-1.26.1-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.26-doc-1.26.1-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.26-doc-1.26.1-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.26-doc-1.26.1-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.26-doc-1.26.1-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.26-libstd-1.26.1-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.26-libstd-1.26.1-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.26-race-1.26.1-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.26-race-1.26.1-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.26-race-1.26.1-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.26-race-1.26.1-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:go1.26-1.26.1-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.26-1.26.1-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.26-1.26.1-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.26-1.26.1-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.26-doc-1.26.1-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.26-doc-1.26.1-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.26-doc-1.26.1-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.26-doc-1.26.1-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.26-libstd-1.26.1-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.26-libstd-1.26.1-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.26-race-1.26.1-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.26-race-1.26.1-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.26-race-1.26.1-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.26-race-1.26.1-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-11T09:09:25Z",
"details": "moderate"
}
],
"title": "CVE-2026-27142"
}
]
}
OPENSUSE-SU-2026:10299-1
Vulnerability from csaf_opensuse - Published: 2026-03-07 00:00 - Updated: 2026-03-07 00:00| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "go1.26-1.26.1-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the go1.26-1.26.1-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2026-10299",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2026_10299-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-25679 page",
"url": "https://www.suse.com/security/cve/CVE-2026-25679/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-27137 page",
"url": "https://www.suse.com/security/cve/CVE-2026-27137/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-27138 page",
"url": "https://www.suse.com/security/cve/CVE-2026-27138/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-27139 page",
"url": "https://www.suse.com/security/cve/CVE-2026-27139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-27142 page",
"url": "https://www.suse.com/security/cve/CVE-2026-27142/"
}
],
"title": "go1.26-1.26.1-1.1 on GA media",
"tracking": {
"current_release_date": "2026-03-07T00:00:00Z",
"generator": {
"date": "2026-03-07T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2026:10299-1",
"initial_release_date": "2026-03-07T00:00:00Z",
"revision_history": [
{
"date": "2026-03-07T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "go1.26-1.26.1-1.1.aarch64",
"product": {
"name": "go1.26-1.26.1-1.1.aarch64",
"product_id": "go1.26-1.26.1-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.26-doc-1.26.1-1.1.aarch64",
"product": {
"name": "go1.26-doc-1.26.1-1.1.aarch64",
"product_id": "go1.26-doc-1.26.1-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.26-libstd-1.26.1-1.1.aarch64",
"product": {
"name": "go1.26-libstd-1.26.1-1.1.aarch64",
"product_id": "go1.26-libstd-1.26.1-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.26-race-1.26.1-1.1.aarch64",
"product": {
"name": "go1.26-race-1.26.1-1.1.aarch64",
"product_id": "go1.26-race-1.26.1-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.26-1.26.1-1.1.ppc64le",
"product": {
"name": "go1.26-1.26.1-1.1.ppc64le",
"product_id": "go1.26-1.26.1-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.26-doc-1.26.1-1.1.ppc64le",
"product": {
"name": "go1.26-doc-1.26.1-1.1.ppc64le",
"product_id": "go1.26-doc-1.26.1-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.26-libstd-1.26.1-1.1.ppc64le",
"product": {
"name": "go1.26-libstd-1.26.1-1.1.ppc64le",
"product_id": "go1.26-libstd-1.26.1-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.26-race-1.26.1-1.1.ppc64le",
"product": {
"name": "go1.26-race-1.26.1-1.1.ppc64le",
"product_id": "go1.26-race-1.26.1-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.26-1.26.1-1.1.s390x",
"product": {
"name": "go1.26-1.26.1-1.1.s390x",
"product_id": "go1.26-1.26.1-1.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.26-doc-1.26.1-1.1.s390x",
"product": {
"name": "go1.26-doc-1.26.1-1.1.s390x",
"product_id": "go1.26-doc-1.26.1-1.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.26-libstd-1.26.1-1.1.s390x",
"product": {
"name": "go1.26-libstd-1.26.1-1.1.s390x",
"product_id": "go1.26-libstd-1.26.1-1.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.26-race-1.26.1-1.1.s390x",
"product": {
"name": "go1.26-race-1.26.1-1.1.s390x",
"product_id": "go1.26-race-1.26.1-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.26-1.26.1-1.1.x86_64",
"product": {
"name": "go1.26-1.26.1-1.1.x86_64",
"product_id": "go1.26-1.26.1-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.26-doc-1.26.1-1.1.x86_64",
"product": {
"name": "go1.26-doc-1.26.1-1.1.x86_64",
"product_id": "go1.26-doc-1.26.1-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.26-libstd-1.26.1-1.1.x86_64",
"product": {
"name": "go1.26-libstd-1.26.1-1.1.x86_64",
"product_id": "go1.26-libstd-1.26.1-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.26-race-1.26.1-1.1.x86_64",
"product": {
"name": "go1.26-race-1.26.1-1.1.x86_64",
"product_id": "go1.26-race-1.26.1-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.1-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.26-1.26.1-1.1.aarch64"
},
"product_reference": "go1.26-1.26.1-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.1-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.26-1.26.1-1.1.ppc64le"
},
"product_reference": "go1.26-1.26.1-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.1-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.26-1.26.1-1.1.s390x"
},
"product_reference": "go1.26-1.26.1-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.1-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.26-1.26.1-1.1.x86_64"
},
"product_reference": "go1.26-1.26.1-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.1-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.26-doc-1.26.1-1.1.aarch64"
},
"product_reference": "go1.26-doc-1.26.1-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.1-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.26-doc-1.26.1-1.1.ppc64le"
},
"product_reference": "go1.26-doc-1.26.1-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.1-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.26-doc-1.26.1-1.1.s390x"
},
"product_reference": "go1.26-doc-1.26.1-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.1-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.26-doc-1.26.1-1.1.x86_64"
},
"product_reference": "go1.26-doc-1.26.1-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-libstd-1.26.1-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.26-libstd-1.26.1-1.1.aarch64"
},
"product_reference": "go1.26-libstd-1.26.1-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-libstd-1.26.1-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.26-libstd-1.26.1-1.1.ppc64le"
},
"product_reference": "go1.26-libstd-1.26.1-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-libstd-1.26.1-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.26-libstd-1.26.1-1.1.s390x"
},
"product_reference": "go1.26-libstd-1.26.1-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-libstd-1.26.1-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.26-libstd-1.26.1-1.1.x86_64"
},
"product_reference": "go1.26-libstd-1.26.1-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.1-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.26-race-1.26.1-1.1.aarch64"
},
"product_reference": "go1.26-race-1.26.1-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.1-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.26-race-1.26.1-1.1.ppc64le"
},
"product_reference": "go1.26-race-1.26.1-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.1-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.26-race-1.26.1-1.1.s390x"
},
"product_reference": "go1.26-race-1.26.1-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.1-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.26-race-1.26.1-1.1.x86_64"
},
"product_reference": "go1.26-race-1.26.1-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-25679",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-25679"
}
],
"notes": [
{
"category": "general",
"text": "url.Parse insufficiently validated the host/authority component and accepted some invalid URLs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:go1.26-1.26.1-1.1.aarch64",
"openSUSE Tumbleweed:go1.26-1.26.1-1.1.ppc64le",
"openSUSE Tumbleweed:go1.26-1.26.1-1.1.s390x",
"openSUSE Tumbleweed:go1.26-1.26.1-1.1.x86_64",
"openSUSE Tumbleweed:go1.26-doc-1.26.1-1.1.aarch64",
"openSUSE Tumbleweed:go1.26-doc-1.26.1-1.1.ppc64le",
"openSUSE Tumbleweed:go1.26-doc-1.26.1-1.1.s390x",
"openSUSE Tumbleweed:go1.26-doc-1.26.1-1.1.x86_64",
"openSUSE Tumbleweed:go1.26-libstd-1.26.1-1.1.aarch64",
"openSUSE Tumbleweed:go1.26-libstd-1.26.1-1.1.ppc64le",
"openSUSE Tumbleweed:go1.26-libstd-1.26.1-1.1.s390x",
"openSUSE Tumbleweed:go1.26-libstd-1.26.1-1.1.x86_64",
"openSUSE Tumbleweed:go1.26-race-1.26.1-1.1.aarch64",
"openSUSE Tumbleweed:go1.26-race-1.26.1-1.1.ppc64le",
"openSUSE Tumbleweed:go1.26-race-1.26.1-1.1.s390x",
"openSUSE Tumbleweed:go1.26-race-1.26.1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-25679",
"url": "https://www.suse.com/security/cve/CVE-2026-25679"
},
{
"category": "external",
"summary": "SUSE Bug 1259264 for CVE-2026-25679",
"url": "https://bugzilla.suse.com/1259264"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:go1.26-1.26.1-1.1.aarch64",
"openSUSE Tumbleweed:go1.26-1.26.1-1.1.ppc64le",
"openSUSE Tumbleweed:go1.26-1.26.1-1.1.s390x",
"openSUSE Tumbleweed:go1.26-1.26.1-1.1.x86_64",
"openSUSE Tumbleweed:go1.26-doc-1.26.1-1.1.aarch64",
"openSUSE Tumbleweed:go1.26-doc-1.26.1-1.1.ppc64le",
"openSUSE Tumbleweed:go1.26-doc-1.26.1-1.1.s390x",
"openSUSE Tumbleweed:go1.26-doc-1.26.1-1.1.x86_64",
"openSUSE Tumbleweed:go1.26-libstd-1.26.1-1.1.aarch64",
"openSUSE Tumbleweed:go1.26-libstd-1.26.1-1.1.ppc64le",
"openSUSE Tumbleweed:go1.26-libstd-1.26.1-1.1.s390x",
"openSUSE Tumbleweed:go1.26-libstd-1.26.1-1.1.x86_64",
"openSUSE Tumbleweed:go1.26-race-1.26.1-1.1.aarch64",
"openSUSE Tumbleweed:go1.26-race-1.26.1-1.1.ppc64le",
"openSUSE Tumbleweed:go1.26-race-1.26.1-1.1.s390x",
"openSUSE Tumbleweed:go1.26-race-1.26.1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:go1.26-1.26.1-1.1.aarch64",
"openSUSE Tumbleweed:go1.26-1.26.1-1.1.ppc64le",
"openSUSE Tumbleweed:go1.26-1.26.1-1.1.s390x",
"openSUSE Tumbleweed:go1.26-1.26.1-1.1.x86_64",
"openSUSE Tumbleweed:go1.26-doc-1.26.1-1.1.aarch64",
"openSUSE Tumbleweed:go1.26-doc-1.26.1-1.1.ppc64le",
"openSUSE Tumbleweed:go1.26-doc-1.26.1-1.1.s390x",
"openSUSE Tumbleweed:go1.26-doc-1.26.1-1.1.x86_64",
"openSUSE Tumbleweed:go1.26-libstd-1.26.1-1.1.aarch64",
"openSUSE Tumbleweed:go1.26-libstd-1.26.1-1.1.ppc64le",
"openSUSE Tumbleweed:go1.26-libstd-1.26.1-1.1.s390x",
"openSUSE Tumbleweed:go1.26-libstd-1.26.1-1.1.x86_64",
"openSUSE Tumbleweed:go1.26-race-1.26.1-1.1.aarch64",
"openSUSE Tumbleweed:go1.26-race-1.26.1-1.1.ppc64le",
"openSUSE Tumbleweed:go1.26-race-1.26.1-1.1.s390x",
"openSUSE Tumbleweed:go1.26-race-1.26.1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-25679"
},
{
"cve": "CVE-2026-27137",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-27137"
}
],
"notes": [
{
"category": "general",
"text": "When verifying a certificate chain which contains a certificate containing multiple email address constraints which share common local portions but different domain portions, these constraints will not be properly applied, and only the last constraint will be considered.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:go1.26-1.26.1-1.1.aarch64",
"openSUSE Tumbleweed:go1.26-1.26.1-1.1.ppc64le",
"openSUSE Tumbleweed:go1.26-1.26.1-1.1.s390x",
"openSUSE Tumbleweed:go1.26-1.26.1-1.1.x86_64",
"openSUSE Tumbleweed:go1.26-doc-1.26.1-1.1.aarch64",
"openSUSE Tumbleweed:go1.26-doc-1.26.1-1.1.ppc64le",
"openSUSE Tumbleweed:go1.26-doc-1.26.1-1.1.s390x",
"openSUSE Tumbleweed:go1.26-doc-1.26.1-1.1.x86_64",
"openSUSE Tumbleweed:go1.26-libstd-1.26.1-1.1.aarch64",
"openSUSE Tumbleweed:go1.26-libstd-1.26.1-1.1.ppc64le",
"openSUSE Tumbleweed:go1.26-libstd-1.26.1-1.1.s390x",
"openSUSE Tumbleweed:go1.26-libstd-1.26.1-1.1.x86_64",
"openSUSE Tumbleweed:go1.26-race-1.26.1-1.1.aarch64",
"openSUSE Tumbleweed:go1.26-race-1.26.1-1.1.ppc64le",
"openSUSE Tumbleweed:go1.26-race-1.26.1-1.1.s390x",
"openSUSE Tumbleweed:go1.26-race-1.26.1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-27137",
"url": "https://www.suse.com/security/cve/CVE-2026-27137"
},
{
"category": "external",
"summary": "SUSE Bug 1259266 for CVE-2026-27137",
"url": "https://bugzilla.suse.com/1259266"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:go1.26-1.26.1-1.1.aarch64",
"openSUSE Tumbleweed:go1.26-1.26.1-1.1.ppc64le",
"openSUSE Tumbleweed:go1.26-1.26.1-1.1.s390x",
"openSUSE Tumbleweed:go1.26-1.26.1-1.1.x86_64",
"openSUSE Tumbleweed:go1.26-doc-1.26.1-1.1.aarch64",
"openSUSE Tumbleweed:go1.26-doc-1.26.1-1.1.ppc64le",
"openSUSE Tumbleweed:go1.26-doc-1.26.1-1.1.s390x",
"openSUSE Tumbleweed:go1.26-doc-1.26.1-1.1.x86_64",
"openSUSE Tumbleweed:go1.26-libstd-1.26.1-1.1.aarch64",
"openSUSE Tumbleweed:go1.26-libstd-1.26.1-1.1.ppc64le",
"openSUSE Tumbleweed:go1.26-libstd-1.26.1-1.1.s390x",
"openSUSE Tumbleweed:go1.26-libstd-1.26.1-1.1.x86_64",
"openSUSE Tumbleweed:go1.26-race-1.26.1-1.1.aarch64",
"openSUSE Tumbleweed:go1.26-race-1.26.1-1.1.ppc64le",
"openSUSE Tumbleweed:go1.26-race-1.26.1-1.1.s390x",
"openSUSE Tumbleweed:go1.26-race-1.26.1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:go1.26-1.26.1-1.1.aarch64",
"openSUSE Tumbleweed:go1.26-1.26.1-1.1.ppc64le",
"openSUSE Tumbleweed:go1.26-1.26.1-1.1.s390x",
"openSUSE Tumbleweed:go1.26-1.26.1-1.1.x86_64",
"openSUSE Tumbleweed:go1.26-doc-1.26.1-1.1.aarch64",
"openSUSE Tumbleweed:go1.26-doc-1.26.1-1.1.ppc64le",
"openSUSE Tumbleweed:go1.26-doc-1.26.1-1.1.s390x",
"openSUSE Tumbleweed:go1.26-doc-1.26.1-1.1.x86_64",
"openSUSE Tumbleweed:go1.26-libstd-1.26.1-1.1.aarch64",
"openSUSE Tumbleweed:go1.26-libstd-1.26.1-1.1.ppc64le",
"openSUSE Tumbleweed:go1.26-libstd-1.26.1-1.1.s390x",
"openSUSE Tumbleweed:go1.26-libstd-1.26.1-1.1.x86_64",
"openSUSE Tumbleweed:go1.26-race-1.26.1-1.1.aarch64",
"openSUSE Tumbleweed:go1.26-race-1.26.1-1.1.ppc64le",
"openSUSE Tumbleweed:go1.26-race-1.26.1-1.1.s390x",
"openSUSE Tumbleweed:go1.26-race-1.26.1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-27137"
},
{
"cve": "CVE-2026-27138",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-27138"
}
],
"notes": [
{
"category": "general",
"text": "Certificate verification can panic when a certificate in the chain has an empty DNS name and another certificate in the chain has excluded name constraints. This can crash programs that are either directly verifying X.509 certificate chains, or those that use TLS.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:go1.26-1.26.1-1.1.aarch64",
"openSUSE Tumbleweed:go1.26-1.26.1-1.1.ppc64le",
"openSUSE Tumbleweed:go1.26-1.26.1-1.1.s390x",
"openSUSE Tumbleweed:go1.26-1.26.1-1.1.x86_64",
"openSUSE Tumbleweed:go1.26-doc-1.26.1-1.1.aarch64",
"openSUSE Tumbleweed:go1.26-doc-1.26.1-1.1.ppc64le",
"openSUSE Tumbleweed:go1.26-doc-1.26.1-1.1.s390x",
"openSUSE Tumbleweed:go1.26-doc-1.26.1-1.1.x86_64",
"openSUSE Tumbleweed:go1.26-libstd-1.26.1-1.1.aarch64",
"openSUSE Tumbleweed:go1.26-libstd-1.26.1-1.1.ppc64le",
"openSUSE Tumbleweed:go1.26-libstd-1.26.1-1.1.s390x",
"openSUSE Tumbleweed:go1.26-libstd-1.26.1-1.1.x86_64",
"openSUSE Tumbleweed:go1.26-race-1.26.1-1.1.aarch64",
"openSUSE Tumbleweed:go1.26-race-1.26.1-1.1.ppc64le",
"openSUSE Tumbleweed:go1.26-race-1.26.1-1.1.s390x",
"openSUSE Tumbleweed:go1.26-race-1.26.1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-27138",
"url": "https://www.suse.com/security/cve/CVE-2026-27138"
},
{
"category": "external",
"summary": "SUSE Bug 1259267 for CVE-2026-27138",
"url": "https://bugzilla.suse.com/1259267"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:go1.26-1.26.1-1.1.aarch64",
"openSUSE Tumbleweed:go1.26-1.26.1-1.1.ppc64le",
"openSUSE Tumbleweed:go1.26-1.26.1-1.1.s390x",
"openSUSE Tumbleweed:go1.26-1.26.1-1.1.x86_64",
"openSUSE Tumbleweed:go1.26-doc-1.26.1-1.1.aarch64",
"openSUSE Tumbleweed:go1.26-doc-1.26.1-1.1.ppc64le",
"openSUSE Tumbleweed:go1.26-doc-1.26.1-1.1.s390x",
"openSUSE Tumbleweed:go1.26-doc-1.26.1-1.1.x86_64",
"openSUSE Tumbleweed:go1.26-libstd-1.26.1-1.1.aarch64",
"openSUSE Tumbleweed:go1.26-libstd-1.26.1-1.1.ppc64le",
"openSUSE Tumbleweed:go1.26-libstd-1.26.1-1.1.s390x",
"openSUSE Tumbleweed:go1.26-libstd-1.26.1-1.1.x86_64",
"openSUSE Tumbleweed:go1.26-race-1.26.1-1.1.aarch64",
"openSUSE Tumbleweed:go1.26-race-1.26.1-1.1.ppc64le",
"openSUSE Tumbleweed:go1.26-race-1.26.1-1.1.s390x",
"openSUSE Tumbleweed:go1.26-race-1.26.1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:go1.26-1.26.1-1.1.aarch64",
"openSUSE Tumbleweed:go1.26-1.26.1-1.1.ppc64le",
"openSUSE Tumbleweed:go1.26-1.26.1-1.1.s390x",
"openSUSE Tumbleweed:go1.26-1.26.1-1.1.x86_64",
"openSUSE Tumbleweed:go1.26-doc-1.26.1-1.1.aarch64",
"openSUSE Tumbleweed:go1.26-doc-1.26.1-1.1.ppc64le",
"openSUSE Tumbleweed:go1.26-doc-1.26.1-1.1.s390x",
"openSUSE Tumbleweed:go1.26-doc-1.26.1-1.1.x86_64",
"openSUSE Tumbleweed:go1.26-libstd-1.26.1-1.1.aarch64",
"openSUSE Tumbleweed:go1.26-libstd-1.26.1-1.1.ppc64le",
"openSUSE Tumbleweed:go1.26-libstd-1.26.1-1.1.s390x",
"openSUSE Tumbleweed:go1.26-libstd-1.26.1-1.1.x86_64",
"openSUSE Tumbleweed:go1.26-race-1.26.1-1.1.aarch64",
"openSUSE Tumbleweed:go1.26-race-1.26.1-1.1.ppc64le",
"openSUSE Tumbleweed:go1.26-race-1.26.1-1.1.s390x",
"openSUSE Tumbleweed:go1.26-race-1.26.1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2026-27138"
},
{
"cve": "CVE-2026-27139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-27139"
}
],
"notes": [
{
"category": "general",
"text": "On Unix platforms, when listing the contents of a directory using File.ReadDir or File.Readdir the returned FileInfo could reference a file outside of the Root in which the File was opened. The impact of this escape is limited to reading metadata provided by lstat from arbitrary locations on the filesystem without permitting reading or writing files outside the root.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:go1.26-1.26.1-1.1.aarch64",
"openSUSE Tumbleweed:go1.26-1.26.1-1.1.ppc64le",
"openSUSE Tumbleweed:go1.26-1.26.1-1.1.s390x",
"openSUSE Tumbleweed:go1.26-1.26.1-1.1.x86_64",
"openSUSE Tumbleweed:go1.26-doc-1.26.1-1.1.aarch64",
"openSUSE Tumbleweed:go1.26-doc-1.26.1-1.1.ppc64le",
"openSUSE Tumbleweed:go1.26-doc-1.26.1-1.1.s390x",
"openSUSE Tumbleweed:go1.26-doc-1.26.1-1.1.x86_64",
"openSUSE Tumbleweed:go1.26-libstd-1.26.1-1.1.aarch64",
"openSUSE Tumbleweed:go1.26-libstd-1.26.1-1.1.ppc64le",
"openSUSE Tumbleweed:go1.26-libstd-1.26.1-1.1.s390x",
"openSUSE Tumbleweed:go1.26-libstd-1.26.1-1.1.x86_64",
"openSUSE Tumbleweed:go1.26-race-1.26.1-1.1.aarch64",
"openSUSE Tumbleweed:go1.26-race-1.26.1-1.1.ppc64le",
"openSUSE Tumbleweed:go1.26-race-1.26.1-1.1.s390x",
"openSUSE Tumbleweed:go1.26-race-1.26.1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-27139",
"url": "https://www.suse.com/security/cve/CVE-2026-27139"
},
{
"category": "external",
"summary": "SUSE Bug 1259268 for CVE-2026-27139",
"url": "https://bugzilla.suse.com/1259268"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:go1.26-1.26.1-1.1.aarch64",
"openSUSE Tumbleweed:go1.26-1.26.1-1.1.ppc64le",
"openSUSE Tumbleweed:go1.26-1.26.1-1.1.s390x",
"openSUSE Tumbleweed:go1.26-1.26.1-1.1.x86_64",
"openSUSE Tumbleweed:go1.26-doc-1.26.1-1.1.aarch64",
"openSUSE Tumbleweed:go1.26-doc-1.26.1-1.1.ppc64le",
"openSUSE Tumbleweed:go1.26-doc-1.26.1-1.1.s390x",
"openSUSE Tumbleweed:go1.26-doc-1.26.1-1.1.x86_64",
"openSUSE Tumbleweed:go1.26-libstd-1.26.1-1.1.aarch64",
"openSUSE Tumbleweed:go1.26-libstd-1.26.1-1.1.ppc64le",
"openSUSE Tumbleweed:go1.26-libstd-1.26.1-1.1.s390x",
"openSUSE Tumbleweed:go1.26-libstd-1.26.1-1.1.x86_64",
"openSUSE Tumbleweed:go1.26-race-1.26.1-1.1.aarch64",
"openSUSE Tumbleweed:go1.26-race-1.26.1-1.1.ppc64le",
"openSUSE Tumbleweed:go1.26-race-1.26.1-1.1.s390x",
"openSUSE Tumbleweed:go1.26-race-1.26.1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:go1.26-1.26.1-1.1.aarch64",
"openSUSE Tumbleweed:go1.26-1.26.1-1.1.ppc64le",
"openSUSE Tumbleweed:go1.26-1.26.1-1.1.s390x",
"openSUSE Tumbleweed:go1.26-1.26.1-1.1.x86_64",
"openSUSE Tumbleweed:go1.26-doc-1.26.1-1.1.aarch64",
"openSUSE Tumbleweed:go1.26-doc-1.26.1-1.1.ppc64le",
"openSUSE Tumbleweed:go1.26-doc-1.26.1-1.1.s390x",
"openSUSE Tumbleweed:go1.26-doc-1.26.1-1.1.x86_64",
"openSUSE Tumbleweed:go1.26-libstd-1.26.1-1.1.aarch64",
"openSUSE Tumbleweed:go1.26-libstd-1.26.1-1.1.ppc64le",
"openSUSE Tumbleweed:go1.26-libstd-1.26.1-1.1.s390x",
"openSUSE Tumbleweed:go1.26-libstd-1.26.1-1.1.x86_64",
"openSUSE Tumbleweed:go1.26-race-1.26.1-1.1.aarch64",
"openSUSE Tumbleweed:go1.26-race-1.26.1-1.1.ppc64le",
"openSUSE Tumbleweed:go1.26-race-1.26.1-1.1.s390x",
"openSUSE Tumbleweed:go1.26-race-1.26.1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-27139"
},
{
"cve": "CVE-2026-27142",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-27142"
}
],
"notes": [
{
"category": "general",
"text": "Actions which insert URLs into the content attribute of HTML meta tags are not escaped. This can allow XSS if the meta tag also has an http-equiv attribute with the value \"refresh\". A new GODEBUG setting has been added, htmlmetacontenturlescape, which can be used to disable escaping URLs in actions in the meta content attribute which follow \"url=\" by setting htmlmetacontenturlescape=0.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:go1.26-1.26.1-1.1.aarch64",
"openSUSE Tumbleweed:go1.26-1.26.1-1.1.ppc64le",
"openSUSE Tumbleweed:go1.26-1.26.1-1.1.s390x",
"openSUSE Tumbleweed:go1.26-1.26.1-1.1.x86_64",
"openSUSE Tumbleweed:go1.26-doc-1.26.1-1.1.aarch64",
"openSUSE Tumbleweed:go1.26-doc-1.26.1-1.1.ppc64le",
"openSUSE Tumbleweed:go1.26-doc-1.26.1-1.1.s390x",
"openSUSE Tumbleweed:go1.26-doc-1.26.1-1.1.x86_64",
"openSUSE Tumbleweed:go1.26-libstd-1.26.1-1.1.aarch64",
"openSUSE Tumbleweed:go1.26-libstd-1.26.1-1.1.ppc64le",
"openSUSE Tumbleweed:go1.26-libstd-1.26.1-1.1.s390x",
"openSUSE Tumbleweed:go1.26-libstd-1.26.1-1.1.x86_64",
"openSUSE Tumbleweed:go1.26-race-1.26.1-1.1.aarch64",
"openSUSE Tumbleweed:go1.26-race-1.26.1-1.1.ppc64le",
"openSUSE Tumbleweed:go1.26-race-1.26.1-1.1.s390x",
"openSUSE Tumbleweed:go1.26-race-1.26.1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-27142",
"url": "https://www.suse.com/security/cve/CVE-2026-27142"
},
{
"category": "external",
"summary": "SUSE Bug 1259265 for CVE-2026-27142",
"url": "https://bugzilla.suse.com/1259265"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:go1.26-1.26.1-1.1.aarch64",
"openSUSE Tumbleweed:go1.26-1.26.1-1.1.ppc64le",
"openSUSE Tumbleweed:go1.26-1.26.1-1.1.s390x",
"openSUSE Tumbleweed:go1.26-1.26.1-1.1.x86_64",
"openSUSE Tumbleweed:go1.26-doc-1.26.1-1.1.aarch64",
"openSUSE Tumbleweed:go1.26-doc-1.26.1-1.1.ppc64le",
"openSUSE Tumbleweed:go1.26-doc-1.26.1-1.1.s390x",
"openSUSE Tumbleweed:go1.26-doc-1.26.1-1.1.x86_64",
"openSUSE Tumbleweed:go1.26-libstd-1.26.1-1.1.aarch64",
"openSUSE Tumbleweed:go1.26-libstd-1.26.1-1.1.ppc64le",
"openSUSE Tumbleweed:go1.26-libstd-1.26.1-1.1.s390x",
"openSUSE Tumbleweed:go1.26-libstd-1.26.1-1.1.x86_64",
"openSUSE Tumbleweed:go1.26-race-1.26.1-1.1.aarch64",
"openSUSE Tumbleweed:go1.26-race-1.26.1-1.1.ppc64le",
"openSUSE Tumbleweed:go1.26-race-1.26.1-1.1.s390x",
"openSUSE Tumbleweed:go1.26-race-1.26.1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:go1.26-1.26.1-1.1.aarch64",
"openSUSE Tumbleweed:go1.26-1.26.1-1.1.ppc64le",
"openSUSE Tumbleweed:go1.26-1.26.1-1.1.s390x",
"openSUSE Tumbleweed:go1.26-1.26.1-1.1.x86_64",
"openSUSE Tumbleweed:go1.26-doc-1.26.1-1.1.aarch64",
"openSUSE Tumbleweed:go1.26-doc-1.26.1-1.1.ppc64le",
"openSUSE Tumbleweed:go1.26-doc-1.26.1-1.1.s390x",
"openSUSE Tumbleweed:go1.26-doc-1.26.1-1.1.x86_64",
"openSUSE Tumbleweed:go1.26-libstd-1.26.1-1.1.aarch64",
"openSUSE Tumbleweed:go1.26-libstd-1.26.1-1.1.ppc64le",
"openSUSE Tumbleweed:go1.26-libstd-1.26.1-1.1.s390x",
"openSUSE Tumbleweed:go1.26-libstd-1.26.1-1.1.x86_64",
"openSUSE Tumbleweed:go1.26-race-1.26.1-1.1.aarch64",
"openSUSE Tumbleweed:go1.26-race-1.26.1-1.1.ppc64le",
"openSUSE Tumbleweed:go1.26-race-1.26.1-1.1.s390x",
"openSUSE Tumbleweed:go1.26-race-1.26.1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-27142"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.