Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2026-33810 (GCVE-0-2026-33810)
Vulnerability from cvelistv5 – Published: 2026-04-08 01:06 – Updated: 2026-04-20 17:23- CWE-295 - Improper Certificate Validation
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Go standard library | crypto/x509 |
Affected:
1.26.0-0 , < 1.26.2
(semver)
|
{
"containers": {
"adp": [
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2026-33810",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-04-13T17:48:57.879958Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-04-13T18:20:37.411Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2026-04-20T17:23:21.823Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2026/04/19/4"
},
{
"url": "http://www.openwall.com/lists/oss-security/2026/04/20/1"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"collectionURL": "https://pkg.go.dev",
"defaultStatus": "unaffected",
"packageName": "crypto/x509",
"product": "crypto/x509",
"programRoutines": [
{
"name": "newDNSConstraints"
},
{
"name": "dnsConstraints.query"
},
{
"name": "Certificate.Verify"
}
],
"vendor": "Go standard library",
"versions": [
{
"lessThan": "1.26.2",
"status": "affected",
"version": "1.26.0-0",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Riyas from Saintgits College of Engineering"
},
{
"lang": "en",
"value": "k1rnt"
},
{
"lang": "en",
"value": "@1seal"
}
],
"descriptions": [
{
"lang": "en",
"value": "When verifying a certificate chain containing excluded DNS constraints, these constraints are not correctly applied to wildcard DNS SANs which use a different case than the constraint. This only affects validation of otherwise trusted certificate chains, issued by a root CA in the VerifyOptions.Roots CertPool, or in the system certificate pool."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "CWE-295: Improper Certificate Validation",
"lang": "en"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-04-08T01:06:56.546Z",
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc",
"shortName": "Go"
},
"references": [
{
"url": "https://go.dev/cl/763763"
},
{
"url": "https://go.dev/issue/78332"
},
{
"url": "https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU"
},
{
"url": "https://pkg.go.dev/vuln/GO-2026-4866"
}
],
"title": "Case-sensitive excludedSubtrees name constraints cause Auth Bypass in crypto/x509"
}
},
"cveMetadata": {
"assignerOrgId": "1bb62c36-49e3-4200-9d77-64a1400537cc",
"assignerShortName": "Go",
"cveId": "CVE-2026-33810",
"datePublished": "2026-04-08T01:06:56.546Z",
"dateReserved": "2026-03-23T20:35:32.814Z",
"dateUpdated": "2026-04-20T17:23:21.823Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2026-33810",
"date": "2026-05-04",
"epss": "0.00011",
"percentile": "0.01401"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2026-33810\",\"sourceIdentifier\":\"security@golang.org\",\"published\":\"2026-04-08T02:16:03.950\",\"lastModified\":\"2026-04-20T18:16:26.813\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"When verifying a certificate chain containing excluded DNS constraints, these constraints are not correctly applied to wildcard DNS SANs which use a different case than the constraint. This only affects validation of otherwise trusted certificate chains, issued by a root CA in the VerifyOptions.Roots CertPool, or in the system certificate pool.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N\",\"baseScore\":8.2,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":4.2},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-295\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.26.0\",\"versionEndExcluding\":\"1.26.2\",\"matchCriteriaId\":\"39FE9BAF-55E9-43AA-B14E-239E7EF1D65D\"}]}]}],\"references\":[{\"url\":\"https://go.dev/cl/763763\",\"source\":\"security@golang.org\",\"tags\":[\"Patch\"]},{\"url\":\"https://go.dev/issue/78332\",\"source\":\"security@golang.org\",\"tags\":[\"Issue Tracking\"]},{\"url\":\"https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU\",\"source\":\"security@golang.org\",\"tags\":[\"Mailing List\",\"Release Notes\"]},{\"url\":\"https://pkg.go.dev/vuln/GO-2026-4866\",\"source\":\"security@golang.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2026/04/19/4\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2026/04/20/1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"http://www.openwall.com/lists/oss-security/2026/04/19/4\"}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2026-04-19T22:08:53.727Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.5, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2026-33810\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2026-04-13T17:48:57.879958Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2026-04-13T17:48:52.707Z\"}}], \"cna\": {\"title\": \"Case-sensitive excludedSubtrees name constraints cause Auth Bypass in crypto/x509\", \"credits\": [{\"lang\": \"en\", \"value\": \"Riyas from Saintgits College of Engineering\"}, {\"lang\": \"en\", \"value\": \"k1rnt\"}, {\"lang\": \"en\", \"value\": \"@1seal\"}], \"affected\": [{\"vendor\": \"Go standard library\", \"product\": \"crypto/x509\", \"versions\": [{\"status\": \"affected\", \"version\": \"1.26.0-0\", \"lessThan\": \"1.26.2\", \"versionType\": \"semver\"}], \"packageName\": \"crypto/x509\", \"collectionURL\": \"https://pkg.go.dev\", \"defaultStatus\": \"unaffected\", \"programRoutines\": [{\"name\": \"newDNSConstraints\"}, {\"name\": \"dnsConstraints.query\"}, {\"name\": \"Certificate.Verify\"}]}], \"references\": [{\"url\": \"https://go.dev/cl/763763\"}, {\"url\": \"https://go.dev/issue/78332\"}, {\"url\": \"https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU\"}, {\"url\": \"https://pkg.go.dev/vuln/GO-2026-4866\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"When verifying a certificate chain containing excluded DNS constraints, these constraints are not correctly applied to wildcard DNS SANs which use a different case than the constraint. This only affects validation of otherwise trusted certificate chains, issued by a root CA in the VerifyOptions.Roots CertPool, or in the system certificate pool.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"description\": \"CWE-295: Improper Certificate Validation\"}]}], \"providerMetadata\": {\"orgId\": \"1bb62c36-49e3-4200-9d77-64a1400537cc\", \"shortName\": \"Go\", \"dateUpdated\": \"2026-04-08T01:06:56.546Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2026-33810\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-04-19T22:08:53.727Z\", \"dateReserved\": \"2026-03-23T20:35:32.814Z\", \"assignerOrgId\": \"1bb62c36-49e3-4200-9d77-64a1400537cc\", \"datePublished\": \"2026-04-08T01:06:56.546Z\", \"assignerShortName\": \"Go\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
RHSA-2026:9385
Vulnerability from csaf_redhat - Published: 2026-04-21 15:08 - Updated: 2026-05-04 17:08A flaw was found in the crypto/tls component. This vulnerability occurs during Transport Layer Security (TLS) session resumption when certificate authority (CA) settings are modified between the initial and resumed handshakes. An attacker could exploit this to bypass certificate validation, allowing a client or server to establish a connection that should have been rejected. This could lead to an authentication bypass under specific conditions.
A flaw was found in the `github.com/antchfx/xpath` component. A remote attacker could exploit this vulnerability by submitting crafted Boolean XPath expressions that evaluate to true. This can cause an infinite loop in the `logicalQuery.Select` function, leading to 100% CPU utilization and a Denial of Service (DoS) condition for the affected system.
A flaw was found in lodash. The fix for CVE-2021-23337 added validation for the variable option in _.template but did not apply the same validation to options.imports key names. Both paths flow into the same Function() constructor sink. Additionally, _.template uses assignInWith to merge imports, which enumerates inherited properties via for..in. If Object.prototype has been polluted by any other vector, the polluted keys are copied into the imports object and passed to Function().
A flaw was found in path-to-regexp. A remote attacker could exploit this vulnerability by providing specially crafted input that generates a regular expression with multiple sequential optional groups. This leads to an exponential growth in the generated regular expression, causing a Denial of Service (DoS) due to excessive resource consumption.
The Go standard library function net/url.Parse insufficiently validated the host/authority component and accepted some invalid URLs by effectively treating garbage before an IP-literal as ignorable. The function should have rejected this as invalid.
A certificate validation flaw has been discovered in the golang crypto/x509 module. When verifying a certificate chain which contains a certificate containing multiple email address constraints which share common local portions but different domain portions, these constraints will not be properly applied, and only the last constraint will be considered.
A flaw was found in the Go standard library packages `crypto/x509` and `crypto/tls`. During the process of building a certificate chain, an attacker can provide a large number of intermediate certificates. This excessive input is not properly limited, leading to an uncontrolled amount of work being performed. This can result in a denial of service (DoS) condition, making the affected system or application unavailable to legitimate users.
A flaw was found in the internal/syscall/unix package in the Go standard library. If the target of the `Root.Chmod` function is replaced with a symbolic link during execution, specifically after `Root.Chmod` checks the target but before acting, the `chmod` operation will be performed on the file the symbolic link points to. This issue can bypass directory restrictions and lead to unauthorized permission changes on the filesystem.
A flaw was found in github.com/buger/jsonparser. The Delete function, when processing malformed JSON input, fails to properly validate offsets. This vulnerability can lead to a negative slice index and a runtime panic, allowing a remote attacker to cause a denial of service (DoS) by providing specially crafted JSON data.
A flaw was found in gRPC-Go, the Go language implementation of gRPC. This vulnerability, an authorization bypass, is caused by improper input validation of the HTTP/2 `:path` pseudo-header. A remote attacker can exploit this by sending raw HTTP/2 frames with a malformed `:path` that omits the mandatory leading slash. This allows the attacker to bypass defined security policies, potentially leading to unauthorized access to services or information disclosure.
A flaw was found in the `crypto/x509` package within Go (golang). When verifying a certificate chain, excluded DNS (Domain Name System) constraints are not correctly applied to wildcard DNS Subject Alternative Names (SANs) if the case of the SAN differs from the constraint. This oversight could allow an attacker to bypass certificate validation, potentially leading to the acceptance of a malicious certificate that should have been rejected. This issue specifically impacts the validation of trusted certificate chains.
A flaw was found in Go JOSE, a library for handling JSON Web Encryption (JWE) objects. A remote attacker could exploit this vulnerability by providing a specially crafted JWE object. When decrypting such an object, if a key wrapping algorithm is specified but the encrypted key field is empty, the application can crash. This leads to a denial of service (DoS), making the affected service unavailable to legitimate users.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift distributed tracing platform (Tempo) 3.9.2 has been released",
"title": "Topic"
},
{
"category": "general",
"text": "This release of the Red Hat OpenShift distributed tracing platform (Tempo) provides security improvements and bug fixes.\n\n\nBreaking changes:\n\n* None.\n\n\nDeprecations:\n\n* None.\n\n\nTechnology Preview features:\n\n* None.\n\n\nEnhancements:\n\n* None.\n\n\nBug fixes:\n\n* gRPC-Go authorization bypass vulnerability fix: Previously, gRPC-Go was vulnerable to an authorization bypass attack. This issue occurred because the HTTP/2 :path pseudo-header was not properly validated. Remote attackers could send raw HTTP/2 frames with a malformed :path that omitted the mandatory leading slash to bypass defined security policies. With this update, gRPC-Go properly validates the :path pseudo-header and rejects malformed requests. As a result, attackers can no longer bypass security policies to gain unauthorized access to services or disclose information. For more information, see https://access.redhat.com/security/cve/cve-2026-33186.\n\n* XPath component fix: Previously, the github.com/antchfx/xpath component did not properly handle certain Boolean XPath expressions. A remote attacker could submit a crafted expression that caused an infinite loop, resulting in 100% CPU utilization and a denial-of-service condition. With this update, the XPath component correctly processes Boolean expressions that evaluate to true. The system no longer enters an infinite loop when handling these expressions. For more information, see https://access.redhat.com/security/cve/cve-2026-4645.\n\n* Go JOSE denial-of-service vulnerability fix: Previously, the Go JOSE library for handling JSON Web Encryption (JWE) objects was vulnerable to a denial-of-service (DoS) attack. This issue occurred because the application failed when decrypting a specially crafted JWE object that specified a key wrapping algorithm but contained an empty encrypted key field. With this update, Go JOSE properly validates the encrypted key field before decryption. As a result, the application no longer crashes when processing malformed JWE objects, and the service remains available to legitimate users. For more information, see https://access.redhat.com/security/cve/cve-2026-34986.\n\n* Lodash _.template function fix: Previously, the lodash _.template function validated the variable option but did not validate options.imports key names. Both options passed values to the same code execution path. An attacker with the ability to control options.imports key names or pollute Object.prototype could exploit this gap to execute arbitrary code. With this update, lodash validates options.imports key names by using the same rules applied to the variable option. The _.template function rejects invalid key names and prevents code injection through this path. For more information, see https://access.redhat.com/security/cve/cve-2026-4800.\n\n* Go crypto/x509 and crypto/tls packages fix: Previously, the Go standard library crypto/x509 and crypto/tls packages did not limit the number of intermediate certificates processed during certificate chain building. An attacker could provide an excessive number of intermediate certificates, causing the system to perform an uncontrolled amount of work and resulting in a denial-of-service condition. With this update, the packages limit the number of intermediate certificates accepted during certificate chain validation. The system rejects certificate chains that exceed this limit. For more information, see https://access.redhat.com/security/cve/cve-2026-32280.\n\n* Go Root.Chmod function fix: Previously, the Root.Chmod function in the Go standard library internal/syscall/unix package had a race condition between checking and modifying a target file. An attacker could replace the target with a symbolic link after the check but before the operation completed, causing the permission change to apply to the linked file instead. This allowed an attacker to bypass directory restrictions and change permissions on unintended files. With this update, the Root.Chmod function prevents this race condition. The function no longer follows symbolic links that replace the target during execution. For more information, see https://access.redhat.com/security/cve/cve-2026-32282.\n\n* Go crypto/x509 package fix: Previously, the Go crypto/x509 package applied excluded DNS constraints to wildcard Subject Alternative Names (SANs) in a case-sensitive manner. An attacker could bypass certificate validation by using a different case in the wildcard SAN than the excluded DNS constraint specified. This allowed the system to accept a malicious certificate that should have been rejected. With this update, the package applies DNS constraints case-insensitively when validating wildcard SANs. Certificate chain verification correctly rejects certificates that match excluded DNS constraints regardless of case. For more information, see https://access.redhat.com/security/cve/cve-2026-33810.\n\n* Go crypto/tls component fix: Previously, the Go crypto/tls component did not re-validate certificates against updated certificate authority (CA) settings during TLS session resumption. If CA settings changed between the initial handshake and a resumed session, the component used the original CA settings. An attacker could exploit this to bypass certificate validation and establish a connection that should have been rejected. With this update, the component validates certificates against the current CA settings during session resumption. Resumed sessions that no longer meet CA requirements are rejected. For more information, see https://access.redhat.com/security/cve/cve-2025-68121.\n\n* jsonparser Delete function fix: Previously, the Delete function in the github.com/buger/jsonparser component did not validate offsets when processing malformed JSON input. A remote attacker could provide crafted JSON data that caused a runtime panic, resulting in a denial-of-service condition. With this update, the Delete function validates offsets before processing. The function handles malformed JSON input as expected. For more information, see https://access.redhat.com/security/cve/cve-2026-32285.\n\n* path-to-regexp component fix: Previously, the path-to-regexp component did not limit the complexity of generated regular expressions. A remote attacker could provide input containing multiple sequential optional groups, causing exponential growth in the generated expression and excessive resource consumption. This resulted in a denial-of-service condition. With this update, the component limits regular expression complexity. Input patterns with sequential optional groups no longer cause excessive resource consumption. For more information, see https://access.redhat.com/security/cve/cve-2026-4926.\n\n* Go net/url.Parse function fix: Previously, the Go net/url.Parse function did not properly validate the host component of URLs containing IP-literals. The function ignored invalid characters preceding IP-literals and accepted URLs that should have been rejected. With this update, the function validates the entire host component. URLs with invalid characters before IP-literals are rejected as malformed. For more information, see https://access.redhat.com/security/cve/cve-2026-25679.\n\n* Go crypto/x509 module fix: Previously, the Go crypto/x509 module did not apply all email address constraints when validating certificates. If a certificate contained multiple email constraints with the same local portion but different domain portions, the module only enforced the last constraint and ignored the others. With this update, the module applies all email address constraints during certificate chain validation. Certificates are validated against every specified email constraint. For more information, see https://access.redhat.com/security/cve/cve-2026-27137.\n\n\nKnown issues:\n\n* Gateway fails to forward OTLP HTTP traffic when receiver TLS is enabled. When Tempo Monolithic is configured with `multitenancy.enabled: true` and `ingestion.otlp.http.tls.enabled: true`, the gateway forwards OTLP HTTP traffic to the Tempo receiver using plain HTTP instead of HTTPS. As a consequence, the connection fails with a `connection reset by peer` error because the receiver expects TLS connections. OTLP gRPC ingestion through the gateway is not affected. Jira issue: https://issues.redhat.com/browse/TRACING-5973.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:9385",
"url": "https://access.redhat.com/errata/RHSA-2026:9385"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-68121",
"url": "https://access.redhat.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-25679",
"url": "https://access.redhat.com/security/cve/CVE-2026-25679"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-27137",
"url": "https://access.redhat.com/security/cve/CVE-2026-27137"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-32280",
"url": "https://access.redhat.com/security/cve/CVE-2026-32280"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-32282",
"url": "https://access.redhat.com/security/cve/CVE-2026-32282"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-32285",
"url": "https://access.redhat.com/security/cve/CVE-2026-32285"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-33186",
"url": "https://access.redhat.com/security/cve/CVE-2026-33186"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-33810",
"url": "https://access.redhat.com/security/cve/CVE-2026-33810"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-34986",
"url": "https://access.redhat.com/security/cve/CVE-2026-34986"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-4645",
"url": "https://access.redhat.com/security/cve/CVE-2026-4645"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-4800",
"url": "https://access.redhat.com/security/cve/CVE-2026-4800"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-4926",
"url": "https://access.redhat.com/security/cve/CVE-2026-4926"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/openshift_container_platform/latest/html/distributed_tracing/distributed-tracing-platform-tempo",
"url": "https://docs.redhat.com/en/documentation/openshift_container_platform/latest/html/distributed_tracing/distributed-tracing-platform-tempo"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_9385.json"
}
],
"title": "Red Hat Security Advisory: Red Hat OpenShift distributed tracing platform (Tempo) 3.9.2 release",
"tracking": {
"current_release_date": "2026-05-04T17:08:04+00:00",
"generator": {
"date": "2026-05-04T17:08:04+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.9"
}
},
"id": "RHSA-2026:9385",
"initial_release_date": "2026-04-21T15:08:38+00:00",
"revision_history": [
{
"date": "2026-04-21T15:08:38+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-04-21T15:08:49+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-05-04T17:08:04+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift distributed tracing 3.9.2",
"product": {
"name": "Red Hat OpenShift distributed tracing 3.9.2",
"product_id": "Red Hat OpenShift distributed tracing 3.9.2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift_distributed_tracing:3.9::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift distributed tracing"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"product_id": "registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-operator-bundle@sha256%3Ad180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1776674955"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"product_id": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-gateway-rhel9@sha256%3A61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1776435643"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"product_id": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-jaeger-query-rhel9@sha256%3A0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1776435608"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"product_id": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-gateway-opa-rhel9@sha256%3A034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1776435631"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"product_id": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-rhel9-operator@sha256%3Aa5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1776435565"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"product_id": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-query-rhel9@sha256%3A1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1776435613"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64",
"product_id": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-rhel9@sha256%3A9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1776435680"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"product_id": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-gateway-rhel9@sha256%3Ac939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1776435643"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"product_id": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-jaeger-query-rhel9@sha256%3A81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1776435608"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"product_id": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-gateway-opa-rhel9@sha256%3Aa66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1776435631"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"product_id": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-rhel9-operator@sha256%3A0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1776435565"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"product_id": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-query-rhel9@sha256%3A3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1776435613"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"product_id": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-rhel9@sha256%3A53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1776435680"
}
}
}
],
"category": "architecture",
"name": "arm64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"product_id": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/tempo-gateway-rhel9@sha256%3A9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1776435643"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"product_id": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/tempo-jaeger-query-rhel9@sha256%3A15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1776435608"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"product_id": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/tempo-gateway-opa-rhel9@sha256%3A9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1776435631"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"product_id": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/tempo-rhel9-operator@sha256%3A1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1776435565"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"product_id": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/tempo-query-rhel9@sha256%3A820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1776435613"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"product_id": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/tempo-rhel9@sha256%3A55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1776435680"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"product_id": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"product_identification_helper": {
"purl": "pkg:oci/tempo-gateway-rhel9@sha256%3A59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1776435643"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"product_id": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"product_identification_helper": {
"purl": "pkg:oci/tempo-jaeger-query-rhel9@sha256%3A63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1776435608"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"product_id": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"product_identification_helper": {
"purl": "pkg:oci/tempo-gateway-opa-rhel9@sha256%3Ab68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1776435631"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x",
"product_id": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x",
"product_identification_helper": {
"purl": "pkg:oci/tempo-rhel9-operator@sha256%3Ac7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1776435565"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"product_id": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"product_identification_helper": {
"purl": "pkg:oci/tempo-query-rhel9@sha256%3Aee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1776435613"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"product_id": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"product_identification_helper": {
"purl": "pkg:oci/tempo-rhel9@sha256%3A0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1776435680"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64 as a component of Red Hat OpenShift distributed tracing 3.9.2",
"product_id": "Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le as a component of Red Hat OpenShift distributed tracing 3.9.2",
"product_id": "Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64 as a component of Red Hat OpenShift distributed tracing 3.9.2",
"product_id": "Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x as a component of Red Hat OpenShift distributed tracing 3.9.2",
"product_id": "Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x as a component of Red Hat OpenShift distributed tracing 3.9.2",
"product_id": "Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64 as a component of Red Hat OpenShift distributed tracing 3.9.2",
"product_id": "Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le as a component of Red Hat OpenShift distributed tracing 3.9.2",
"product_id": "Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64 as a component of Red Hat OpenShift distributed tracing 3.9.2",
"product_id": "Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64 as a component of Red Hat OpenShift distributed tracing 3.9.2",
"product_id": "Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le as a component of Red Hat OpenShift distributed tracing 3.9.2",
"product_id": "Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x as a component of Red Hat OpenShift distributed tracing 3.9.2",
"product_id": "Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64 as a component of Red Hat OpenShift distributed tracing 3.9.2",
"product_id": "Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64 as a component of Red Hat OpenShift distributed tracing 3.9.2",
"product_id": "Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64 as a component of Red Hat OpenShift distributed tracing 3.9.2",
"product_id": "Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64 as a component of Red Hat OpenShift distributed tracing 3.9.2",
"product_id": "Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le as a component of Red Hat OpenShift distributed tracing 3.9.2",
"product_id": "Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x as a component of Red Hat OpenShift distributed tracing 3.9.2",
"product_id": "Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64 as a component of Red Hat OpenShift distributed tracing 3.9.2",
"product_id": "Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le as a component of Red Hat OpenShift distributed tracing 3.9.2",
"product_id": "Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64 as a component of Red Hat OpenShift distributed tracing 3.9.2",
"product_id": "Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x as a component of Red Hat OpenShift distributed tracing 3.9.2",
"product_id": "Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x as a component of Red Hat OpenShift distributed tracing 3.9.2",
"product_id": "Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64 as a component of Red Hat OpenShift distributed tracing 3.9.2",
"product_id": "Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le as a component of Red Hat OpenShift distributed tracing 3.9.2",
"product_id": "Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64 as a component of Red Hat OpenShift distributed tracing 3.9.2",
"product_id": "Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-68121",
"discovery_date": "2026-02-05T18:01:30.086058+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2437111"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the crypto/tls component. This vulnerability occurs during Transport Layer Security (TLS) session resumption when certificate authority (CA) settings are modified between the initial and resumed handshakes. An attacker could exploit this to bypass certificate validation, allowing a client or server to establish a connection that should have been rejected. This could lead to an authentication bypass under specific conditions.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/tls: crypto/tls: Incorrect certificate validation during TLS session resumption",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This is a moderate flaw because it only occurs under specific conditions, such as TLS session resumption with runtime changes to certificate authority settings. Exploitation is not straightforward and requires a controlled setup. The impact is limited to certificate validation within the same component and does not affect system availability.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
],
"known_not_affected": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "RHBZ#2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"category": "external",
"summary": "https://go.dev/cl/737700",
"url": "https://go.dev/cl/737700"
},
{
"category": "external",
"summary": "https://go.dev/issue/77217",
"url": "https://go.dev/issue/77217"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk",
"url": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4337",
"url": "https://pkg.go.dev/vuln/GO-2026-4337"
}
],
"release_date": "2026-02-05T17:48:44.141000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-21T15:08:38+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/latest/html/operators/administrator-tasks#olm-upgrading-operators",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:9385"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "crypto/tls: crypto/tls: Incorrect certificate validation during TLS session resumption"
},
{
"cve": "CVE-2026-4645",
"discovery_date": "2026-03-23T06:02:52.120840+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x"
]
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the `github.com/antchfx/xpath` component. A remote attacker could exploit this vulnerability by submitting crafted Boolean XPath expressions that evaluate to true. This can cause an infinite loop in the `logicalQuery.Select` function, leading to 100% CPU utilization and a Denial of Service (DoS) condition for the affected system.",
"title": "Vulnerability description"
},
{
"category": "other",
"text": "A denial of service vulnerability was discovered in `github.com/antchfx/xpath`, with Important severity. Systems processing untrusted XPath expressions are vulnerable to an infinite loop, leading to 100% CPU utilization which would impact normal operations of the system.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
],
"known_not_affected": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-4645"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-4645",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-4645"
}
],
"release_date": "2026-03-17T20:58:59+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-21T15:08:38+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/latest/html/operators/administrator-tasks#olm-upgrading-operators",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:9385"
},
{
"category": "workaround",
"details": "To mitigate this issue, restrict the processing of untrusted or unvalidated XPath expressions by applications which utilize the `github.com/antchfx/xpath` component. Implement input validation and sanitization for all XPath expressions originating from external or untrusted sources. If possible, configure applications to only process XPath expressions from trusted sources or disable features that allow arbitrary XPath expression evaluation.",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "github.com/antchfx/xpath: xpath: Denial of Service via crafted Boolean XPath expressions"
},
{
"cve": "CVE-2026-4800",
"cwe": {
"id": "CWE-94",
"name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
},
"discovery_date": "2026-03-31T20:01:21.918257+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2453496"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in lodash. The fix for CVE-2021-23337 added validation for the variable option in _.template but did not apply the same validation to options.imports key names. Both paths flow into the same Function() constructor sink. Additionally, _.template uses assignInWith to merge imports, which enumerates inherited properties via for..in. If Object.prototype has been polluted by any other vector, the polluted keys are copied into the imports object and passed to Function().",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "lodash: lodash: Arbitrary code execution via untrusted input in template imports",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "In the context of Red Hat Enterprise Linux, the grafana and grafana-pcp packages execute the affected JavaScript entirely client-side within the user\u0027s browser. Consequently, the attack surface is strictly restricted to the local browser environment.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64"
],
"known_not_affected": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-4800"
},
{
"category": "external",
"summary": "RHBZ#2453496",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453496"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-4800",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-4800"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-4800",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4800"
},
{
"category": "external",
"summary": "https://cna.openjsf.org/security-advisories.html",
"url": "https://cna.openjsf.org/security-advisories.html"
},
{
"category": "external",
"summary": "https://github.com/advisories/GHSA-35jh-r3h4-6jhm",
"url": "https://github.com/advisories/GHSA-35jh-r3h4-6jhm"
},
{
"category": "external",
"summary": "https://github.com/lodash/lodash/commit/3469357cff396a26c363f8c1b5a91dde28ba4b1c",
"url": "https://github.com/lodash/lodash/commit/3469357cff396a26c363f8c1b5a91dde28ba4b1c"
}
],
"release_date": "2026-03-31T19:25:55.987000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-21T15:08:38+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/latest/html/operators/administrator-tasks#olm-upgrading-operators",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:9385"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "lodash: lodash: Arbitrary code execution via untrusted input in template imports"
},
{
"cve": "CVE-2026-4926",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"discovery_date": "2026-03-26T20:03:28.427630+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2451867"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in path-to-regexp. A remote attacker could exploit this vulnerability by providing specially crafted input that generates a regular expression with multiple sequential optional groups. This leads to an exponential growth in the generated regular expression, causing a Denial of Service (DoS) due to excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "path-to-regexp: path-to-regexp: Denial of Service via crafted regular expressions",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This is an Important flaw in `path-to-regexp` that can lead to a Denial of Service. The vulnerability occurs when specially crafted input containing multiple sequential optional groups is used to generate regular expressions, causing exponential resource consumption.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64"
],
"known_not_affected": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-4926"
},
{
"category": "external",
"summary": "RHBZ#2451867",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2451867"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-4926",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-4926"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-4926",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4926"
},
{
"category": "external",
"summary": "https://cna.openjsf.org/security-advisories.html",
"url": "https://cna.openjsf.org/security-advisories.html"
}
],
"release_date": "2026-03-26T18:59:38+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-21T15:08:38+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/latest/html/operators/administrator-tasks#olm-upgrading-operators",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:9385"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, limit the use of multiple sequential optional groups in route patterns within applications that use `path-to-regexp`. Additionally, avoid directly passing user-controlled input as route patterns to prevent the generation of maliciously crafted regular expressions.",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "path-to-regexp: path-to-regexp: Denial of Service via crafted regular expressions"
},
{
"cve": "CVE-2026-25679",
"cwe": {
"id": "CWE-1286",
"name": "Improper Validation of Syntactic Correctness of Input"
},
"discovery_date": "2026-03-06T22:02:11.567841+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2445356"
}
],
"notes": [
{
"category": "description",
"text": "The Go standard library function net/url.Parse insufficiently validated the host/authority component and accepted some invalid URLs by effectively treating garbage before an IP-literal as ignorable. The function should have rejected this as invalid.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "net/url: Incorrect parsing of IPv6 host literals in net/url",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
],
"known_not_affected": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-25679"
},
{
"category": "external",
"summary": "RHBZ#2445356",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2445356"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-25679",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25679"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-25679",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25679"
},
{
"category": "external",
"summary": "https://go.dev/cl/752180",
"url": "https://go.dev/cl/752180"
},
{
"category": "external",
"summary": "https://go.dev/issue/77578",
"url": "https://go.dev/issue/77578"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk",
"url": "https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4601",
"url": "https://pkg.go.dev/vuln/GO-2026-4601"
}
],
"release_date": "2026-03-06T21:28:14.211000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-21T15:08:38+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/latest/html/operators/administrator-tasks#olm-upgrading-operators",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:9385"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "net/url: Incorrect parsing of IPv6 host literals in net/url"
},
{
"cve": "CVE-2026-27137",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"discovery_date": "2026-03-06T22:01:38.859733+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2445345"
}
],
"notes": [
{
"category": "description",
"text": "A certificate validation flaw has been discovered in the golang crypto/x509 module. When verifying a certificate chain which contains a certificate containing multiple email address constraints which share common local portions but different domain portions, these constraints will not be properly applied, and only the last constraint will be considered.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: Incorrect enforcement of email constraints in crypto/x509",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
],
"known_not_affected": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-27137"
},
{
"category": "external",
"summary": "RHBZ#2445345",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2445345"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-27137",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27137"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-27137",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27137"
},
{
"category": "external",
"summary": "https://go.dev/cl/752182",
"url": "https://go.dev/cl/752182"
},
{
"category": "external",
"summary": "https://go.dev/issue/77952",
"url": "https://go.dev/issue/77952"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk",
"url": "https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4599",
"url": "https://pkg.go.dev/vuln/GO-2026-4599"
}
],
"release_date": "2026-03-06T21:28:13.748000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-21T15:08:38+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/latest/html/operators/administrator-tasks#olm-upgrading-operators",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:9385"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: Incorrect enforcement of email constraints in crypto/x509"
},
{
"cve": "CVE-2026-32280",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-04-08T02:01:19.572351+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2456339"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Go standard library packages `crypto/x509` and `crypto/tls`. During the process of building a certificate chain, an attacker can provide a large number of intermediate certificates. This excessive input is not properly limited, leading to an uncontrolled amount of work being performed. This can result in a denial of service (DoS) condition, making the affected system or application unavailable to legitimate users.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: crypto/tls: golang: Go: Denial of Service vulnerability in certificate chain building",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
],
"known_not_affected": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-32280"
},
{
"category": "external",
"summary": "RHBZ#2456339",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2456339"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-32280",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32280"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-32280",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32280"
},
{
"category": "external",
"summary": "https://go.dev/cl/758320",
"url": "https://go.dev/cl/758320"
},
{
"category": "external",
"summary": "https://go.dev/issue/78282",
"url": "https://go.dev/issue/78282"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU",
"url": "https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4947",
"url": "https://pkg.go.dev/vuln/GO-2026-4947"
}
],
"release_date": "2026-04-08T01:06:58.595000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-21T15:08:38+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/latest/html/operators/administrator-tasks#olm-upgrading-operators",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:9385"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: crypto/tls: golang: Go: Denial of Service vulnerability in certificate chain building"
},
{
"cve": "CVE-2026-32282",
"cwe": {
"id": "CWE-367",
"name": "Time-of-check Time-of-use (TOCTOU) Race Condition"
},
"discovery_date": "2026-04-08T02:01:12.683211+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2456336"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the internal/syscall/unix package in the Go standard library. If the target of the `Root.Chmod` function is replaced with a symbolic link during execution, specifically after `Root.Chmod` checks the target but before acting, the `chmod` operation will be performed on the file the symbolic link points to. This issue can bypass directory restrictions and lead to unauthorized permission changes on the filesystem.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: internal/syscall/unix: Root.Chmod can follow symlinks out of the root",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this issue, an attacker needs access to the system and the required permissions to create a symbolic link. Additionally, the attacker must swap the target file with a symbolic link in the exact window after the `Root.Chmod` function checks its target but before acting. Due to these conditions, this flaw has been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
],
"known_not_affected": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-32282"
},
{
"category": "external",
"summary": "RHBZ#2456336",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2456336"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-32282",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32282"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-32282",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32282"
},
{
"category": "external",
"summary": "https://go.dev/cl/763761",
"url": "https://go.dev/cl/763761"
},
{
"category": "external",
"summary": "https://go.dev/issue/78293",
"url": "https://go.dev/issue/78293"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU",
"url": "https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4864",
"url": "https://pkg.go.dev/vuln/GO-2026-4864"
}
],
"release_date": "2026-04-08T01:06:55.953000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-21T15:08:38+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/latest/html/operators/administrator-tasks#olm-upgrading-operators",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:9385"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: internal/syscall/unix: Root.Chmod can follow symlinks out of the root"
},
{
"cve": "CVE-2026-32285",
"cwe": {
"id": "CWE-1285",
"name": "Improper Validation of Specified Index, Position, or Offset in Input"
},
"discovery_date": "2026-03-26T20:01:54.925687+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2451846"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in github.com/buger/jsonparser. The Delete function, when processing malformed JSON input, fails to properly validate offsets. This vulnerability can lead to a negative slice index and a runtime panic, allowing a remote attacker to cause a denial of service (DoS) by providing specially crafted JSON data.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "github.com/buger/jsonparser: github.com/buger/jsonparser: Denial of Service via malformed JSON input",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
],
"known_not_affected": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-32285"
},
{
"category": "external",
"summary": "RHBZ#2451846",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2451846"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-32285",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32285"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-32285",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32285"
},
{
"category": "external",
"summary": "https://github.com/buger/jsonparser/issues/275",
"url": "https://github.com/buger/jsonparser/issues/275"
},
{
"category": "external",
"summary": "https://github.com/golang/vulndb/issues/4514",
"url": "https://github.com/golang/vulndb/issues/4514"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4514",
"url": "https://pkg.go.dev/vuln/GO-2026-4514"
}
],
"release_date": "2026-03-26T19:40:51.837000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-21T15:08:38+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/latest/html/operators/administrator-tasks#olm-upgrading-operators",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:9385"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "github.com/buger/jsonparser: github.com/buger/jsonparser: Denial of Service via malformed JSON input"
},
{
"cve": "CVE-2026-33186",
"cwe": {
"id": "CWE-551",
"name": "Incorrect Behavior Order: Authorization Before Parsing and Canonicalization"
},
"discovery_date": "2026-03-20T23:02:27.802640+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2449833"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in gRPC-Go, the Go language implementation of gRPC. This vulnerability, an authorization bypass, is caused by improper input validation of the HTTP/2 `:path` pseudo-header. A remote attacker can exploit this by sending raw HTTP/2 frames with a malformed `:path` that omits the mandatory leading slash. This allows the attacker to bypass defined security policies, potentially leading to unauthorized access to services or information disclosure.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "google.golang.org/grpc/grpc-go: google.golang.org/grpc/authz: gRPC-Go: Authorization bypass due to improper HTTP/2 path validation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
],
"known_not_affected": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-33186"
},
{
"category": "external",
"summary": "RHBZ#2449833",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2449833"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-33186",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33186"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186"
},
{
"category": "external",
"summary": "https://github.com/grpc/grpc-go/security/advisories/GHSA-p77j-4mvh-x3m3",
"url": "https://github.com/grpc/grpc-go/security/advisories/GHSA-p77j-4mvh-x3m3"
}
],
"release_date": "2026-03-20T22:23:32.147000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-21T15:08:38+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/latest/html/operators/administrator-tasks#olm-upgrading-operators",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:9385"
},
{
"category": "workaround",
"details": "To mitigate this issue, implement infrastructure-level normalization to ensure all incoming HTTP/2 `:path` headers are properly formatted with a leading slash before reaching the gRPC-Go server. This can be achieved by configuring a reverse proxy or API gateway to validate and normalize the `:path` header. Ensure that any such intermediary is properly configured and restarted to apply the changes, which may temporarily impact service availability.",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "google.golang.org/grpc/grpc-go: google.golang.org/grpc/authz: gRPC-Go: Authorization bypass due to improper HTTP/2 path validation"
},
{
"cve": "CVE-2026-33810",
"cwe": {
"id": "CWE-1289",
"name": "Improper Validation of Unsafe Equivalence in Input"
},
"discovery_date": "2026-04-08T02:01:09.100830+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2456335"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the `crypto/x509` package within Go (golang). When verifying a certificate chain, excluded DNS (Domain Name System) constraints are not correctly applied to wildcard DNS Subject Alternative Names (SANs) if the case of the SAN differs from the constraint. This oversight could allow an attacker to bypass certificate validation, potentially leading to the acceptance of a malicious certificate that should have been rejected. This issue specifically impacts the validation of trusted certificate chains.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Go crypto/x509: Certificate validation bypass due to incorrect DNS constraint application",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
],
"known_not_affected": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-33810"
},
{
"category": "external",
"summary": "RHBZ#2456335",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2456335"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-33810",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33810"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-33810",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33810"
},
{
"category": "external",
"summary": "https://go.dev/cl/763763",
"url": "https://go.dev/cl/763763"
},
{
"category": "external",
"summary": "https://go.dev/issue/78332",
"url": "https://go.dev/issue/78332"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU",
"url": "https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4866",
"url": "https://pkg.go.dev/vuln/GO-2026-4866"
}
],
"release_date": "2026-04-08T01:06:56.546000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-21T15:08:38+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/latest/html/operators/administrator-tasks#olm-upgrading-operators",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:9385"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Go crypto/x509: Certificate validation bypass due to incorrect DNS constraint application"
},
{
"cve": "CVE-2026-34986",
"cwe": {
"id": "CWE-131",
"name": "Incorrect Calculation of Buffer Size"
},
"discovery_date": "2026-04-06T17:01:34.639203+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2455470"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Go JOSE, a library for handling JSON Web Encryption (JWE) objects. A remote attacker could exploit this vulnerability by providing a specially crafted JWE object. When decrypting such an object, if a key wrapping algorithm is specified but the encrypted key field is empty, the application can crash. This leads to a denial of service (DoS), making the affected service unavailable to legitimate users.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "github.com/go-jose/go-jose/v3: github.com/go-jose/go-jose/v4: Go JOSE: Denial of Service via crafted JSON Web Encryption (JWE) object",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
],
"known_not_affected": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-34986"
},
{
"category": "external",
"summary": "RHBZ#2455470",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2455470"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-34986",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34986"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-34986",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34986"
},
{
"category": "external",
"summary": "https://github.com/go-jose/go-jose/security/advisories/GHSA-78h2-9frx-2jm8",
"url": "https://github.com/go-jose/go-jose/security/advisories/GHSA-78h2-9frx-2jm8"
},
{
"category": "external",
"summary": "https://pkg.go.dev/github.com/go-jose/go-jose/v4#pkg-constants",
"url": "https://pkg.go.dev/github.com/go-jose/go-jose/v4#pkg-constants"
}
],
"release_date": "2026-04-06T16:22:45.353000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-21T15:08:38+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/latest/html/operators/administrator-tasks#olm-upgrading-operators",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:9385"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "github.com/go-jose/go-jose/v3: github.com/go-jose/go-jose/v4: Go JOSE: Denial of Service via crafted JSON Web Encryption (JWE) object"
}
]
}
RHSA-2026:11330
Vulnerability from csaf_redhat - Published: 2026-04-28 07:16 - Updated: 2026-05-04 08:25A flaw was found in gRPC-Go, the Go language implementation of gRPC. This vulnerability, an authorization bypass, is caused by improper input validation of the HTTP/2 `:path` pseudo-header. A remote attacker can exploit this by sending raw HTTP/2 frames with a malformed `:path` that omits the mandatory leading slash. This allows the attacker to bypass defined security policies, potentially leading to unauthorized access to services or information disclosure.
A flaw was found in Tekton Pipelines, specifically in the Tekton Pipelines git resolver. A tenant with permissions to create ResolutionRequests can exploit a path traversal vulnerability via the `pathInRepo` parameter. This allows the tenant to read arbitrary files from the resolver pod's filesystem, leading to information disclosure, including sensitive ServiceAccount tokens. The contents of these files are returned in a base64-encoded format.
A flaw was found in the `crypto/x509` package within Go (golang). When verifying a certificate chain, excluded DNS (Domain Name System) constraints are not correctly applied to wildcard DNS Subject Alternative Names (SANs) if the case of the SAN differs from the constraint. This oversight could allow an attacker to bypass certificate validation, potentially leading to the acceptance of a malicious certificate that should have been rejected. This issue specifically impacts the validation of trusted certificate chains.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Builds 1.6.5",
"title": "Topic"
},
{
"category": "general",
"text": "Releases of Red Hat OpenShift Builds 1.6.5",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:11330",
"url": "https://access.redhat.com/errata/RHSA-2026:11330"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-33186",
"url": "https://access.redhat.com/security/cve/CVE-2026-33186"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-33211",
"url": "https://access.redhat.com/security/cve/CVE-2026-33211"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-33810",
"url": "https://access.redhat.com/security/cve/CVE-2026-33810"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/builds_for_red_hat_openshift/1.6",
"url": "https://docs.redhat.com/en/documentation/builds_for_red_hat_openshift/1.6"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_11330.json"
}
],
"title": "Red Hat Security Advisory: Red Hat OpenShift Builds 1.6.5",
"tracking": {
"current_release_date": "2026-05-04T08:25:20+00:00",
"generator": {
"date": "2026-05-04T08:25:20+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.7"
}
},
"id": "RHSA-2026:11330",
"initial_release_date": "2026-04-28T07:16:04+00:00",
"revision_history": [
{
"date": "2026-04-28T07:16:04+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-04-28T07:16:12+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-05-04T08:25:20+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Builds 1.6.5",
"product": {
"name": "Red Hat OpenShift Builds 1.6.5",
"product_id": "Red Hat OpenShift Builds 1.6.5",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift_builds:1.6::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Builds"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:2c6b079cf3184539f06634afcb35784ac74110c04fec36dfa80c2b0789d9099d_amd64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:2c6b079cf3184539f06634afcb35784ac74110c04fec36dfa80c2b0789d9099d_amd64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:2c6b079cf3184539f06634afcb35784ac74110c04fec36dfa80c2b0789d9099d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-controller-rhel9@sha256%3A2c6b079cf3184539f06634afcb35784ac74110c04fec36dfa80c2b0789d9099d?arch=amd64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776849392"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:64d5bfb3e3a9861b3cefdb49c0f9b286aad11ccb31867092de08e48630694f82_amd64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:64d5bfb3e3a9861b3cefdb49c0f9b286aad11ccb31867092de08e48630694f82_amd64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:64d5bfb3e3a9861b3cefdb49c0f9b286aad11ccb31867092de08e48630694f82_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-git-cloner-rhel9@sha256%3A64d5bfb3e3a9861b3cefdb49c0f9b286aad11ccb31867092de08e48630694f82?arch=amd64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776847748"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:a22a2cca1f48ee743a15c68ca22d1d76943c25b2069e80a4bc1275c8157284db_amd64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:a22a2cca1f48ee743a15c68ca22d1d76943c25b2069e80a4bc1275c8157284db_amd64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:a22a2cca1f48ee743a15c68ca22d1d76943c25b2069e80a4bc1275c8157284db_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-image-bundler-rhel9@sha256%3Aa22a2cca1f48ee743a15c68ca22d1d76943c25b2069e80a4bc1275c8157284db?arch=amd64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776848853"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:549f2d54aaa66f9ab68e08f49e4f0cd95ffbbc93607ef7a112b74b177e57cfd0_amd64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:549f2d54aaa66f9ab68e08f49e4f0cd95ffbbc93607ef7a112b74b177e57cfd0_amd64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:549f2d54aaa66f9ab68e08f49e4f0cd95ffbbc93607ef7a112b74b177e57cfd0_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-image-processing-rhel9@sha256%3A549f2d54aaa66f9ab68e08f49e4f0cd95ffbbc93607ef7a112b74b177e57cfd0?arch=amd64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776846586"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:1c0d155195bfd251b40da10e153c8a738250f14253f337b198476740cb7bd81a_amd64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:1c0d155195bfd251b40da10e153c8a738250f14253f337b198476740cb7bd81a_amd64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:1c0d155195bfd251b40da10e153c8a738250f14253f337b198476740cb7bd81a_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-rhel9-operator@sha256%3A1c0d155195bfd251b40da10e153c8a738250f14253f337b198476740cb7bd81a?arch=amd64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776859898"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:60bfc1aeb95ff74fd2d8bd29700994594c92b93795b63f02fd0d7bb2d3d6fba7_amd64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:60bfc1aeb95ff74fd2d8bd29700994594c92b93795b63f02fd0d7bb2d3d6fba7_amd64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:60bfc1aeb95ff74fd2d8bd29700994594c92b93795b63f02fd0d7bb2d3d6fba7_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-operator-bundle@sha256%3A60bfc1aeb95ff74fd2d8bd29700994594c92b93795b63f02fd0d7bb2d3d6fba7?arch=amd64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776937737"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:f54ab8388a0f593c2426c240c7d50fd7f3f2263e1c88f7726dbbe2ebbed38896_amd64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:f54ab8388a0f593c2426c240c7d50fd7f3f2263e1c88f7726dbbe2ebbed38896_amd64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:f54ab8388a0f593c2426c240c7d50fd7f3f2263e1c88f7726dbbe2ebbed38896_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-shared-resource-rhel9@sha256%3Af54ab8388a0f593c2426c240c7d50fd7f3f2263e1c88f7726dbbe2ebbed38896?arch=amd64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776852121"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:0d629bbf41a55434b40545e12c5f0d95e357b0fd74303feec657918b90321642_amd64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:0d629bbf41a55434b40545e12c5f0d95e357b0fd74303feec657918b90321642_amd64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:0d629bbf41a55434b40545e12c5f0d95e357b0fd74303feec657918b90321642_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-shared-resource-webhook-rhel9@sha256%3A0d629bbf41a55434b40545e12c5f0d95e357b0fd74303feec657918b90321642?arch=amd64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776851845"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:71f49240685245565f35d7d4b6d7d55b442cb61bc7c0f4d25c5529ca9187ae9f_amd64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:71f49240685245565f35d7d4b6d7d55b442cb61bc7c0f4d25c5529ca9187ae9f_amd64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:71f49240685245565f35d7d4b6d7d55b442cb61bc7c0f4d25c5529ca9187ae9f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-waiters-rhel9@sha256%3A71f49240685245565f35d7d4b6d7d55b442cb61bc7c0f4d25c5529ca9187ae9f?arch=amd64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776847666"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:c6491240cf919793d2d0646e7cd505f7c45f18655c600593e06c98324bf0dc71_amd64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:c6491240cf919793d2d0646e7cd505f7c45f18655c600593e06c98324bf0dc71_amd64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:c6491240cf919793d2d0646e7cd505f7c45f18655c600593e06c98324bf0dc71_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-webhook-rhel9@sha256%3Ac6491240cf919793d2d0646e7cd505f7c45f18655c600593e06c98324bf0dc71?arch=amd64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776848251"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:092c9b4af55870d904beac952acf0fd914a2e784472888bb9f2c108548ff4906_arm64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:092c9b4af55870d904beac952acf0fd914a2e784472888bb9f2c108548ff4906_arm64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:092c9b4af55870d904beac952acf0fd914a2e784472888bb9f2c108548ff4906_arm64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-controller-rhel9@sha256%3A092c9b4af55870d904beac952acf0fd914a2e784472888bb9f2c108548ff4906?arch=arm64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776849392"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:31af187e314a843c4c02edd119d5edc2c260baca4d9a4ec2347f80f5511d6d3f_arm64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:31af187e314a843c4c02edd119d5edc2c260baca4d9a4ec2347f80f5511d6d3f_arm64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:31af187e314a843c4c02edd119d5edc2c260baca4d9a4ec2347f80f5511d6d3f_arm64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-git-cloner-rhel9@sha256%3A31af187e314a843c4c02edd119d5edc2c260baca4d9a4ec2347f80f5511d6d3f?arch=arm64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776847748"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:596cfba3fdac5cd9ee725f6b9e0bc640eaf7e933d019d9d57ea840592ec72f23_arm64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:596cfba3fdac5cd9ee725f6b9e0bc640eaf7e933d019d9d57ea840592ec72f23_arm64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:596cfba3fdac5cd9ee725f6b9e0bc640eaf7e933d019d9d57ea840592ec72f23_arm64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-image-bundler-rhel9@sha256%3A596cfba3fdac5cd9ee725f6b9e0bc640eaf7e933d019d9d57ea840592ec72f23?arch=arm64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776848853"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:c95f763b803f53276670cea4fdf289983e472361a00a6d7da0bb56b3e857a935_arm64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:c95f763b803f53276670cea4fdf289983e472361a00a6d7da0bb56b3e857a935_arm64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:c95f763b803f53276670cea4fdf289983e472361a00a6d7da0bb56b3e857a935_arm64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-image-processing-rhel9@sha256%3Ac95f763b803f53276670cea4fdf289983e472361a00a6d7da0bb56b3e857a935?arch=arm64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776846586"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:5d08c7ee6886747dc077faa7f1e4e696b5ad29cc4dcc8fd2c4f3d7a434f47f9b_arm64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:5d08c7ee6886747dc077faa7f1e4e696b5ad29cc4dcc8fd2c4f3d7a434f47f9b_arm64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:5d08c7ee6886747dc077faa7f1e4e696b5ad29cc4dcc8fd2c4f3d7a434f47f9b_arm64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-rhel9-operator@sha256%3A5d08c7ee6886747dc077faa7f1e4e696b5ad29cc4dcc8fd2c4f3d7a434f47f9b?arch=arm64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776859898"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:d6401dc97f1adeafcfb8a34e3c1fe8230cd2ca6bb7c4245ef875a4b3fa35b014_arm64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:d6401dc97f1adeafcfb8a34e3c1fe8230cd2ca6bb7c4245ef875a4b3fa35b014_arm64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:d6401dc97f1adeafcfb8a34e3c1fe8230cd2ca6bb7c4245ef875a4b3fa35b014_arm64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-shared-resource-rhel9@sha256%3Ad6401dc97f1adeafcfb8a34e3c1fe8230cd2ca6bb7c4245ef875a4b3fa35b014?arch=arm64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776852121"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:d69d7290c5e07301e9397df551e97d8d81795ba7c711d95f60bd178fc39f1434_arm64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:d69d7290c5e07301e9397df551e97d8d81795ba7c711d95f60bd178fc39f1434_arm64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:d69d7290c5e07301e9397df551e97d8d81795ba7c711d95f60bd178fc39f1434_arm64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-shared-resource-webhook-rhel9@sha256%3Ad69d7290c5e07301e9397df551e97d8d81795ba7c711d95f60bd178fc39f1434?arch=arm64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776851845"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:c44d2ad3d716e7c753ec538654d25c42d80539071f1d5f81df4a8fd5e76c7a58_arm64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:c44d2ad3d716e7c753ec538654d25c42d80539071f1d5f81df4a8fd5e76c7a58_arm64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:c44d2ad3d716e7c753ec538654d25c42d80539071f1d5f81df4a8fd5e76c7a58_arm64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-waiters-rhel9@sha256%3Ac44d2ad3d716e7c753ec538654d25c42d80539071f1d5f81df4a8fd5e76c7a58?arch=arm64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776847666"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:3b1112d42f42c721287e1da5e5a87b6832889ed532b1acae27caeb64f1bb44f9_arm64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:3b1112d42f42c721287e1da5e5a87b6832889ed532b1acae27caeb64f1bb44f9_arm64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:3b1112d42f42c721287e1da5e5a87b6832889ed532b1acae27caeb64f1bb44f9_arm64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-webhook-rhel9@sha256%3A3b1112d42f42c721287e1da5e5a87b6832889ed532b1acae27caeb64f1bb44f9?arch=arm64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776848251"
}
}
}
],
"category": "architecture",
"name": "arm64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:25a9ca58f1104d83e0e312baf241f3eb048220c22a0065eed70106d9991faea4_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:25a9ca58f1104d83e0e312baf241f3eb048220c22a0065eed70106d9991faea4_ppc64le",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:25a9ca58f1104d83e0e312baf241f3eb048220c22a0065eed70106d9991faea4_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-controller-rhel9@sha256%3A25a9ca58f1104d83e0e312baf241f3eb048220c22a0065eed70106d9991faea4?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776849392"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:355cfa27d099cce3743ffa8432d2070ae3f21a446b560f6c1c5146b7351d116a_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:355cfa27d099cce3743ffa8432d2070ae3f21a446b560f6c1c5146b7351d116a_ppc64le",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:355cfa27d099cce3743ffa8432d2070ae3f21a446b560f6c1c5146b7351d116a_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-git-cloner-rhel9@sha256%3A355cfa27d099cce3743ffa8432d2070ae3f21a446b560f6c1c5146b7351d116a?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776847748"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:3d20f5041cd11c838fc15148f60650ae0824b4c7816eb50152a28693443b0cd0_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:3d20f5041cd11c838fc15148f60650ae0824b4c7816eb50152a28693443b0cd0_ppc64le",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:3d20f5041cd11c838fc15148f60650ae0824b4c7816eb50152a28693443b0cd0_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-image-bundler-rhel9@sha256%3A3d20f5041cd11c838fc15148f60650ae0824b4c7816eb50152a28693443b0cd0?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776848853"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:5664f48403387a9e64370337d3ea5eb30ec27336f6e8f47a3a8a3ba0fe96741c_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:5664f48403387a9e64370337d3ea5eb30ec27336f6e8f47a3a8a3ba0fe96741c_ppc64le",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:5664f48403387a9e64370337d3ea5eb30ec27336f6e8f47a3a8a3ba0fe96741c_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-image-processing-rhel9@sha256%3A5664f48403387a9e64370337d3ea5eb30ec27336f6e8f47a3a8a3ba0fe96741c?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776846586"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:e1cdb58bf2783a9a50346e1690f51b09e175c8ebb737b11332658d85bcb645e9_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:e1cdb58bf2783a9a50346e1690f51b09e175c8ebb737b11332658d85bcb645e9_ppc64le",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:e1cdb58bf2783a9a50346e1690f51b09e175c8ebb737b11332658d85bcb645e9_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-rhel9-operator@sha256%3Ae1cdb58bf2783a9a50346e1690f51b09e175c8ebb737b11332658d85bcb645e9?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776859898"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:c5083edbd43692dc5ef5b0cf14417eea19412c0927ede39a87ade36515cf16f1_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:c5083edbd43692dc5ef5b0cf14417eea19412c0927ede39a87ade36515cf16f1_ppc64le",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:c5083edbd43692dc5ef5b0cf14417eea19412c0927ede39a87ade36515cf16f1_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-shared-resource-rhel9@sha256%3Ac5083edbd43692dc5ef5b0cf14417eea19412c0927ede39a87ade36515cf16f1?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776852121"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:e095cffba13badc4aab65f9920f8e618c9fe4411d6d53d8b160716a31fe2d6e7_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:e095cffba13badc4aab65f9920f8e618c9fe4411d6d53d8b160716a31fe2d6e7_ppc64le",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:e095cffba13badc4aab65f9920f8e618c9fe4411d6d53d8b160716a31fe2d6e7_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-shared-resource-webhook-rhel9@sha256%3Ae095cffba13badc4aab65f9920f8e618c9fe4411d6d53d8b160716a31fe2d6e7?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776851845"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:78775c452a2c5ddb3568b677c2790815fb2a2d6afacbfacccdaf68b79c8fe39c_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:78775c452a2c5ddb3568b677c2790815fb2a2d6afacbfacccdaf68b79c8fe39c_ppc64le",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:78775c452a2c5ddb3568b677c2790815fb2a2d6afacbfacccdaf68b79c8fe39c_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-waiters-rhel9@sha256%3A78775c452a2c5ddb3568b677c2790815fb2a2d6afacbfacccdaf68b79c8fe39c?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776847666"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:b3ac0453a1d16b2a9d1314991cd7642d637c5d9af3e884aabd88e4e9b73c59c6_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:b3ac0453a1d16b2a9d1314991cd7642d637c5d9af3e884aabd88e4e9b73c59c6_ppc64le",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:b3ac0453a1d16b2a9d1314991cd7642d637c5d9af3e884aabd88e4e9b73c59c6_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-webhook-rhel9@sha256%3Ab3ac0453a1d16b2a9d1314991cd7642d637c5d9af3e884aabd88e4e9b73c59c6?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776848251"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:7b579fdc1d1dca3f32c2172eddb899ef3f8ff39d7af5cbed854d48e1d9e27675_s390x",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:7b579fdc1d1dca3f32c2172eddb899ef3f8ff39d7af5cbed854d48e1d9e27675_s390x",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:7b579fdc1d1dca3f32c2172eddb899ef3f8ff39d7af5cbed854d48e1d9e27675_s390x",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-controller-rhel9@sha256%3A7b579fdc1d1dca3f32c2172eddb899ef3f8ff39d7af5cbed854d48e1d9e27675?arch=s390x\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776849392"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:2a33081f6d32826d53821e1aea686e1a6e8cb30fea8e601c00729c06511b98c6_s390x",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:2a33081f6d32826d53821e1aea686e1a6e8cb30fea8e601c00729c06511b98c6_s390x",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:2a33081f6d32826d53821e1aea686e1a6e8cb30fea8e601c00729c06511b98c6_s390x",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-git-cloner-rhel9@sha256%3A2a33081f6d32826d53821e1aea686e1a6e8cb30fea8e601c00729c06511b98c6?arch=s390x\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776847748"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:a9d691eec41e370daff6737ed9d0b8c018b5426ff195b77897fd579846858e39_s390x",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:a9d691eec41e370daff6737ed9d0b8c018b5426ff195b77897fd579846858e39_s390x",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:a9d691eec41e370daff6737ed9d0b8c018b5426ff195b77897fd579846858e39_s390x",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-image-bundler-rhel9@sha256%3Aa9d691eec41e370daff6737ed9d0b8c018b5426ff195b77897fd579846858e39?arch=s390x\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776848853"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:54890d05d56aeee46f051f42959500e00f2c748e9fdb2f1100226d8b4b976a47_s390x",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:54890d05d56aeee46f051f42959500e00f2c748e9fdb2f1100226d8b4b976a47_s390x",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:54890d05d56aeee46f051f42959500e00f2c748e9fdb2f1100226d8b4b976a47_s390x",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-image-processing-rhel9@sha256%3A54890d05d56aeee46f051f42959500e00f2c748e9fdb2f1100226d8b4b976a47?arch=s390x\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776846586"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:26fdde499994a4be0eb277bbbca899061384f20673672ef30ed301d792b3108d_s390x",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:26fdde499994a4be0eb277bbbca899061384f20673672ef30ed301d792b3108d_s390x",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:26fdde499994a4be0eb277bbbca899061384f20673672ef30ed301d792b3108d_s390x",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-rhel9-operator@sha256%3A26fdde499994a4be0eb277bbbca899061384f20673672ef30ed301d792b3108d?arch=s390x\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776859898"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:d56042518051b3e4dbef3da9f13d74fd8e8a6b9ad8520965052f1522247b70ef_s390x",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:d56042518051b3e4dbef3da9f13d74fd8e8a6b9ad8520965052f1522247b70ef_s390x",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:d56042518051b3e4dbef3da9f13d74fd8e8a6b9ad8520965052f1522247b70ef_s390x",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-shared-resource-rhel9@sha256%3Ad56042518051b3e4dbef3da9f13d74fd8e8a6b9ad8520965052f1522247b70ef?arch=s390x\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776852121"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:7d6aecb4a7e98dcabc77c3043e214bec9fa521af9c6a048ece876ba9f294dce8_s390x",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:7d6aecb4a7e98dcabc77c3043e214bec9fa521af9c6a048ece876ba9f294dce8_s390x",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:7d6aecb4a7e98dcabc77c3043e214bec9fa521af9c6a048ece876ba9f294dce8_s390x",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-shared-resource-webhook-rhel9@sha256%3A7d6aecb4a7e98dcabc77c3043e214bec9fa521af9c6a048ece876ba9f294dce8?arch=s390x\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776851845"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:f4752a62de9c94e0f84aaa6cddfeb4a5cbecab6c83147b72b6f05ddef23fe192_s390x",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:f4752a62de9c94e0f84aaa6cddfeb4a5cbecab6c83147b72b6f05ddef23fe192_s390x",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:f4752a62de9c94e0f84aaa6cddfeb4a5cbecab6c83147b72b6f05ddef23fe192_s390x",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-waiters-rhel9@sha256%3Af4752a62de9c94e0f84aaa6cddfeb4a5cbecab6c83147b72b6f05ddef23fe192?arch=s390x\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776847666"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:26f519f9f0e7e41f7f6b12bfd2f968bfb5196f05781493752e17a85d09b0b976_s390x",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:26f519f9f0e7e41f7f6b12bfd2f968bfb5196f05781493752e17a85d09b0b976_s390x",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:26f519f9f0e7e41f7f6b12bfd2f968bfb5196f05781493752e17a85d09b0b976_s390x",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-webhook-rhel9@sha256%3A26f519f9f0e7e41f7f6b12bfd2f968bfb5196f05781493752e17a85d09b0b976?arch=s390x\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776848251"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:092c9b4af55870d904beac952acf0fd914a2e784472888bb9f2c108548ff4906_arm64 as a component of Red Hat OpenShift Builds 1.6.5",
"product_id": "Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:092c9b4af55870d904beac952acf0fd914a2e784472888bb9f2c108548ff4906_arm64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:092c9b4af55870d904beac952acf0fd914a2e784472888bb9f2c108548ff4906_arm64",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.6.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:25a9ca58f1104d83e0e312baf241f3eb048220c22a0065eed70106d9991faea4_ppc64le as a component of Red Hat OpenShift Builds 1.6.5",
"product_id": "Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:25a9ca58f1104d83e0e312baf241f3eb048220c22a0065eed70106d9991faea4_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:25a9ca58f1104d83e0e312baf241f3eb048220c22a0065eed70106d9991faea4_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.6.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:2c6b079cf3184539f06634afcb35784ac74110c04fec36dfa80c2b0789d9099d_amd64 as a component of Red Hat OpenShift Builds 1.6.5",
"product_id": "Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:2c6b079cf3184539f06634afcb35784ac74110c04fec36dfa80c2b0789d9099d_amd64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:2c6b079cf3184539f06634afcb35784ac74110c04fec36dfa80c2b0789d9099d_amd64",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.6.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:7b579fdc1d1dca3f32c2172eddb899ef3f8ff39d7af5cbed854d48e1d9e27675_s390x as a component of Red Hat OpenShift Builds 1.6.5",
"product_id": "Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:7b579fdc1d1dca3f32c2172eddb899ef3f8ff39d7af5cbed854d48e1d9e27675_s390x"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:7b579fdc1d1dca3f32c2172eddb899ef3f8ff39d7af5cbed854d48e1d9e27675_s390x",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.6.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:2a33081f6d32826d53821e1aea686e1a6e8cb30fea8e601c00729c06511b98c6_s390x as a component of Red Hat OpenShift Builds 1.6.5",
"product_id": "Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:2a33081f6d32826d53821e1aea686e1a6e8cb30fea8e601c00729c06511b98c6_s390x"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:2a33081f6d32826d53821e1aea686e1a6e8cb30fea8e601c00729c06511b98c6_s390x",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.6.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:31af187e314a843c4c02edd119d5edc2c260baca4d9a4ec2347f80f5511d6d3f_arm64 as a component of Red Hat OpenShift Builds 1.6.5",
"product_id": "Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:31af187e314a843c4c02edd119d5edc2c260baca4d9a4ec2347f80f5511d6d3f_arm64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:31af187e314a843c4c02edd119d5edc2c260baca4d9a4ec2347f80f5511d6d3f_arm64",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.6.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:355cfa27d099cce3743ffa8432d2070ae3f21a446b560f6c1c5146b7351d116a_ppc64le as a component of Red Hat OpenShift Builds 1.6.5",
"product_id": "Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:355cfa27d099cce3743ffa8432d2070ae3f21a446b560f6c1c5146b7351d116a_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:355cfa27d099cce3743ffa8432d2070ae3f21a446b560f6c1c5146b7351d116a_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.6.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:64d5bfb3e3a9861b3cefdb49c0f9b286aad11ccb31867092de08e48630694f82_amd64 as a component of Red Hat OpenShift Builds 1.6.5",
"product_id": "Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:64d5bfb3e3a9861b3cefdb49c0f9b286aad11ccb31867092de08e48630694f82_amd64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:64d5bfb3e3a9861b3cefdb49c0f9b286aad11ccb31867092de08e48630694f82_amd64",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.6.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:3d20f5041cd11c838fc15148f60650ae0824b4c7816eb50152a28693443b0cd0_ppc64le as a component of Red Hat OpenShift Builds 1.6.5",
"product_id": "Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:3d20f5041cd11c838fc15148f60650ae0824b4c7816eb50152a28693443b0cd0_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:3d20f5041cd11c838fc15148f60650ae0824b4c7816eb50152a28693443b0cd0_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.6.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:596cfba3fdac5cd9ee725f6b9e0bc640eaf7e933d019d9d57ea840592ec72f23_arm64 as a component of Red Hat OpenShift Builds 1.6.5",
"product_id": "Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:596cfba3fdac5cd9ee725f6b9e0bc640eaf7e933d019d9d57ea840592ec72f23_arm64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:596cfba3fdac5cd9ee725f6b9e0bc640eaf7e933d019d9d57ea840592ec72f23_arm64",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.6.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:a22a2cca1f48ee743a15c68ca22d1d76943c25b2069e80a4bc1275c8157284db_amd64 as a component of Red Hat OpenShift Builds 1.6.5",
"product_id": "Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:a22a2cca1f48ee743a15c68ca22d1d76943c25b2069e80a4bc1275c8157284db_amd64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:a22a2cca1f48ee743a15c68ca22d1d76943c25b2069e80a4bc1275c8157284db_amd64",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.6.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:a9d691eec41e370daff6737ed9d0b8c018b5426ff195b77897fd579846858e39_s390x as a component of Red Hat OpenShift Builds 1.6.5",
"product_id": "Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:a9d691eec41e370daff6737ed9d0b8c018b5426ff195b77897fd579846858e39_s390x"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:a9d691eec41e370daff6737ed9d0b8c018b5426ff195b77897fd579846858e39_s390x",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.6.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:54890d05d56aeee46f051f42959500e00f2c748e9fdb2f1100226d8b4b976a47_s390x as a component of Red Hat OpenShift Builds 1.6.5",
"product_id": "Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:54890d05d56aeee46f051f42959500e00f2c748e9fdb2f1100226d8b4b976a47_s390x"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:54890d05d56aeee46f051f42959500e00f2c748e9fdb2f1100226d8b4b976a47_s390x",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.6.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:549f2d54aaa66f9ab68e08f49e4f0cd95ffbbc93607ef7a112b74b177e57cfd0_amd64 as a component of Red Hat OpenShift Builds 1.6.5",
"product_id": "Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:549f2d54aaa66f9ab68e08f49e4f0cd95ffbbc93607ef7a112b74b177e57cfd0_amd64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:549f2d54aaa66f9ab68e08f49e4f0cd95ffbbc93607ef7a112b74b177e57cfd0_amd64",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.6.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:5664f48403387a9e64370337d3ea5eb30ec27336f6e8f47a3a8a3ba0fe96741c_ppc64le as a component of Red Hat OpenShift Builds 1.6.5",
"product_id": "Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:5664f48403387a9e64370337d3ea5eb30ec27336f6e8f47a3a8a3ba0fe96741c_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:5664f48403387a9e64370337d3ea5eb30ec27336f6e8f47a3a8a3ba0fe96741c_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.6.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:c95f763b803f53276670cea4fdf289983e472361a00a6d7da0bb56b3e857a935_arm64 as a component of Red Hat OpenShift Builds 1.6.5",
"product_id": "Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:c95f763b803f53276670cea4fdf289983e472361a00a6d7da0bb56b3e857a935_arm64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:c95f763b803f53276670cea4fdf289983e472361a00a6d7da0bb56b3e857a935_arm64",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.6.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:60bfc1aeb95ff74fd2d8bd29700994594c92b93795b63f02fd0d7bb2d3d6fba7_amd64 as a component of Red Hat OpenShift Builds 1.6.5",
"product_id": "Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:60bfc1aeb95ff74fd2d8bd29700994594c92b93795b63f02fd0d7bb2d3d6fba7_amd64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:60bfc1aeb95ff74fd2d8bd29700994594c92b93795b63f02fd0d7bb2d3d6fba7_amd64",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.6.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:1c0d155195bfd251b40da10e153c8a738250f14253f337b198476740cb7bd81a_amd64 as a component of Red Hat OpenShift Builds 1.6.5",
"product_id": "Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:1c0d155195bfd251b40da10e153c8a738250f14253f337b198476740cb7bd81a_amd64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:1c0d155195bfd251b40da10e153c8a738250f14253f337b198476740cb7bd81a_amd64",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.6.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:26fdde499994a4be0eb277bbbca899061384f20673672ef30ed301d792b3108d_s390x as a component of Red Hat OpenShift Builds 1.6.5",
"product_id": "Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:26fdde499994a4be0eb277bbbca899061384f20673672ef30ed301d792b3108d_s390x"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:26fdde499994a4be0eb277bbbca899061384f20673672ef30ed301d792b3108d_s390x",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.6.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:5d08c7ee6886747dc077faa7f1e4e696b5ad29cc4dcc8fd2c4f3d7a434f47f9b_arm64 as a component of Red Hat OpenShift Builds 1.6.5",
"product_id": "Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:5d08c7ee6886747dc077faa7f1e4e696b5ad29cc4dcc8fd2c4f3d7a434f47f9b_arm64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:5d08c7ee6886747dc077faa7f1e4e696b5ad29cc4dcc8fd2c4f3d7a434f47f9b_arm64",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.6.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:e1cdb58bf2783a9a50346e1690f51b09e175c8ebb737b11332658d85bcb645e9_ppc64le as a component of Red Hat OpenShift Builds 1.6.5",
"product_id": "Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:e1cdb58bf2783a9a50346e1690f51b09e175c8ebb737b11332658d85bcb645e9_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:e1cdb58bf2783a9a50346e1690f51b09e175c8ebb737b11332658d85bcb645e9_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.6.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:c5083edbd43692dc5ef5b0cf14417eea19412c0927ede39a87ade36515cf16f1_ppc64le as a component of Red Hat OpenShift Builds 1.6.5",
"product_id": "Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:c5083edbd43692dc5ef5b0cf14417eea19412c0927ede39a87ade36515cf16f1_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:c5083edbd43692dc5ef5b0cf14417eea19412c0927ede39a87ade36515cf16f1_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.6.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:d56042518051b3e4dbef3da9f13d74fd8e8a6b9ad8520965052f1522247b70ef_s390x as a component of Red Hat OpenShift Builds 1.6.5",
"product_id": "Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:d56042518051b3e4dbef3da9f13d74fd8e8a6b9ad8520965052f1522247b70ef_s390x"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:d56042518051b3e4dbef3da9f13d74fd8e8a6b9ad8520965052f1522247b70ef_s390x",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.6.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:d6401dc97f1adeafcfb8a34e3c1fe8230cd2ca6bb7c4245ef875a4b3fa35b014_arm64 as a component of Red Hat OpenShift Builds 1.6.5",
"product_id": "Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:d6401dc97f1adeafcfb8a34e3c1fe8230cd2ca6bb7c4245ef875a4b3fa35b014_arm64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:d6401dc97f1adeafcfb8a34e3c1fe8230cd2ca6bb7c4245ef875a4b3fa35b014_arm64",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.6.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:f54ab8388a0f593c2426c240c7d50fd7f3f2263e1c88f7726dbbe2ebbed38896_amd64 as a component of Red Hat OpenShift Builds 1.6.5",
"product_id": "Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:f54ab8388a0f593c2426c240c7d50fd7f3f2263e1c88f7726dbbe2ebbed38896_amd64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:f54ab8388a0f593c2426c240c7d50fd7f3f2263e1c88f7726dbbe2ebbed38896_amd64",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.6.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:0d629bbf41a55434b40545e12c5f0d95e357b0fd74303feec657918b90321642_amd64 as a component of Red Hat OpenShift Builds 1.6.5",
"product_id": "Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:0d629bbf41a55434b40545e12c5f0d95e357b0fd74303feec657918b90321642_amd64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:0d629bbf41a55434b40545e12c5f0d95e357b0fd74303feec657918b90321642_amd64",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.6.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:7d6aecb4a7e98dcabc77c3043e214bec9fa521af9c6a048ece876ba9f294dce8_s390x as a component of Red Hat OpenShift Builds 1.6.5",
"product_id": "Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:7d6aecb4a7e98dcabc77c3043e214bec9fa521af9c6a048ece876ba9f294dce8_s390x"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:7d6aecb4a7e98dcabc77c3043e214bec9fa521af9c6a048ece876ba9f294dce8_s390x",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.6.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:d69d7290c5e07301e9397df551e97d8d81795ba7c711d95f60bd178fc39f1434_arm64 as a component of Red Hat OpenShift Builds 1.6.5",
"product_id": "Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:d69d7290c5e07301e9397df551e97d8d81795ba7c711d95f60bd178fc39f1434_arm64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:d69d7290c5e07301e9397df551e97d8d81795ba7c711d95f60bd178fc39f1434_arm64",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.6.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:e095cffba13badc4aab65f9920f8e618c9fe4411d6d53d8b160716a31fe2d6e7_ppc64le as a component of Red Hat OpenShift Builds 1.6.5",
"product_id": "Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:e095cffba13badc4aab65f9920f8e618c9fe4411d6d53d8b160716a31fe2d6e7_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:e095cffba13badc4aab65f9920f8e618c9fe4411d6d53d8b160716a31fe2d6e7_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.6.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:71f49240685245565f35d7d4b6d7d55b442cb61bc7c0f4d25c5529ca9187ae9f_amd64 as a component of Red Hat OpenShift Builds 1.6.5",
"product_id": "Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:71f49240685245565f35d7d4b6d7d55b442cb61bc7c0f4d25c5529ca9187ae9f_amd64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:71f49240685245565f35d7d4b6d7d55b442cb61bc7c0f4d25c5529ca9187ae9f_amd64",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.6.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:78775c452a2c5ddb3568b677c2790815fb2a2d6afacbfacccdaf68b79c8fe39c_ppc64le as a component of Red Hat OpenShift Builds 1.6.5",
"product_id": "Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:78775c452a2c5ddb3568b677c2790815fb2a2d6afacbfacccdaf68b79c8fe39c_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:78775c452a2c5ddb3568b677c2790815fb2a2d6afacbfacccdaf68b79c8fe39c_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.6.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:c44d2ad3d716e7c753ec538654d25c42d80539071f1d5f81df4a8fd5e76c7a58_arm64 as a component of Red Hat OpenShift Builds 1.6.5",
"product_id": "Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:c44d2ad3d716e7c753ec538654d25c42d80539071f1d5f81df4a8fd5e76c7a58_arm64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:c44d2ad3d716e7c753ec538654d25c42d80539071f1d5f81df4a8fd5e76c7a58_arm64",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.6.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:f4752a62de9c94e0f84aaa6cddfeb4a5cbecab6c83147b72b6f05ddef23fe192_s390x as a component of Red Hat OpenShift Builds 1.6.5",
"product_id": "Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:f4752a62de9c94e0f84aaa6cddfeb4a5cbecab6c83147b72b6f05ddef23fe192_s390x"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:f4752a62de9c94e0f84aaa6cddfeb4a5cbecab6c83147b72b6f05ddef23fe192_s390x",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.6.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:26f519f9f0e7e41f7f6b12bfd2f968bfb5196f05781493752e17a85d09b0b976_s390x as a component of Red Hat OpenShift Builds 1.6.5",
"product_id": "Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:26f519f9f0e7e41f7f6b12bfd2f968bfb5196f05781493752e17a85d09b0b976_s390x"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:26f519f9f0e7e41f7f6b12bfd2f968bfb5196f05781493752e17a85d09b0b976_s390x",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.6.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:3b1112d42f42c721287e1da5e5a87b6832889ed532b1acae27caeb64f1bb44f9_arm64 as a component of Red Hat OpenShift Builds 1.6.5",
"product_id": "Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:3b1112d42f42c721287e1da5e5a87b6832889ed532b1acae27caeb64f1bb44f9_arm64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:3b1112d42f42c721287e1da5e5a87b6832889ed532b1acae27caeb64f1bb44f9_arm64",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.6.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:b3ac0453a1d16b2a9d1314991cd7642d637c5d9af3e884aabd88e4e9b73c59c6_ppc64le as a component of Red Hat OpenShift Builds 1.6.5",
"product_id": "Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:b3ac0453a1d16b2a9d1314991cd7642d637c5d9af3e884aabd88e4e9b73c59c6_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:b3ac0453a1d16b2a9d1314991cd7642d637c5d9af3e884aabd88e4e9b73c59c6_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.6.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:c6491240cf919793d2d0646e7cd505f7c45f18655c600593e06c98324bf0dc71_amd64 as a component of Red Hat OpenShift Builds 1.6.5",
"product_id": "Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:c6491240cf919793d2d0646e7cd505f7c45f18655c600593e06c98324bf0dc71_amd64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:c6491240cf919793d2d0646e7cd505f7c45f18655c600593e06c98324bf0dc71_amd64",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.6.5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-33186",
"cwe": {
"id": "CWE-551",
"name": "Incorrect Behavior Order: Authorization Before Parsing and Canonicalization"
},
"discovery_date": "2026-03-20T23:02:27.802640+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:092c9b4af55870d904beac952acf0fd914a2e784472888bb9f2c108548ff4906_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:25a9ca58f1104d83e0e312baf241f3eb048220c22a0065eed70106d9991faea4_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:2c6b079cf3184539f06634afcb35784ac74110c04fec36dfa80c2b0789d9099d_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:7b579fdc1d1dca3f32c2172eddb899ef3f8ff39d7af5cbed854d48e1d9e27675_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:2a33081f6d32826d53821e1aea686e1a6e8cb30fea8e601c00729c06511b98c6_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:31af187e314a843c4c02edd119d5edc2c260baca4d9a4ec2347f80f5511d6d3f_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:355cfa27d099cce3743ffa8432d2070ae3f21a446b560f6c1c5146b7351d116a_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:64d5bfb3e3a9861b3cefdb49c0f9b286aad11ccb31867092de08e48630694f82_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:3d20f5041cd11c838fc15148f60650ae0824b4c7816eb50152a28693443b0cd0_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:596cfba3fdac5cd9ee725f6b9e0bc640eaf7e933d019d9d57ea840592ec72f23_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:a22a2cca1f48ee743a15c68ca22d1d76943c25b2069e80a4bc1275c8157284db_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:a9d691eec41e370daff6737ed9d0b8c018b5426ff195b77897fd579846858e39_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:54890d05d56aeee46f051f42959500e00f2c748e9fdb2f1100226d8b4b976a47_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:549f2d54aaa66f9ab68e08f49e4f0cd95ffbbc93607ef7a112b74b177e57cfd0_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:5664f48403387a9e64370337d3ea5eb30ec27336f6e8f47a3a8a3ba0fe96741c_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:c95f763b803f53276670cea4fdf289983e472361a00a6d7da0bb56b3e857a935_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:60bfc1aeb95ff74fd2d8bd29700994594c92b93795b63f02fd0d7bb2d3d6fba7_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:71f49240685245565f35d7d4b6d7d55b442cb61bc7c0f4d25c5529ca9187ae9f_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:78775c452a2c5ddb3568b677c2790815fb2a2d6afacbfacccdaf68b79c8fe39c_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:c44d2ad3d716e7c753ec538654d25c42d80539071f1d5f81df4a8fd5e76c7a58_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:f4752a62de9c94e0f84aaa6cddfeb4a5cbecab6c83147b72b6f05ddef23fe192_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:26f519f9f0e7e41f7f6b12bfd2f968bfb5196f05781493752e17a85d09b0b976_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:3b1112d42f42c721287e1da5e5a87b6832889ed532b1acae27caeb64f1bb44f9_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:b3ac0453a1d16b2a9d1314991cd7642d637c5d9af3e884aabd88e4e9b73c59c6_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:c6491240cf919793d2d0646e7cd505f7c45f18655c600593e06c98324bf0dc71_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2449833"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in gRPC-Go, the Go language implementation of gRPC. This vulnerability, an authorization bypass, is caused by improper input validation of the HTTP/2 `:path` pseudo-header. A remote attacker can exploit this by sending raw HTTP/2 frames with a malformed `:path` that omits the mandatory leading slash. This allows the attacker to bypass defined security policies, potentially leading to unauthorized access to services or information disclosure.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "google.golang.org/grpc/grpc-go: google.golang.org/grpc/authz: gRPC-Go: Authorization bypass due to improper HTTP/2 path validation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:1c0d155195bfd251b40da10e153c8a738250f14253f337b198476740cb7bd81a_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:26fdde499994a4be0eb277bbbca899061384f20673672ef30ed301d792b3108d_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:5d08c7ee6886747dc077faa7f1e4e696b5ad29cc4dcc8fd2c4f3d7a434f47f9b_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:e1cdb58bf2783a9a50346e1690f51b09e175c8ebb737b11332658d85bcb645e9_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:c5083edbd43692dc5ef5b0cf14417eea19412c0927ede39a87ade36515cf16f1_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:d56042518051b3e4dbef3da9f13d74fd8e8a6b9ad8520965052f1522247b70ef_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:d6401dc97f1adeafcfb8a34e3c1fe8230cd2ca6bb7c4245ef875a4b3fa35b014_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:f54ab8388a0f593c2426c240c7d50fd7f3f2263e1c88f7726dbbe2ebbed38896_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:0d629bbf41a55434b40545e12c5f0d95e357b0fd74303feec657918b90321642_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:7d6aecb4a7e98dcabc77c3043e214bec9fa521af9c6a048ece876ba9f294dce8_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:d69d7290c5e07301e9397df551e97d8d81795ba7c711d95f60bd178fc39f1434_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:e095cffba13badc4aab65f9920f8e618c9fe4411d6d53d8b160716a31fe2d6e7_ppc64le"
],
"known_not_affected": [
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:092c9b4af55870d904beac952acf0fd914a2e784472888bb9f2c108548ff4906_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:25a9ca58f1104d83e0e312baf241f3eb048220c22a0065eed70106d9991faea4_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:2c6b079cf3184539f06634afcb35784ac74110c04fec36dfa80c2b0789d9099d_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:7b579fdc1d1dca3f32c2172eddb899ef3f8ff39d7af5cbed854d48e1d9e27675_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:2a33081f6d32826d53821e1aea686e1a6e8cb30fea8e601c00729c06511b98c6_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:31af187e314a843c4c02edd119d5edc2c260baca4d9a4ec2347f80f5511d6d3f_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:355cfa27d099cce3743ffa8432d2070ae3f21a446b560f6c1c5146b7351d116a_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:64d5bfb3e3a9861b3cefdb49c0f9b286aad11ccb31867092de08e48630694f82_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:3d20f5041cd11c838fc15148f60650ae0824b4c7816eb50152a28693443b0cd0_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:596cfba3fdac5cd9ee725f6b9e0bc640eaf7e933d019d9d57ea840592ec72f23_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:a22a2cca1f48ee743a15c68ca22d1d76943c25b2069e80a4bc1275c8157284db_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:a9d691eec41e370daff6737ed9d0b8c018b5426ff195b77897fd579846858e39_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:54890d05d56aeee46f051f42959500e00f2c748e9fdb2f1100226d8b4b976a47_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:549f2d54aaa66f9ab68e08f49e4f0cd95ffbbc93607ef7a112b74b177e57cfd0_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:5664f48403387a9e64370337d3ea5eb30ec27336f6e8f47a3a8a3ba0fe96741c_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:c95f763b803f53276670cea4fdf289983e472361a00a6d7da0bb56b3e857a935_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:60bfc1aeb95ff74fd2d8bd29700994594c92b93795b63f02fd0d7bb2d3d6fba7_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:71f49240685245565f35d7d4b6d7d55b442cb61bc7c0f4d25c5529ca9187ae9f_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:78775c452a2c5ddb3568b677c2790815fb2a2d6afacbfacccdaf68b79c8fe39c_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:c44d2ad3d716e7c753ec538654d25c42d80539071f1d5f81df4a8fd5e76c7a58_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:f4752a62de9c94e0f84aaa6cddfeb4a5cbecab6c83147b72b6f05ddef23fe192_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:26f519f9f0e7e41f7f6b12bfd2f968bfb5196f05781493752e17a85d09b0b976_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:3b1112d42f42c721287e1da5e5a87b6832889ed532b1acae27caeb64f1bb44f9_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:b3ac0453a1d16b2a9d1314991cd7642d637c5d9af3e884aabd88e4e9b73c59c6_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:c6491240cf919793d2d0646e7cd505f7c45f18655c600593e06c98324bf0dc71_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-33186"
},
{
"category": "external",
"summary": "RHBZ#2449833",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2449833"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-33186",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33186"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186"
},
{
"category": "external",
"summary": "https://github.com/grpc/grpc-go/security/advisories/GHSA-p77j-4mvh-x3m3",
"url": "https://github.com/grpc/grpc-go/security/advisories/GHSA-p77j-4mvh-x3m3"
}
],
"release_date": "2026-03-20T22:23:32.147000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-28T07:16:04+00:00",
"details": "It is recommended that existing users of Red Hat OpenShift Builds 1.6.4 upgrades to to 1.6.5",
"product_ids": [
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:1c0d155195bfd251b40da10e153c8a738250f14253f337b198476740cb7bd81a_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:26fdde499994a4be0eb277bbbca899061384f20673672ef30ed301d792b3108d_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:5d08c7ee6886747dc077faa7f1e4e696b5ad29cc4dcc8fd2c4f3d7a434f47f9b_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:e1cdb58bf2783a9a50346e1690f51b09e175c8ebb737b11332658d85bcb645e9_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:c5083edbd43692dc5ef5b0cf14417eea19412c0927ede39a87ade36515cf16f1_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:d56042518051b3e4dbef3da9f13d74fd8e8a6b9ad8520965052f1522247b70ef_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:d6401dc97f1adeafcfb8a34e3c1fe8230cd2ca6bb7c4245ef875a4b3fa35b014_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:f54ab8388a0f593c2426c240c7d50fd7f3f2263e1c88f7726dbbe2ebbed38896_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:0d629bbf41a55434b40545e12c5f0d95e357b0fd74303feec657918b90321642_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:7d6aecb4a7e98dcabc77c3043e214bec9fa521af9c6a048ece876ba9f294dce8_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:d69d7290c5e07301e9397df551e97d8d81795ba7c711d95f60bd178fc39f1434_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:e095cffba13badc4aab65f9920f8e618c9fe4411d6d53d8b160716a31fe2d6e7_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:11330"
},
{
"category": "workaround",
"details": "To mitigate this issue, implement infrastructure-level normalization to ensure all incoming HTTP/2 `:path` headers are properly formatted with a leading slash before reaching the gRPC-Go server. This can be achieved by configuring a reverse proxy or API gateway to validate and normalize the `:path` header. Ensure that any such intermediary is properly configured and restarted to apply the changes, which may temporarily impact service availability.",
"product_ids": [
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:092c9b4af55870d904beac952acf0fd914a2e784472888bb9f2c108548ff4906_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:25a9ca58f1104d83e0e312baf241f3eb048220c22a0065eed70106d9991faea4_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:2c6b079cf3184539f06634afcb35784ac74110c04fec36dfa80c2b0789d9099d_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:7b579fdc1d1dca3f32c2172eddb899ef3f8ff39d7af5cbed854d48e1d9e27675_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:2a33081f6d32826d53821e1aea686e1a6e8cb30fea8e601c00729c06511b98c6_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:31af187e314a843c4c02edd119d5edc2c260baca4d9a4ec2347f80f5511d6d3f_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:355cfa27d099cce3743ffa8432d2070ae3f21a446b560f6c1c5146b7351d116a_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:64d5bfb3e3a9861b3cefdb49c0f9b286aad11ccb31867092de08e48630694f82_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:3d20f5041cd11c838fc15148f60650ae0824b4c7816eb50152a28693443b0cd0_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:596cfba3fdac5cd9ee725f6b9e0bc640eaf7e933d019d9d57ea840592ec72f23_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:a22a2cca1f48ee743a15c68ca22d1d76943c25b2069e80a4bc1275c8157284db_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:a9d691eec41e370daff6737ed9d0b8c018b5426ff195b77897fd579846858e39_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:54890d05d56aeee46f051f42959500e00f2c748e9fdb2f1100226d8b4b976a47_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:549f2d54aaa66f9ab68e08f49e4f0cd95ffbbc93607ef7a112b74b177e57cfd0_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:5664f48403387a9e64370337d3ea5eb30ec27336f6e8f47a3a8a3ba0fe96741c_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:c95f763b803f53276670cea4fdf289983e472361a00a6d7da0bb56b3e857a935_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:60bfc1aeb95ff74fd2d8bd29700994594c92b93795b63f02fd0d7bb2d3d6fba7_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:1c0d155195bfd251b40da10e153c8a738250f14253f337b198476740cb7bd81a_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:26fdde499994a4be0eb277bbbca899061384f20673672ef30ed301d792b3108d_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:5d08c7ee6886747dc077faa7f1e4e696b5ad29cc4dcc8fd2c4f3d7a434f47f9b_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:e1cdb58bf2783a9a50346e1690f51b09e175c8ebb737b11332658d85bcb645e9_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:c5083edbd43692dc5ef5b0cf14417eea19412c0927ede39a87ade36515cf16f1_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:d56042518051b3e4dbef3da9f13d74fd8e8a6b9ad8520965052f1522247b70ef_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:d6401dc97f1adeafcfb8a34e3c1fe8230cd2ca6bb7c4245ef875a4b3fa35b014_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:f54ab8388a0f593c2426c240c7d50fd7f3f2263e1c88f7726dbbe2ebbed38896_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:0d629bbf41a55434b40545e12c5f0d95e357b0fd74303feec657918b90321642_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:7d6aecb4a7e98dcabc77c3043e214bec9fa521af9c6a048ece876ba9f294dce8_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:d69d7290c5e07301e9397df551e97d8d81795ba7c711d95f60bd178fc39f1434_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:e095cffba13badc4aab65f9920f8e618c9fe4411d6d53d8b160716a31fe2d6e7_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:71f49240685245565f35d7d4b6d7d55b442cb61bc7c0f4d25c5529ca9187ae9f_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:78775c452a2c5ddb3568b677c2790815fb2a2d6afacbfacccdaf68b79c8fe39c_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:c44d2ad3d716e7c753ec538654d25c42d80539071f1d5f81df4a8fd5e76c7a58_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:f4752a62de9c94e0f84aaa6cddfeb4a5cbecab6c83147b72b6f05ddef23fe192_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:26f519f9f0e7e41f7f6b12bfd2f968bfb5196f05781493752e17a85d09b0b976_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:3b1112d42f42c721287e1da5e5a87b6832889ed532b1acae27caeb64f1bb44f9_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:b3ac0453a1d16b2a9d1314991cd7642d637c5d9af3e884aabd88e4e9b73c59c6_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:c6491240cf919793d2d0646e7cd505f7c45f18655c600593e06c98324bf0dc71_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:092c9b4af55870d904beac952acf0fd914a2e784472888bb9f2c108548ff4906_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:25a9ca58f1104d83e0e312baf241f3eb048220c22a0065eed70106d9991faea4_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:2c6b079cf3184539f06634afcb35784ac74110c04fec36dfa80c2b0789d9099d_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:7b579fdc1d1dca3f32c2172eddb899ef3f8ff39d7af5cbed854d48e1d9e27675_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:2a33081f6d32826d53821e1aea686e1a6e8cb30fea8e601c00729c06511b98c6_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:31af187e314a843c4c02edd119d5edc2c260baca4d9a4ec2347f80f5511d6d3f_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:355cfa27d099cce3743ffa8432d2070ae3f21a446b560f6c1c5146b7351d116a_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:64d5bfb3e3a9861b3cefdb49c0f9b286aad11ccb31867092de08e48630694f82_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:3d20f5041cd11c838fc15148f60650ae0824b4c7816eb50152a28693443b0cd0_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:596cfba3fdac5cd9ee725f6b9e0bc640eaf7e933d019d9d57ea840592ec72f23_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:a22a2cca1f48ee743a15c68ca22d1d76943c25b2069e80a4bc1275c8157284db_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:a9d691eec41e370daff6737ed9d0b8c018b5426ff195b77897fd579846858e39_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:54890d05d56aeee46f051f42959500e00f2c748e9fdb2f1100226d8b4b976a47_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:549f2d54aaa66f9ab68e08f49e4f0cd95ffbbc93607ef7a112b74b177e57cfd0_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:5664f48403387a9e64370337d3ea5eb30ec27336f6e8f47a3a8a3ba0fe96741c_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:c95f763b803f53276670cea4fdf289983e472361a00a6d7da0bb56b3e857a935_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:60bfc1aeb95ff74fd2d8bd29700994594c92b93795b63f02fd0d7bb2d3d6fba7_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:1c0d155195bfd251b40da10e153c8a738250f14253f337b198476740cb7bd81a_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:26fdde499994a4be0eb277bbbca899061384f20673672ef30ed301d792b3108d_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:5d08c7ee6886747dc077faa7f1e4e696b5ad29cc4dcc8fd2c4f3d7a434f47f9b_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:e1cdb58bf2783a9a50346e1690f51b09e175c8ebb737b11332658d85bcb645e9_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:c5083edbd43692dc5ef5b0cf14417eea19412c0927ede39a87ade36515cf16f1_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:d56042518051b3e4dbef3da9f13d74fd8e8a6b9ad8520965052f1522247b70ef_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:d6401dc97f1adeafcfb8a34e3c1fe8230cd2ca6bb7c4245ef875a4b3fa35b014_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:f54ab8388a0f593c2426c240c7d50fd7f3f2263e1c88f7726dbbe2ebbed38896_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:0d629bbf41a55434b40545e12c5f0d95e357b0fd74303feec657918b90321642_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:7d6aecb4a7e98dcabc77c3043e214bec9fa521af9c6a048ece876ba9f294dce8_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:d69d7290c5e07301e9397df551e97d8d81795ba7c711d95f60bd178fc39f1434_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:e095cffba13badc4aab65f9920f8e618c9fe4411d6d53d8b160716a31fe2d6e7_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:71f49240685245565f35d7d4b6d7d55b442cb61bc7c0f4d25c5529ca9187ae9f_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:78775c452a2c5ddb3568b677c2790815fb2a2d6afacbfacccdaf68b79c8fe39c_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:c44d2ad3d716e7c753ec538654d25c42d80539071f1d5f81df4a8fd5e76c7a58_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:f4752a62de9c94e0f84aaa6cddfeb4a5cbecab6c83147b72b6f05ddef23fe192_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:26f519f9f0e7e41f7f6b12bfd2f968bfb5196f05781493752e17a85d09b0b976_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:3b1112d42f42c721287e1da5e5a87b6832889ed532b1acae27caeb64f1bb44f9_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:b3ac0453a1d16b2a9d1314991cd7642d637c5d9af3e884aabd88e4e9b73c59c6_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:c6491240cf919793d2d0646e7cd505f7c45f18655c600593e06c98324bf0dc71_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "google.golang.org/grpc/grpc-go: google.golang.org/grpc/authz: gRPC-Go: Authorization bypass due to improper HTTP/2 path validation"
},
{
"cve": "CVE-2026-33211",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2026-03-24T00:02:20.093480+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:092c9b4af55870d904beac952acf0fd914a2e784472888bb9f2c108548ff4906_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:25a9ca58f1104d83e0e312baf241f3eb048220c22a0065eed70106d9991faea4_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:2c6b079cf3184539f06634afcb35784ac74110c04fec36dfa80c2b0789d9099d_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:7b579fdc1d1dca3f32c2172eddb899ef3f8ff39d7af5cbed854d48e1d9e27675_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:2a33081f6d32826d53821e1aea686e1a6e8cb30fea8e601c00729c06511b98c6_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:31af187e314a843c4c02edd119d5edc2c260baca4d9a4ec2347f80f5511d6d3f_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:355cfa27d099cce3743ffa8432d2070ae3f21a446b560f6c1c5146b7351d116a_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:64d5bfb3e3a9861b3cefdb49c0f9b286aad11ccb31867092de08e48630694f82_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:3d20f5041cd11c838fc15148f60650ae0824b4c7816eb50152a28693443b0cd0_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:596cfba3fdac5cd9ee725f6b9e0bc640eaf7e933d019d9d57ea840592ec72f23_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:a22a2cca1f48ee743a15c68ca22d1d76943c25b2069e80a4bc1275c8157284db_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:a9d691eec41e370daff6737ed9d0b8c018b5426ff195b77897fd579846858e39_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:54890d05d56aeee46f051f42959500e00f2c748e9fdb2f1100226d8b4b976a47_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:549f2d54aaa66f9ab68e08f49e4f0cd95ffbbc93607ef7a112b74b177e57cfd0_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:5664f48403387a9e64370337d3ea5eb30ec27336f6e8f47a3a8a3ba0fe96741c_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:c95f763b803f53276670cea4fdf289983e472361a00a6d7da0bb56b3e857a935_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:60bfc1aeb95ff74fd2d8bd29700994594c92b93795b63f02fd0d7bb2d3d6fba7_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:c5083edbd43692dc5ef5b0cf14417eea19412c0927ede39a87ade36515cf16f1_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:d56042518051b3e4dbef3da9f13d74fd8e8a6b9ad8520965052f1522247b70ef_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:d6401dc97f1adeafcfb8a34e3c1fe8230cd2ca6bb7c4245ef875a4b3fa35b014_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:f54ab8388a0f593c2426c240c7d50fd7f3f2263e1c88f7726dbbe2ebbed38896_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:0d629bbf41a55434b40545e12c5f0d95e357b0fd74303feec657918b90321642_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:7d6aecb4a7e98dcabc77c3043e214bec9fa521af9c6a048ece876ba9f294dce8_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:d69d7290c5e07301e9397df551e97d8d81795ba7c711d95f60bd178fc39f1434_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:e095cffba13badc4aab65f9920f8e618c9fe4411d6d53d8b160716a31fe2d6e7_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:71f49240685245565f35d7d4b6d7d55b442cb61bc7c0f4d25c5529ca9187ae9f_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:78775c452a2c5ddb3568b677c2790815fb2a2d6afacbfacccdaf68b79c8fe39c_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:c44d2ad3d716e7c753ec538654d25c42d80539071f1d5f81df4a8fd5e76c7a58_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:f4752a62de9c94e0f84aaa6cddfeb4a5cbecab6c83147b72b6f05ddef23fe192_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:26f519f9f0e7e41f7f6b12bfd2f968bfb5196f05781493752e17a85d09b0b976_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:3b1112d42f42c721287e1da5e5a87b6832889ed532b1acae27caeb64f1bb44f9_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:b3ac0453a1d16b2a9d1314991cd7642d637c5d9af3e884aabd88e4e9b73c59c6_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:c6491240cf919793d2d0646e7cd505f7c45f18655c600593e06c98324bf0dc71_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2450554"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Tekton Pipelines, specifically in the Tekton Pipelines git resolver. A tenant with permissions to create ResolutionRequests can exploit a path traversal vulnerability via the `pathInRepo` parameter. This allows the tenant to read arbitrary files from the resolver pod\u0027s filesystem, leading to information disclosure, including sensitive ServiceAccount tokens. The contents of these files are returned in a base64-encoded format.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Tekton Pipelines: github.com/tektoncd/pipeline: Tekton Pipelines: Information disclosure via path traversal in git resolver",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to have the permission to create ResolutionRequests (e.g., by creating TaskRuns or PipelineRuns that use the git resolver) within at least one specific namespace, limiting the exposure of this issue to authenticated users. Also, an attacker can read any file readable by the resolver pod process, including cluster secrets, allowing an escalation of privileges from namespace-scoped access to cluster-wide access. Due to these reasons, this vulnerability has been rated with an important severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:1c0d155195bfd251b40da10e153c8a738250f14253f337b198476740cb7bd81a_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:26fdde499994a4be0eb277bbbca899061384f20673672ef30ed301d792b3108d_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:5d08c7ee6886747dc077faa7f1e4e696b5ad29cc4dcc8fd2c4f3d7a434f47f9b_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:e1cdb58bf2783a9a50346e1690f51b09e175c8ebb737b11332658d85bcb645e9_ppc64le"
],
"known_not_affected": [
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:092c9b4af55870d904beac952acf0fd914a2e784472888bb9f2c108548ff4906_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:25a9ca58f1104d83e0e312baf241f3eb048220c22a0065eed70106d9991faea4_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:2c6b079cf3184539f06634afcb35784ac74110c04fec36dfa80c2b0789d9099d_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:7b579fdc1d1dca3f32c2172eddb899ef3f8ff39d7af5cbed854d48e1d9e27675_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:2a33081f6d32826d53821e1aea686e1a6e8cb30fea8e601c00729c06511b98c6_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:31af187e314a843c4c02edd119d5edc2c260baca4d9a4ec2347f80f5511d6d3f_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:355cfa27d099cce3743ffa8432d2070ae3f21a446b560f6c1c5146b7351d116a_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:64d5bfb3e3a9861b3cefdb49c0f9b286aad11ccb31867092de08e48630694f82_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:3d20f5041cd11c838fc15148f60650ae0824b4c7816eb50152a28693443b0cd0_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:596cfba3fdac5cd9ee725f6b9e0bc640eaf7e933d019d9d57ea840592ec72f23_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:a22a2cca1f48ee743a15c68ca22d1d76943c25b2069e80a4bc1275c8157284db_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:a9d691eec41e370daff6737ed9d0b8c018b5426ff195b77897fd579846858e39_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:54890d05d56aeee46f051f42959500e00f2c748e9fdb2f1100226d8b4b976a47_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:549f2d54aaa66f9ab68e08f49e4f0cd95ffbbc93607ef7a112b74b177e57cfd0_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:5664f48403387a9e64370337d3ea5eb30ec27336f6e8f47a3a8a3ba0fe96741c_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:c95f763b803f53276670cea4fdf289983e472361a00a6d7da0bb56b3e857a935_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:60bfc1aeb95ff74fd2d8bd29700994594c92b93795b63f02fd0d7bb2d3d6fba7_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:c5083edbd43692dc5ef5b0cf14417eea19412c0927ede39a87ade36515cf16f1_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:d56042518051b3e4dbef3da9f13d74fd8e8a6b9ad8520965052f1522247b70ef_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:d6401dc97f1adeafcfb8a34e3c1fe8230cd2ca6bb7c4245ef875a4b3fa35b014_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:f54ab8388a0f593c2426c240c7d50fd7f3f2263e1c88f7726dbbe2ebbed38896_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:0d629bbf41a55434b40545e12c5f0d95e357b0fd74303feec657918b90321642_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:7d6aecb4a7e98dcabc77c3043e214bec9fa521af9c6a048ece876ba9f294dce8_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:d69d7290c5e07301e9397df551e97d8d81795ba7c711d95f60bd178fc39f1434_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:e095cffba13badc4aab65f9920f8e618c9fe4411d6d53d8b160716a31fe2d6e7_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:71f49240685245565f35d7d4b6d7d55b442cb61bc7c0f4d25c5529ca9187ae9f_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:78775c452a2c5ddb3568b677c2790815fb2a2d6afacbfacccdaf68b79c8fe39c_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:c44d2ad3d716e7c753ec538654d25c42d80539071f1d5f81df4a8fd5e76c7a58_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:f4752a62de9c94e0f84aaa6cddfeb4a5cbecab6c83147b72b6f05ddef23fe192_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:26f519f9f0e7e41f7f6b12bfd2f968bfb5196f05781493752e17a85d09b0b976_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:3b1112d42f42c721287e1da5e5a87b6832889ed532b1acae27caeb64f1bb44f9_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:b3ac0453a1d16b2a9d1314991cd7642d637c5d9af3e884aabd88e4e9b73c59c6_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:c6491240cf919793d2d0646e7cd505f7c45f18655c600593e06c98324bf0dc71_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-33211"
},
{
"category": "external",
"summary": "RHBZ#2450554",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2450554"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-33211",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33211"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-33211",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33211"
},
{
"category": "external",
"summary": "https://github.com/tektoncd/pipeline/commit/10fa538f9a2b6d01c75138f1ed7ba3da0e34687c",
"url": "https://github.com/tektoncd/pipeline/commit/10fa538f9a2b6d01c75138f1ed7ba3da0e34687c"
},
{
"category": "external",
"summary": "https://github.com/tektoncd/pipeline/commit/318006c4e3a5",
"url": "https://github.com/tektoncd/pipeline/commit/318006c4e3a5"
},
{
"category": "external",
"summary": "https://github.com/tektoncd/pipeline/commit/3ca7bc6e6dd1d97f80b84f78370d91edaf023cbd",
"url": "https://github.com/tektoncd/pipeline/commit/3ca7bc6e6dd1d97f80b84f78370d91edaf023cbd"
},
{
"category": "external",
"summary": "https://github.com/tektoncd/pipeline/commit/961388fcf3374bc7656d28ab58ca84987e0a75ae",
"url": "https://github.com/tektoncd/pipeline/commit/961388fcf3374bc7656d28ab58ca84987e0a75ae"
},
{
"category": "external",
"summary": "https://github.com/tektoncd/pipeline/commit/b1fee65b88aa969069c14c120045e97c37d9ee5e",
"url": "https://github.com/tektoncd/pipeline/commit/b1fee65b88aa969069c14c120045e97c37d9ee5e"
},
{
"category": "external",
"summary": "https://github.com/tektoncd/pipeline/commit/cdb4e1e97a4f3170f9bc2cbfff83a6c8107bc3db",
"url": "https://github.com/tektoncd/pipeline/commit/cdb4e1e97a4f3170f9bc2cbfff83a6c8107bc3db"
},
{
"category": "external",
"summary": "https://github.com/tektoncd/pipeline/commit/ec7755031a183b345cf9e64bea0e0505c1b9cb78",
"url": "https://github.com/tektoncd/pipeline/commit/ec7755031a183b345cf9e64bea0e0505c1b9cb78"
},
{
"category": "external",
"summary": "https://github.com/tektoncd/pipeline/security/advisories/GHSA-j5q5-j9gm-2w5c",
"url": "https://github.com/tektoncd/pipeline/security/advisories/GHSA-j5q5-j9gm-2w5c"
}
],
"release_date": "2026-03-23T23:55:54.089000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-28T07:16:04+00:00",
"details": "It is recommended that existing users of Red Hat OpenShift Builds 1.6.4 upgrades to to 1.6.5",
"product_ids": [
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:1c0d155195bfd251b40da10e153c8a738250f14253f337b198476740cb7bd81a_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:26fdde499994a4be0eb277bbbca899061384f20673672ef30ed301d792b3108d_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:5d08c7ee6886747dc077faa7f1e4e696b5ad29cc4dcc8fd2c4f3d7a434f47f9b_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:e1cdb58bf2783a9a50346e1690f51b09e175c8ebb737b11332658d85bcb645e9_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:11330"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, restrict the creation of ResolutionRequests to trusted users and service accounts. Implement strict Role-Based Access Control (RBAC) policies to limit which tenants can create TaskRuns or PipelineRuns that utilize the Tekton Pipelines git resolver. This reduces the exposure by preventing unauthorized access to the resolver pod\u0027s filesystem.",
"product_ids": [
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:092c9b4af55870d904beac952acf0fd914a2e784472888bb9f2c108548ff4906_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:25a9ca58f1104d83e0e312baf241f3eb048220c22a0065eed70106d9991faea4_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:2c6b079cf3184539f06634afcb35784ac74110c04fec36dfa80c2b0789d9099d_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:7b579fdc1d1dca3f32c2172eddb899ef3f8ff39d7af5cbed854d48e1d9e27675_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:2a33081f6d32826d53821e1aea686e1a6e8cb30fea8e601c00729c06511b98c6_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:31af187e314a843c4c02edd119d5edc2c260baca4d9a4ec2347f80f5511d6d3f_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:355cfa27d099cce3743ffa8432d2070ae3f21a446b560f6c1c5146b7351d116a_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:64d5bfb3e3a9861b3cefdb49c0f9b286aad11ccb31867092de08e48630694f82_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:3d20f5041cd11c838fc15148f60650ae0824b4c7816eb50152a28693443b0cd0_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:596cfba3fdac5cd9ee725f6b9e0bc640eaf7e933d019d9d57ea840592ec72f23_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:a22a2cca1f48ee743a15c68ca22d1d76943c25b2069e80a4bc1275c8157284db_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:a9d691eec41e370daff6737ed9d0b8c018b5426ff195b77897fd579846858e39_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:54890d05d56aeee46f051f42959500e00f2c748e9fdb2f1100226d8b4b976a47_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:549f2d54aaa66f9ab68e08f49e4f0cd95ffbbc93607ef7a112b74b177e57cfd0_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:5664f48403387a9e64370337d3ea5eb30ec27336f6e8f47a3a8a3ba0fe96741c_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:c95f763b803f53276670cea4fdf289983e472361a00a6d7da0bb56b3e857a935_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:60bfc1aeb95ff74fd2d8bd29700994594c92b93795b63f02fd0d7bb2d3d6fba7_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:1c0d155195bfd251b40da10e153c8a738250f14253f337b198476740cb7bd81a_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:26fdde499994a4be0eb277bbbca899061384f20673672ef30ed301d792b3108d_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:5d08c7ee6886747dc077faa7f1e4e696b5ad29cc4dcc8fd2c4f3d7a434f47f9b_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:e1cdb58bf2783a9a50346e1690f51b09e175c8ebb737b11332658d85bcb645e9_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:c5083edbd43692dc5ef5b0cf14417eea19412c0927ede39a87ade36515cf16f1_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:d56042518051b3e4dbef3da9f13d74fd8e8a6b9ad8520965052f1522247b70ef_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:d6401dc97f1adeafcfb8a34e3c1fe8230cd2ca6bb7c4245ef875a4b3fa35b014_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:f54ab8388a0f593c2426c240c7d50fd7f3f2263e1c88f7726dbbe2ebbed38896_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:0d629bbf41a55434b40545e12c5f0d95e357b0fd74303feec657918b90321642_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:7d6aecb4a7e98dcabc77c3043e214bec9fa521af9c6a048ece876ba9f294dce8_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:d69d7290c5e07301e9397df551e97d8d81795ba7c711d95f60bd178fc39f1434_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:e095cffba13badc4aab65f9920f8e618c9fe4411d6d53d8b160716a31fe2d6e7_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:71f49240685245565f35d7d4b6d7d55b442cb61bc7c0f4d25c5529ca9187ae9f_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:78775c452a2c5ddb3568b677c2790815fb2a2d6afacbfacccdaf68b79c8fe39c_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:c44d2ad3d716e7c753ec538654d25c42d80539071f1d5f81df4a8fd5e76c7a58_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:f4752a62de9c94e0f84aaa6cddfeb4a5cbecab6c83147b72b6f05ddef23fe192_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:26f519f9f0e7e41f7f6b12bfd2f968bfb5196f05781493752e17a85d09b0b976_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:3b1112d42f42c721287e1da5e5a87b6832889ed532b1acae27caeb64f1bb44f9_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:b3ac0453a1d16b2a9d1314991cd7642d637c5d9af3e884aabd88e4e9b73c59c6_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:c6491240cf919793d2d0646e7cd505f7c45f18655c600593e06c98324bf0dc71_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:092c9b4af55870d904beac952acf0fd914a2e784472888bb9f2c108548ff4906_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:25a9ca58f1104d83e0e312baf241f3eb048220c22a0065eed70106d9991faea4_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:2c6b079cf3184539f06634afcb35784ac74110c04fec36dfa80c2b0789d9099d_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:7b579fdc1d1dca3f32c2172eddb899ef3f8ff39d7af5cbed854d48e1d9e27675_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:2a33081f6d32826d53821e1aea686e1a6e8cb30fea8e601c00729c06511b98c6_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:31af187e314a843c4c02edd119d5edc2c260baca4d9a4ec2347f80f5511d6d3f_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:355cfa27d099cce3743ffa8432d2070ae3f21a446b560f6c1c5146b7351d116a_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:64d5bfb3e3a9861b3cefdb49c0f9b286aad11ccb31867092de08e48630694f82_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:3d20f5041cd11c838fc15148f60650ae0824b4c7816eb50152a28693443b0cd0_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:596cfba3fdac5cd9ee725f6b9e0bc640eaf7e933d019d9d57ea840592ec72f23_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:a22a2cca1f48ee743a15c68ca22d1d76943c25b2069e80a4bc1275c8157284db_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:a9d691eec41e370daff6737ed9d0b8c018b5426ff195b77897fd579846858e39_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:54890d05d56aeee46f051f42959500e00f2c748e9fdb2f1100226d8b4b976a47_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:549f2d54aaa66f9ab68e08f49e4f0cd95ffbbc93607ef7a112b74b177e57cfd0_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:5664f48403387a9e64370337d3ea5eb30ec27336f6e8f47a3a8a3ba0fe96741c_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:c95f763b803f53276670cea4fdf289983e472361a00a6d7da0bb56b3e857a935_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:60bfc1aeb95ff74fd2d8bd29700994594c92b93795b63f02fd0d7bb2d3d6fba7_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:1c0d155195bfd251b40da10e153c8a738250f14253f337b198476740cb7bd81a_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:26fdde499994a4be0eb277bbbca899061384f20673672ef30ed301d792b3108d_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:5d08c7ee6886747dc077faa7f1e4e696b5ad29cc4dcc8fd2c4f3d7a434f47f9b_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:e1cdb58bf2783a9a50346e1690f51b09e175c8ebb737b11332658d85bcb645e9_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:c5083edbd43692dc5ef5b0cf14417eea19412c0927ede39a87ade36515cf16f1_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:d56042518051b3e4dbef3da9f13d74fd8e8a6b9ad8520965052f1522247b70ef_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:d6401dc97f1adeafcfb8a34e3c1fe8230cd2ca6bb7c4245ef875a4b3fa35b014_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:f54ab8388a0f593c2426c240c7d50fd7f3f2263e1c88f7726dbbe2ebbed38896_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:0d629bbf41a55434b40545e12c5f0d95e357b0fd74303feec657918b90321642_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:7d6aecb4a7e98dcabc77c3043e214bec9fa521af9c6a048ece876ba9f294dce8_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:d69d7290c5e07301e9397df551e97d8d81795ba7c711d95f60bd178fc39f1434_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:e095cffba13badc4aab65f9920f8e618c9fe4411d6d53d8b160716a31fe2d6e7_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:71f49240685245565f35d7d4b6d7d55b442cb61bc7c0f4d25c5529ca9187ae9f_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:78775c452a2c5ddb3568b677c2790815fb2a2d6afacbfacccdaf68b79c8fe39c_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:c44d2ad3d716e7c753ec538654d25c42d80539071f1d5f81df4a8fd5e76c7a58_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:f4752a62de9c94e0f84aaa6cddfeb4a5cbecab6c83147b72b6f05ddef23fe192_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:26f519f9f0e7e41f7f6b12bfd2f968bfb5196f05781493752e17a85d09b0b976_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:3b1112d42f42c721287e1da5e5a87b6832889ed532b1acae27caeb64f1bb44f9_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:b3ac0453a1d16b2a9d1314991cd7642d637c5d9af3e884aabd88e4e9b73c59c6_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:c6491240cf919793d2d0646e7cd505f7c45f18655c600593e06c98324bf0dc71_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Tekton Pipelines: github.com/tektoncd/pipeline: Tekton Pipelines: Information disclosure via path traversal in git resolver"
},
{
"cve": "CVE-2026-33810",
"cwe": {
"id": "CWE-1289",
"name": "Improper Validation of Unsafe Equivalence in Input"
},
"discovery_date": "2026-04-08T02:01:09.100830+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:092c9b4af55870d904beac952acf0fd914a2e784472888bb9f2c108548ff4906_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:25a9ca58f1104d83e0e312baf241f3eb048220c22a0065eed70106d9991faea4_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:2c6b079cf3184539f06634afcb35784ac74110c04fec36dfa80c2b0789d9099d_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:7b579fdc1d1dca3f32c2172eddb899ef3f8ff39d7af5cbed854d48e1d9e27675_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:2a33081f6d32826d53821e1aea686e1a6e8cb30fea8e601c00729c06511b98c6_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:31af187e314a843c4c02edd119d5edc2c260baca4d9a4ec2347f80f5511d6d3f_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:355cfa27d099cce3743ffa8432d2070ae3f21a446b560f6c1c5146b7351d116a_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:64d5bfb3e3a9861b3cefdb49c0f9b286aad11ccb31867092de08e48630694f82_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:3d20f5041cd11c838fc15148f60650ae0824b4c7816eb50152a28693443b0cd0_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:596cfba3fdac5cd9ee725f6b9e0bc640eaf7e933d019d9d57ea840592ec72f23_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:a22a2cca1f48ee743a15c68ca22d1d76943c25b2069e80a4bc1275c8157284db_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:a9d691eec41e370daff6737ed9d0b8c018b5426ff195b77897fd579846858e39_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:54890d05d56aeee46f051f42959500e00f2c748e9fdb2f1100226d8b4b976a47_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:549f2d54aaa66f9ab68e08f49e4f0cd95ffbbc93607ef7a112b74b177e57cfd0_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:5664f48403387a9e64370337d3ea5eb30ec27336f6e8f47a3a8a3ba0fe96741c_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:c95f763b803f53276670cea4fdf289983e472361a00a6d7da0bb56b3e857a935_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:60bfc1aeb95ff74fd2d8bd29700994594c92b93795b63f02fd0d7bb2d3d6fba7_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:1c0d155195bfd251b40da10e153c8a738250f14253f337b198476740cb7bd81a_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:26fdde499994a4be0eb277bbbca899061384f20673672ef30ed301d792b3108d_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:5d08c7ee6886747dc077faa7f1e4e696b5ad29cc4dcc8fd2c4f3d7a434f47f9b_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:e1cdb58bf2783a9a50346e1690f51b09e175c8ebb737b11332658d85bcb645e9_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:c5083edbd43692dc5ef5b0cf14417eea19412c0927ede39a87ade36515cf16f1_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:d56042518051b3e4dbef3da9f13d74fd8e8a6b9ad8520965052f1522247b70ef_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:d6401dc97f1adeafcfb8a34e3c1fe8230cd2ca6bb7c4245ef875a4b3fa35b014_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:f54ab8388a0f593c2426c240c7d50fd7f3f2263e1c88f7726dbbe2ebbed38896_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:0d629bbf41a55434b40545e12c5f0d95e357b0fd74303feec657918b90321642_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:7d6aecb4a7e98dcabc77c3043e214bec9fa521af9c6a048ece876ba9f294dce8_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:d69d7290c5e07301e9397df551e97d8d81795ba7c711d95f60bd178fc39f1434_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:e095cffba13badc4aab65f9920f8e618c9fe4411d6d53d8b160716a31fe2d6e7_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:26f519f9f0e7e41f7f6b12bfd2f968bfb5196f05781493752e17a85d09b0b976_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:3b1112d42f42c721287e1da5e5a87b6832889ed532b1acae27caeb64f1bb44f9_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:b3ac0453a1d16b2a9d1314991cd7642d637c5d9af3e884aabd88e4e9b73c59c6_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:c6491240cf919793d2d0646e7cd505f7c45f18655c600593e06c98324bf0dc71_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2456335"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the `crypto/x509` package within Go (golang). When verifying a certificate chain, excluded DNS (Domain Name System) constraints are not correctly applied to wildcard DNS Subject Alternative Names (SANs) if the case of the SAN differs from the constraint. This oversight could allow an attacker to bypass certificate validation, potentially leading to the acceptance of a malicious certificate that should have been rejected. This issue specifically impacts the validation of trusted certificate chains.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Go crypto/x509: Certificate validation bypass due to incorrect DNS constraint application",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:71f49240685245565f35d7d4b6d7d55b442cb61bc7c0f4d25c5529ca9187ae9f_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:78775c452a2c5ddb3568b677c2790815fb2a2d6afacbfacccdaf68b79c8fe39c_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:c44d2ad3d716e7c753ec538654d25c42d80539071f1d5f81df4a8fd5e76c7a58_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:f4752a62de9c94e0f84aaa6cddfeb4a5cbecab6c83147b72b6f05ddef23fe192_s390x"
],
"known_not_affected": [
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:092c9b4af55870d904beac952acf0fd914a2e784472888bb9f2c108548ff4906_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:25a9ca58f1104d83e0e312baf241f3eb048220c22a0065eed70106d9991faea4_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:2c6b079cf3184539f06634afcb35784ac74110c04fec36dfa80c2b0789d9099d_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:7b579fdc1d1dca3f32c2172eddb899ef3f8ff39d7af5cbed854d48e1d9e27675_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:2a33081f6d32826d53821e1aea686e1a6e8cb30fea8e601c00729c06511b98c6_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:31af187e314a843c4c02edd119d5edc2c260baca4d9a4ec2347f80f5511d6d3f_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:355cfa27d099cce3743ffa8432d2070ae3f21a446b560f6c1c5146b7351d116a_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:64d5bfb3e3a9861b3cefdb49c0f9b286aad11ccb31867092de08e48630694f82_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:3d20f5041cd11c838fc15148f60650ae0824b4c7816eb50152a28693443b0cd0_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:596cfba3fdac5cd9ee725f6b9e0bc640eaf7e933d019d9d57ea840592ec72f23_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:a22a2cca1f48ee743a15c68ca22d1d76943c25b2069e80a4bc1275c8157284db_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:a9d691eec41e370daff6737ed9d0b8c018b5426ff195b77897fd579846858e39_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:54890d05d56aeee46f051f42959500e00f2c748e9fdb2f1100226d8b4b976a47_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:549f2d54aaa66f9ab68e08f49e4f0cd95ffbbc93607ef7a112b74b177e57cfd0_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:5664f48403387a9e64370337d3ea5eb30ec27336f6e8f47a3a8a3ba0fe96741c_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:c95f763b803f53276670cea4fdf289983e472361a00a6d7da0bb56b3e857a935_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:60bfc1aeb95ff74fd2d8bd29700994594c92b93795b63f02fd0d7bb2d3d6fba7_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:1c0d155195bfd251b40da10e153c8a738250f14253f337b198476740cb7bd81a_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:26fdde499994a4be0eb277bbbca899061384f20673672ef30ed301d792b3108d_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:5d08c7ee6886747dc077faa7f1e4e696b5ad29cc4dcc8fd2c4f3d7a434f47f9b_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:e1cdb58bf2783a9a50346e1690f51b09e175c8ebb737b11332658d85bcb645e9_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:c5083edbd43692dc5ef5b0cf14417eea19412c0927ede39a87ade36515cf16f1_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:d56042518051b3e4dbef3da9f13d74fd8e8a6b9ad8520965052f1522247b70ef_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:d6401dc97f1adeafcfb8a34e3c1fe8230cd2ca6bb7c4245ef875a4b3fa35b014_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:f54ab8388a0f593c2426c240c7d50fd7f3f2263e1c88f7726dbbe2ebbed38896_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:0d629bbf41a55434b40545e12c5f0d95e357b0fd74303feec657918b90321642_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:7d6aecb4a7e98dcabc77c3043e214bec9fa521af9c6a048ece876ba9f294dce8_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:d69d7290c5e07301e9397df551e97d8d81795ba7c711d95f60bd178fc39f1434_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:e095cffba13badc4aab65f9920f8e618c9fe4411d6d53d8b160716a31fe2d6e7_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:26f519f9f0e7e41f7f6b12bfd2f968bfb5196f05781493752e17a85d09b0b976_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:3b1112d42f42c721287e1da5e5a87b6832889ed532b1acae27caeb64f1bb44f9_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:b3ac0453a1d16b2a9d1314991cd7642d637c5d9af3e884aabd88e4e9b73c59c6_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:c6491240cf919793d2d0646e7cd505f7c45f18655c600593e06c98324bf0dc71_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-33810"
},
{
"category": "external",
"summary": "RHBZ#2456335",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2456335"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-33810",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33810"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-33810",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33810"
},
{
"category": "external",
"summary": "https://go.dev/cl/763763",
"url": "https://go.dev/cl/763763"
},
{
"category": "external",
"summary": "https://go.dev/issue/78332",
"url": "https://go.dev/issue/78332"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU",
"url": "https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4866",
"url": "https://pkg.go.dev/vuln/GO-2026-4866"
}
],
"release_date": "2026-04-08T01:06:56.546000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-28T07:16:04+00:00",
"details": "It is recommended that existing users of Red Hat OpenShift Builds 1.6.4 upgrades to to 1.6.5",
"product_ids": [
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:71f49240685245565f35d7d4b6d7d55b442cb61bc7c0f4d25c5529ca9187ae9f_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:78775c452a2c5ddb3568b677c2790815fb2a2d6afacbfacccdaf68b79c8fe39c_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:c44d2ad3d716e7c753ec538654d25c42d80539071f1d5f81df4a8fd5e76c7a58_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:f4752a62de9c94e0f84aaa6cddfeb4a5cbecab6c83147b72b6f05ddef23fe192_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:11330"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:092c9b4af55870d904beac952acf0fd914a2e784472888bb9f2c108548ff4906_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:25a9ca58f1104d83e0e312baf241f3eb048220c22a0065eed70106d9991faea4_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:2c6b079cf3184539f06634afcb35784ac74110c04fec36dfa80c2b0789d9099d_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:7b579fdc1d1dca3f32c2172eddb899ef3f8ff39d7af5cbed854d48e1d9e27675_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:2a33081f6d32826d53821e1aea686e1a6e8cb30fea8e601c00729c06511b98c6_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:31af187e314a843c4c02edd119d5edc2c260baca4d9a4ec2347f80f5511d6d3f_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:355cfa27d099cce3743ffa8432d2070ae3f21a446b560f6c1c5146b7351d116a_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:64d5bfb3e3a9861b3cefdb49c0f9b286aad11ccb31867092de08e48630694f82_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:3d20f5041cd11c838fc15148f60650ae0824b4c7816eb50152a28693443b0cd0_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:596cfba3fdac5cd9ee725f6b9e0bc640eaf7e933d019d9d57ea840592ec72f23_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:a22a2cca1f48ee743a15c68ca22d1d76943c25b2069e80a4bc1275c8157284db_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:a9d691eec41e370daff6737ed9d0b8c018b5426ff195b77897fd579846858e39_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:54890d05d56aeee46f051f42959500e00f2c748e9fdb2f1100226d8b4b976a47_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:549f2d54aaa66f9ab68e08f49e4f0cd95ffbbc93607ef7a112b74b177e57cfd0_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:5664f48403387a9e64370337d3ea5eb30ec27336f6e8f47a3a8a3ba0fe96741c_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:c95f763b803f53276670cea4fdf289983e472361a00a6d7da0bb56b3e857a935_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:60bfc1aeb95ff74fd2d8bd29700994594c92b93795b63f02fd0d7bb2d3d6fba7_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:1c0d155195bfd251b40da10e153c8a738250f14253f337b198476740cb7bd81a_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:26fdde499994a4be0eb277bbbca899061384f20673672ef30ed301d792b3108d_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:5d08c7ee6886747dc077faa7f1e4e696b5ad29cc4dcc8fd2c4f3d7a434f47f9b_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:e1cdb58bf2783a9a50346e1690f51b09e175c8ebb737b11332658d85bcb645e9_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:c5083edbd43692dc5ef5b0cf14417eea19412c0927ede39a87ade36515cf16f1_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:d56042518051b3e4dbef3da9f13d74fd8e8a6b9ad8520965052f1522247b70ef_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:d6401dc97f1adeafcfb8a34e3c1fe8230cd2ca6bb7c4245ef875a4b3fa35b014_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:f54ab8388a0f593c2426c240c7d50fd7f3f2263e1c88f7726dbbe2ebbed38896_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:0d629bbf41a55434b40545e12c5f0d95e357b0fd74303feec657918b90321642_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:7d6aecb4a7e98dcabc77c3043e214bec9fa521af9c6a048ece876ba9f294dce8_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:d69d7290c5e07301e9397df551e97d8d81795ba7c711d95f60bd178fc39f1434_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:e095cffba13badc4aab65f9920f8e618c9fe4411d6d53d8b160716a31fe2d6e7_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:71f49240685245565f35d7d4b6d7d55b442cb61bc7c0f4d25c5529ca9187ae9f_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:78775c452a2c5ddb3568b677c2790815fb2a2d6afacbfacccdaf68b79c8fe39c_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:c44d2ad3d716e7c753ec538654d25c42d80539071f1d5f81df4a8fd5e76c7a58_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:f4752a62de9c94e0f84aaa6cddfeb4a5cbecab6c83147b72b6f05ddef23fe192_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:26f519f9f0e7e41f7f6b12bfd2f968bfb5196f05781493752e17a85d09b0b976_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:3b1112d42f42c721287e1da5e5a87b6832889ed532b1acae27caeb64f1bb44f9_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:b3ac0453a1d16b2a9d1314991cd7642d637c5d9af3e884aabd88e4e9b73c59c6_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:c6491240cf919793d2d0646e7cd505f7c45f18655c600593e06c98324bf0dc71_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Go crypto/x509: Certificate validation bypass due to incorrect DNS constraint application"
}
]
}
RHSA-2026:11331
Vulnerability from csaf_redhat - Published: 2026-04-28 07:19 - Updated: 2026-05-04 17:04A flaw was found in the crypto/tls component. This vulnerability occurs during Transport Layer Security (TLS) session resumption when certificate authority (CA) settings are modified between the initial and resumed handshakes. An attacker could exploit this to bypass certificate validation, allowing a client or server to establish a connection that should have been rejected. This could lead to an authentication bypass under specific conditions.
The Go standard library function net/url.Parse insufficiently validated the host/authority component and accepted some invalid URLs by effectively treating garbage before an IP-literal as ignorable. The function should have rejected this as invalid.
A certificate validation flaw has been discovered in the golang crypto/x509 module. When verifying a certificate chain which contains a certificate containing multiple email address constraints which share common local portions but different domain portions, these constraints will not be properly applied, and only the last constraint will be considered.
A flaw was found in gRPC-Go, the Go language implementation of gRPC. This vulnerability, an authorization bypass, is caused by improper input validation of the HTTP/2 `:path` pseudo-header. A remote attacker can exploit this by sending raw HTTP/2 frames with a malformed `:path` that omits the mandatory leading slash. This allows the attacker to bypass defined security policies, potentially leading to unauthorized access to services or information disclosure.
A flaw was found in Tekton Pipelines, specifically in the Tekton Pipelines git resolver. A tenant with permissions to create ResolutionRequests can exploit a path traversal vulnerability via the `pathInRepo` parameter. This allows the tenant to read arbitrary files from the resolver pod's filesystem, leading to information disclosure, including sensitive ServiceAccount tokens. The contents of these files are returned in a base64-encoded format.
A flaw was found in the `crypto/x509` package within Go (golang). When verifying a certificate chain, excluded DNS (Domain Name System) constraints are not correctly applied to wildcard DNS Subject Alternative Names (SANs) if the case of the SAN differs from the constraint. This oversight could allow an attacker to bypass certificate validation, potentially leading to the acceptance of a malicious certificate that should have been rejected. This issue specifically impacts the validation of trusted certificate chains.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Builds 1.7.2",
"title": "Topic"
},
{
"category": "general",
"text": "Releases of Red Hat OpenShift Builds 1.7.2",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:11331",
"url": "https://access.redhat.com/errata/RHSA-2026:11331"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-68121",
"url": "https://access.redhat.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-25679",
"url": "https://access.redhat.com/security/cve/CVE-2026-25679"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-27137",
"url": "https://access.redhat.com/security/cve/CVE-2026-27137"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-33186",
"url": "https://access.redhat.com/security/cve/CVE-2026-33186"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-33211",
"url": "https://access.redhat.com/security/cve/CVE-2026-33211"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-33810",
"url": "https://access.redhat.com/security/cve/CVE-2026-33810"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/builds_for_red_hat_openshift/1.7",
"url": "https://docs.redhat.com/en/documentation/builds_for_red_hat_openshift/1.7"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_11331.json"
}
],
"title": "Red Hat Security Advisory: Red Hat OpenShift Builds 1.7.2",
"tracking": {
"current_release_date": "2026-05-04T17:04:26+00:00",
"generator": {
"date": "2026-05-04T17:04:26+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.9"
}
},
"id": "RHSA-2026:11331",
"initial_release_date": "2026-04-28T07:19:47+00:00",
"revision_history": [
{
"date": "2026-04-28T07:19:47+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-04-28T07:20:00+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-05-04T17:04:26+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Builds 1.7.2",
"product": {
"name": "Red Hat OpenShift Builds 1.7.2",
"product_id": "Red Hat OpenShift Builds 1.7.2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift_builds:1.7::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Builds"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5008dcb0428a0837b9abd827963e7008c8e16af8cfcbd432421286fca63fe714_amd64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5008dcb0428a0837b9abd827963e7008c8e16af8cfcbd432421286fca63fe714_amd64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5008dcb0428a0837b9abd827963e7008c8e16af8cfcbd432421286fca63fe714_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-controller-rhel9@sha256%3A5008dcb0428a0837b9abd827963e7008c8e16af8cfcbd432421286fca63fe714?arch=amd64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776846689"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:165f6085028f3859f6ede9176d413274ee1a457b72cd9c437795146c20b0722c_amd64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:165f6085028f3859f6ede9176d413274ee1a457b72cd9c437795146c20b0722c_amd64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:165f6085028f3859f6ede9176d413274ee1a457b72cd9c437795146c20b0722c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-git-cloner-rhel9@sha256%3A165f6085028f3859f6ede9176d413274ee1a457b72cd9c437795146c20b0722c?arch=amd64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776847166"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:985b19d79b3e54fc8b99b9b0239b74dcf6d0102d3ff0cd5363ae4627069d2ee1_amd64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:985b19d79b3e54fc8b99b9b0239b74dcf6d0102d3ff0cd5363ae4627069d2ee1_amd64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:985b19d79b3e54fc8b99b9b0239b74dcf6d0102d3ff0cd5363ae4627069d2ee1_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-image-bundler-rhel9@sha256%3A985b19d79b3e54fc8b99b9b0239b74dcf6d0102d3ff0cd5363ae4627069d2ee1?arch=amd64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776846372"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:f5f35702e424cd4e9b768c59d44928844b2d09fbb98d368ae7b54b7ec0771d13_amd64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:f5f35702e424cd4e9b768c59d44928844b2d09fbb98d368ae7b54b7ec0771d13_amd64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:f5f35702e424cd4e9b768c59d44928844b2d09fbb98d368ae7b54b7ec0771d13_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-image-processing-rhel9@sha256%3Af5f35702e424cd4e9b768c59d44928844b2d09fbb98d368ae7b54b7ec0771d13?arch=amd64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776849396"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:5e83175abaef1e3046bac94621a86e036317833c740cdd6d235f1133a1388dd3_amd64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:5e83175abaef1e3046bac94621a86e036317833c740cdd6d235f1133a1388dd3_amd64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:5e83175abaef1e3046bac94621a86e036317833c740cdd6d235f1133a1388dd3_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-rhel9-operator@sha256%3A5e83175abaef1e3046bac94621a86e036317833c740cdd6d235f1133a1388dd3?arch=amd64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776860241"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:093834bac2e2f7f01968ef542b9bcbf5fbe530c9f0dd86521825797abb4a33a2_amd64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:093834bac2e2f7f01968ef542b9bcbf5fbe530c9f0dd86521825797abb4a33a2_amd64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:093834bac2e2f7f01968ef542b9bcbf5fbe530c9f0dd86521825797abb4a33a2_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-operator-bundle@sha256%3A093834bac2e2f7f01968ef542b9bcbf5fbe530c9f0dd86521825797abb4a33a2?arch=amd64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776937971"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:16cf5e33f297c027686d3ba9c6cbb01dba7a39299e2765fe4eaacc892b32f0d1_amd64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:16cf5e33f297c027686d3ba9c6cbb01dba7a39299e2765fe4eaacc892b32f0d1_amd64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:16cf5e33f297c027686d3ba9c6cbb01dba7a39299e2765fe4eaacc892b32f0d1_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-shared-resource-rhel9@sha256%3A16cf5e33f297c027686d3ba9c6cbb01dba7a39299e2765fe4eaacc892b32f0d1?arch=amd64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776851459"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:f2c222424cd66659ebea6787b6934c2d01d9eeb4f7db03ebfa16ab7b65aeb5b2_amd64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:f2c222424cd66659ebea6787b6934c2d01d9eeb4f7db03ebfa16ab7b65aeb5b2_amd64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:f2c222424cd66659ebea6787b6934c2d01d9eeb4f7db03ebfa16ab7b65aeb5b2_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-shared-resource-webhook-rhel9@sha256%3Af2c222424cd66659ebea6787b6934c2d01d9eeb4f7db03ebfa16ab7b65aeb5b2?arch=amd64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776852111"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:153f9e059139e6dbaeb2e5166d21bfeec59a59aa5cd8045e11dbfa091479b4bb_amd64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:153f9e059139e6dbaeb2e5166d21bfeec59a59aa5cd8045e11dbfa091479b4bb_amd64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:153f9e059139e6dbaeb2e5166d21bfeec59a59aa5cd8045e11dbfa091479b4bb_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-waiters-rhel9@sha256%3A153f9e059139e6dbaeb2e5166d21bfeec59a59aa5cd8045e11dbfa091479b4bb?arch=amd64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776846936"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:6234cfecf4dd75b8c4ff1c527ad4eb306d966cfa0170ecdb8ea4bc69c2cdc495_amd64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:6234cfecf4dd75b8c4ff1c527ad4eb306d966cfa0170ecdb8ea4bc69c2cdc495_amd64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:6234cfecf4dd75b8c4ff1c527ad4eb306d966cfa0170ecdb8ea4bc69c2cdc495_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-webhook-rhel9@sha256%3A6234cfecf4dd75b8c4ff1c527ad4eb306d966cfa0170ecdb8ea4bc69c2cdc495?arch=amd64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776846493"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:eb32b129ea6a10b4aada4313ff11b04c33b99877eea9a5e567245d361d69f140_arm64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:eb32b129ea6a10b4aada4313ff11b04c33b99877eea9a5e567245d361d69f140_arm64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:eb32b129ea6a10b4aada4313ff11b04c33b99877eea9a5e567245d361d69f140_arm64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-controller-rhel9@sha256%3Aeb32b129ea6a10b4aada4313ff11b04c33b99877eea9a5e567245d361d69f140?arch=arm64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776846689"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:7a39f26f51bcbb4ef395208db01e2b0ee8b1fe9b15b3701c9c35d8f636f790d9_arm64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:7a39f26f51bcbb4ef395208db01e2b0ee8b1fe9b15b3701c9c35d8f636f790d9_arm64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:7a39f26f51bcbb4ef395208db01e2b0ee8b1fe9b15b3701c9c35d8f636f790d9_arm64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-git-cloner-rhel9@sha256%3A7a39f26f51bcbb4ef395208db01e2b0ee8b1fe9b15b3701c9c35d8f636f790d9?arch=arm64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776847166"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:0070df2a8c7882ae021000c498ead96b19f1bd6819e46657d5898cb71e6ec506_arm64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:0070df2a8c7882ae021000c498ead96b19f1bd6819e46657d5898cb71e6ec506_arm64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:0070df2a8c7882ae021000c498ead96b19f1bd6819e46657d5898cb71e6ec506_arm64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-image-bundler-rhel9@sha256%3A0070df2a8c7882ae021000c498ead96b19f1bd6819e46657d5898cb71e6ec506?arch=arm64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776846372"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:2a0a6ea6465a6d165f072ef782a1825cc16ecfb2f8c58d5ec58c1d40d02e5208_arm64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:2a0a6ea6465a6d165f072ef782a1825cc16ecfb2f8c58d5ec58c1d40d02e5208_arm64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:2a0a6ea6465a6d165f072ef782a1825cc16ecfb2f8c58d5ec58c1d40d02e5208_arm64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-image-processing-rhel9@sha256%3A2a0a6ea6465a6d165f072ef782a1825cc16ecfb2f8c58d5ec58c1d40d02e5208?arch=arm64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776849396"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:382be8775c61942123adac2acec9f48085ebf7fd2b286c20e36a33ea6462baa7_arm64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:382be8775c61942123adac2acec9f48085ebf7fd2b286c20e36a33ea6462baa7_arm64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:382be8775c61942123adac2acec9f48085ebf7fd2b286c20e36a33ea6462baa7_arm64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-rhel9-operator@sha256%3A382be8775c61942123adac2acec9f48085ebf7fd2b286c20e36a33ea6462baa7?arch=arm64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776860241"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:4715242f98234d2018f8317d9a57f63ff23b4d63be96491d55af2a2ef4572261_arm64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:4715242f98234d2018f8317d9a57f63ff23b4d63be96491d55af2a2ef4572261_arm64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:4715242f98234d2018f8317d9a57f63ff23b4d63be96491d55af2a2ef4572261_arm64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-shared-resource-rhel9@sha256%3A4715242f98234d2018f8317d9a57f63ff23b4d63be96491d55af2a2ef4572261?arch=arm64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776851459"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:b020334c46f2d7276ba0c3aa8be7951254b197b2da310f0c22d2e16681a6a265_arm64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:b020334c46f2d7276ba0c3aa8be7951254b197b2da310f0c22d2e16681a6a265_arm64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:b020334c46f2d7276ba0c3aa8be7951254b197b2da310f0c22d2e16681a6a265_arm64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-shared-resource-webhook-rhel9@sha256%3Ab020334c46f2d7276ba0c3aa8be7951254b197b2da310f0c22d2e16681a6a265?arch=arm64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776852111"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:cd9ada6b38c080eec45e1d053ec305dde2d574899019ffb01a28dbe1dd582912_arm64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:cd9ada6b38c080eec45e1d053ec305dde2d574899019ffb01a28dbe1dd582912_arm64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:cd9ada6b38c080eec45e1d053ec305dde2d574899019ffb01a28dbe1dd582912_arm64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-waiters-rhel9@sha256%3Acd9ada6b38c080eec45e1d053ec305dde2d574899019ffb01a28dbe1dd582912?arch=arm64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776846936"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1a57b53f8642ccb95884687efc251ad52e8ee3e718b55d0f4d21f800dfd3f5fa_arm64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1a57b53f8642ccb95884687efc251ad52e8ee3e718b55d0f4d21f800dfd3f5fa_arm64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1a57b53f8642ccb95884687efc251ad52e8ee3e718b55d0f4d21f800dfd3f5fa_arm64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-webhook-rhel9@sha256%3A1a57b53f8642ccb95884687efc251ad52e8ee3e718b55d0f4d21f800dfd3f5fa?arch=arm64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776846493"
}
}
}
],
"category": "architecture",
"name": "arm64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:6ddf185f2714d45fab92c831bf32673da55c7a43dbcf1bd22090b203791e03b2_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:6ddf185f2714d45fab92c831bf32673da55c7a43dbcf1bd22090b203791e03b2_ppc64le",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:6ddf185f2714d45fab92c831bf32673da55c7a43dbcf1bd22090b203791e03b2_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-controller-rhel9@sha256%3A6ddf185f2714d45fab92c831bf32673da55c7a43dbcf1bd22090b203791e03b2?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776846689"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:ec02f5f031fefd5a610b69a81be5350f96e54511e2d2c619e8b9fe8f193297b6_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:ec02f5f031fefd5a610b69a81be5350f96e54511e2d2c619e8b9fe8f193297b6_ppc64le",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:ec02f5f031fefd5a610b69a81be5350f96e54511e2d2c619e8b9fe8f193297b6_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-git-cloner-rhel9@sha256%3Aec02f5f031fefd5a610b69a81be5350f96e54511e2d2c619e8b9fe8f193297b6?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776847166"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:4b578a8ef1579d7168b7f0a1b7cebe66213003f8225a86cfdd4c9f24a5e2d871_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:4b578a8ef1579d7168b7f0a1b7cebe66213003f8225a86cfdd4c9f24a5e2d871_ppc64le",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:4b578a8ef1579d7168b7f0a1b7cebe66213003f8225a86cfdd4c9f24a5e2d871_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-image-bundler-rhel9@sha256%3A4b578a8ef1579d7168b7f0a1b7cebe66213003f8225a86cfdd4c9f24a5e2d871?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776846372"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:9734d0dc0367884e128837b7d02038a3b4136c4865ed3dc90902801393e178b4_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:9734d0dc0367884e128837b7d02038a3b4136c4865ed3dc90902801393e178b4_ppc64le",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:9734d0dc0367884e128837b7d02038a3b4136c4865ed3dc90902801393e178b4_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-image-processing-rhel9@sha256%3A9734d0dc0367884e128837b7d02038a3b4136c4865ed3dc90902801393e178b4?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776849396"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:190edd3effb60c56c885fc964d3eb48076293e1e43d745c4615ed00ef7daa145_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:190edd3effb60c56c885fc964d3eb48076293e1e43d745c4615ed00ef7daa145_ppc64le",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:190edd3effb60c56c885fc964d3eb48076293e1e43d745c4615ed00ef7daa145_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-rhel9-operator@sha256%3A190edd3effb60c56c885fc964d3eb48076293e1e43d745c4615ed00ef7daa145?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776860241"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:678c8d38900d994c4aa2e23669b7901747028690a4c5e4ba9aced4cbfe22b248_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:678c8d38900d994c4aa2e23669b7901747028690a4c5e4ba9aced4cbfe22b248_ppc64le",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:678c8d38900d994c4aa2e23669b7901747028690a4c5e4ba9aced4cbfe22b248_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-shared-resource-rhel9@sha256%3A678c8d38900d994c4aa2e23669b7901747028690a4c5e4ba9aced4cbfe22b248?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776851459"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:88b38ad10068e0574d2e5934849b98429c69305633b42aa4d19822ede2a6e10d_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:88b38ad10068e0574d2e5934849b98429c69305633b42aa4d19822ede2a6e10d_ppc64le",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:88b38ad10068e0574d2e5934849b98429c69305633b42aa4d19822ede2a6e10d_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-shared-resource-webhook-rhel9@sha256%3A88b38ad10068e0574d2e5934849b98429c69305633b42aa4d19822ede2a6e10d?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776852111"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:f17eb032f7250aa4a3bb99e2754fa4cb0dbfc9fbbb8c787f70ad30b71b27b5a2_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:f17eb032f7250aa4a3bb99e2754fa4cb0dbfc9fbbb8c787f70ad30b71b27b5a2_ppc64le",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:f17eb032f7250aa4a3bb99e2754fa4cb0dbfc9fbbb8c787f70ad30b71b27b5a2_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-waiters-rhel9@sha256%3Af17eb032f7250aa4a3bb99e2754fa4cb0dbfc9fbbb8c787f70ad30b71b27b5a2?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776846936"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:779e75a94141db7f8223b9861ba2fa3ba8baf6fa470bb0ab109945d75e20121b_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:779e75a94141db7f8223b9861ba2fa3ba8baf6fa470bb0ab109945d75e20121b_ppc64le",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:779e75a94141db7f8223b9861ba2fa3ba8baf6fa470bb0ab109945d75e20121b_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-webhook-rhel9@sha256%3A779e75a94141db7f8223b9861ba2fa3ba8baf6fa470bb0ab109945d75e20121b?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776846493"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5856cba3fe26ab7f756ba93e06caa6e522336ff36ff4c515132a8d35c85a2f64_s390x",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5856cba3fe26ab7f756ba93e06caa6e522336ff36ff4c515132a8d35c85a2f64_s390x",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5856cba3fe26ab7f756ba93e06caa6e522336ff36ff4c515132a8d35c85a2f64_s390x",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-controller-rhel9@sha256%3A5856cba3fe26ab7f756ba93e06caa6e522336ff36ff4c515132a8d35c85a2f64?arch=s390x\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776846689"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:a4d609ff22b610b625a74fffd22883d5debe93c2e0c6ae2bcbbfd8f5f6b2cf12_s390x",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:a4d609ff22b610b625a74fffd22883d5debe93c2e0c6ae2bcbbfd8f5f6b2cf12_s390x",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:a4d609ff22b610b625a74fffd22883d5debe93c2e0c6ae2bcbbfd8f5f6b2cf12_s390x",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-git-cloner-rhel9@sha256%3Aa4d609ff22b610b625a74fffd22883d5debe93c2e0c6ae2bcbbfd8f5f6b2cf12?arch=s390x\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776847166"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:8d6371a5fe374e3bc5c19a930ea712d266fab13a722768204b128bc71e928c97_s390x",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:8d6371a5fe374e3bc5c19a930ea712d266fab13a722768204b128bc71e928c97_s390x",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:8d6371a5fe374e3bc5c19a930ea712d266fab13a722768204b128bc71e928c97_s390x",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-image-bundler-rhel9@sha256%3A8d6371a5fe374e3bc5c19a930ea712d266fab13a722768204b128bc71e928c97?arch=s390x\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776846372"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:679b470190ff7a7fc04e283884be4f24d1b0c475d0730fb718f2f45c60551b61_s390x",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:679b470190ff7a7fc04e283884be4f24d1b0c475d0730fb718f2f45c60551b61_s390x",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:679b470190ff7a7fc04e283884be4f24d1b0c475d0730fb718f2f45c60551b61_s390x",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-image-processing-rhel9@sha256%3A679b470190ff7a7fc04e283884be4f24d1b0c475d0730fb718f2f45c60551b61?arch=s390x\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776849396"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:7173a298b07cbde3cd9ff12ca25f26ccf79b9ff8cfcb35a001c9f8c0b0291436_s390x",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:7173a298b07cbde3cd9ff12ca25f26ccf79b9ff8cfcb35a001c9f8c0b0291436_s390x",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:7173a298b07cbde3cd9ff12ca25f26ccf79b9ff8cfcb35a001c9f8c0b0291436_s390x",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-rhel9-operator@sha256%3A7173a298b07cbde3cd9ff12ca25f26ccf79b9ff8cfcb35a001c9f8c0b0291436?arch=s390x\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776860241"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:b39a2930e310d432a840798f03f7e55b8da42ff16ccda31790f85558d2be2537_s390x",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:b39a2930e310d432a840798f03f7e55b8da42ff16ccda31790f85558d2be2537_s390x",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:b39a2930e310d432a840798f03f7e55b8da42ff16ccda31790f85558d2be2537_s390x",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-shared-resource-rhel9@sha256%3Ab39a2930e310d432a840798f03f7e55b8da42ff16ccda31790f85558d2be2537?arch=s390x\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776851459"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:1d01e27a3cdea6c99a985b877e29629d1c1fb00203f4a90c45db6df7a602e2cc_s390x",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:1d01e27a3cdea6c99a985b877e29629d1c1fb00203f4a90c45db6df7a602e2cc_s390x",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:1d01e27a3cdea6c99a985b877e29629d1c1fb00203f4a90c45db6df7a602e2cc_s390x",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-shared-resource-webhook-rhel9@sha256%3A1d01e27a3cdea6c99a985b877e29629d1c1fb00203f4a90c45db6df7a602e2cc?arch=s390x\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776852111"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:b2173caa314ae26d2a300f61cfa94031c34fe7676fd007418849212082db3636_s390x",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:b2173caa314ae26d2a300f61cfa94031c34fe7676fd007418849212082db3636_s390x",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:b2173caa314ae26d2a300f61cfa94031c34fe7676fd007418849212082db3636_s390x",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-waiters-rhel9@sha256%3Ab2173caa314ae26d2a300f61cfa94031c34fe7676fd007418849212082db3636?arch=s390x\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776846936"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:e593bebc4e753ac3c4cdd1be05711452dbda6e3b015b37926fa804851bdad6a8_s390x",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:e593bebc4e753ac3c4cdd1be05711452dbda6e3b015b37926fa804851bdad6a8_s390x",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:e593bebc4e753ac3c4cdd1be05711452dbda6e3b015b37926fa804851bdad6a8_s390x",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-webhook-rhel9@sha256%3Ae593bebc4e753ac3c4cdd1be05711452dbda6e3b015b37926fa804851bdad6a8?arch=s390x\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776846493"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5008dcb0428a0837b9abd827963e7008c8e16af8cfcbd432421286fca63fe714_amd64 as a component of Red Hat OpenShift Builds 1.7.2",
"product_id": "Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5008dcb0428a0837b9abd827963e7008c8e16af8cfcbd432421286fca63fe714_amd64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5008dcb0428a0837b9abd827963e7008c8e16af8cfcbd432421286fca63fe714_amd64",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.7.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5856cba3fe26ab7f756ba93e06caa6e522336ff36ff4c515132a8d35c85a2f64_s390x as a component of Red Hat OpenShift Builds 1.7.2",
"product_id": "Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5856cba3fe26ab7f756ba93e06caa6e522336ff36ff4c515132a8d35c85a2f64_s390x"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5856cba3fe26ab7f756ba93e06caa6e522336ff36ff4c515132a8d35c85a2f64_s390x",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.7.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:6ddf185f2714d45fab92c831bf32673da55c7a43dbcf1bd22090b203791e03b2_ppc64le as a component of Red Hat OpenShift Builds 1.7.2",
"product_id": "Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:6ddf185f2714d45fab92c831bf32673da55c7a43dbcf1bd22090b203791e03b2_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:6ddf185f2714d45fab92c831bf32673da55c7a43dbcf1bd22090b203791e03b2_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.7.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:eb32b129ea6a10b4aada4313ff11b04c33b99877eea9a5e567245d361d69f140_arm64 as a component of Red Hat OpenShift Builds 1.7.2",
"product_id": "Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:eb32b129ea6a10b4aada4313ff11b04c33b99877eea9a5e567245d361d69f140_arm64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:eb32b129ea6a10b4aada4313ff11b04c33b99877eea9a5e567245d361d69f140_arm64",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.7.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:165f6085028f3859f6ede9176d413274ee1a457b72cd9c437795146c20b0722c_amd64 as a component of Red Hat OpenShift Builds 1.7.2",
"product_id": "Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:165f6085028f3859f6ede9176d413274ee1a457b72cd9c437795146c20b0722c_amd64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:165f6085028f3859f6ede9176d413274ee1a457b72cd9c437795146c20b0722c_amd64",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.7.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:7a39f26f51bcbb4ef395208db01e2b0ee8b1fe9b15b3701c9c35d8f636f790d9_arm64 as a component of Red Hat OpenShift Builds 1.7.2",
"product_id": "Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:7a39f26f51bcbb4ef395208db01e2b0ee8b1fe9b15b3701c9c35d8f636f790d9_arm64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:7a39f26f51bcbb4ef395208db01e2b0ee8b1fe9b15b3701c9c35d8f636f790d9_arm64",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.7.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:a4d609ff22b610b625a74fffd22883d5debe93c2e0c6ae2bcbbfd8f5f6b2cf12_s390x as a component of Red Hat OpenShift Builds 1.7.2",
"product_id": "Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:a4d609ff22b610b625a74fffd22883d5debe93c2e0c6ae2bcbbfd8f5f6b2cf12_s390x"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:a4d609ff22b610b625a74fffd22883d5debe93c2e0c6ae2bcbbfd8f5f6b2cf12_s390x",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.7.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:ec02f5f031fefd5a610b69a81be5350f96e54511e2d2c619e8b9fe8f193297b6_ppc64le as a component of Red Hat OpenShift Builds 1.7.2",
"product_id": "Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:ec02f5f031fefd5a610b69a81be5350f96e54511e2d2c619e8b9fe8f193297b6_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:ec02f5f031fefd5a610b69a81be5350f96e54511e2d2c619e8b9fe8f193297b6_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.7.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:0070df2a8c7882ae021000c498ead96b19f1bd6819e46657d5898cb71e6ec506_arm64 as a component of Red Hat OpenShift Builds 1.7.2",
"product_id": "Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:0070df2a8c7882ae021000c498ead96b19f1bd6819e46657d5898cb71e6ec506_arm64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:0070df2a8c7882ae021000c498ead96b19f1bd6819e46657d5898cb71e6ec506_arm64",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.7.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:4b578a8ef1579d7168b7f0a1b7cebe66213003f8225a86cfdd4c9f24a5e2d871_ppc64le as a component of Red Hat OpenShift Builds 1.7.2",
"product_id": "Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:4b578a8ef1579d7168b7f0a1b7cebe66213003f8225a86cfdd4c9f24a5e2d871_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:4b578a8ef1579d7168b7f0a1b7cebe66213003f8225a86cfdd4c9f24a5e2d871_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.7.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:8d6371a5fe374e3bc5c19a930ea712d266fab13a722768204b128bc71e928c97_s390x as a component of Red Hat OpenShift Builds 1.7.2",
"product_id": "Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:8d6371a5fe374e3bc5c19a930ea712d266fab13a722768204b128bc71e928c97_s390x"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:8d6371a5fe374e3bc5c19a930ea712d266fab13a722768204b128bc71e928c97_s390x",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.7.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:985b19d79b3e54fc8b99b9b0239b74dcf6d0102d3ff0cd5363ae4627069d2ee1_amd64 as a component of Red Hat OpenShift Builds 1.7.2",
"product_id": "Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:985b19d79b3e54fc8b99b9b0239b74dcf6d0102d3ff0cd5363ae4627069d2ee1_amd64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:985b19d79b3e54fc8b99b9b0239b74dcf6d0102d3ff0cd5363ae4627069d2ee1_amd64",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.7.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:2a0a6ea6465a6d165f072ef782a1825cc16ecfb2f8c58d5ec58c1d40d02e5208_arm64 as a component of Red Hat OpenShift Builds 1.7.2",
"product_id": "Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:2a0a6ea6465a6d165f072ef782a1825cc16ecfb2f8c58d5ec58c1d40d02e5208_arm64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:2a0a6ea6465a6d165f072ef782a1825cc16ecfb2f8c58d5ec58c1d40d02e5208_arm64",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.7.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:679b470190ff7a7fc04e283884be4f24d1b0c475d0730fb718f2f45c60551b61_s390x as a component of Red Hat OpenShift Builds 1.7.2",
"product_id": "Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:679b470190ff7a7fc04e283884be4f24d1b0c475d0730fb718f2f45c60551b61_s390x"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:679b470190ff7a7fc04e283884be4f24d1b0c475d0730fb718f2f45c60551b61_s390x",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.7.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:9734d0dc0367884e128837b7d02038a3b4136c4865ed3dc90902801393e178b4_ppc64le as a component of Red Hat OpenShift Builds 1.7.2",
"product_id": "Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:9734d0dc0367884e128837b7d02038a3b4136c4865ed3dc90902801393e178b4_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:9734d0dc0367884e128837b7d02038a3b4136c4865ed3dc90902801393e178b4_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.7.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:f5f35702e424cd4e9b768c59d44928844b2d09fbb98d368ae7b54b7ec0771d13_amd64 as a component of Red Hat OpenShift Builds 1.7.2",
"product_id": "Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:f5f35702e424cd4e9b768c59d44928844b2d09fbb98d368ae7b54b7ec0771d13_amd64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:f5f35702e424cd4e9b768c59d44928844b2d09fbb98d368ae7b54b7ec0771d13_amd64",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.7.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:093834bac2e2f7f01968ef542b9bcbf5fbe530c9f0dd86521825797abb4a33a2_amd64 as a component of Red Hat OpenShift Builds 1.7.2",
"product_id": "Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:093834bac2e2f7f01968ef542b9bcbf5fbe530c9f0dd86521825797abb4a33a2_amd64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:093834bac2e2f7f01968ef542b9bcbf5fbe530c9f0dd86521825797abb4a33a2_amd64",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.7.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:190edd3effb60c56c885fc964d3eb48076293e1e43d745c4615ed00ef7daa145_ppc64le as a component of Red Hat OpenShift Builds 1.7.2",
"product_id": "Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:190edd3effb60c56c885fc964d3eb48076293e1e43d745c4615ed00ef7daa145_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:190edd3effb60c56c885fc964d3eb48076293e1e43d745c4615ed00ef7daa145_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.7.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:382be8775c61942123adac2acec9f48085ebf7fd2b286c20e36a33ea6462baa7_arm64 as a component of Red Hat OpenShift Builds 1.7.2",
"product_id": "Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:382be8775c61942123adac2acec9f48085ebf7fd2b286c20e36a33ea6462baa7_arm64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:382be8775c61942123adac2acec9f48085ebf7fd2b286c20e36a33ea6462baa7_arm64",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.7.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:5e83175abaef1e3046bac94621a86e036317833c740cdd6d235f1133a1388dd3_amd64 as a component of Red Hat OpenShift Builds 1.7.2",
"product_id": "Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:5e83175abaef1e3046bac94621a86e036317833c740cdd6d235f1133a1388dd3_amd64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:5e83175abaef1e3046bac94621a86e036317833c740cdd6d235f1133a1388dd3_amd64",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.7.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:7173a298b07cbde3cd9ff12ca25f26ccf79b9ff8cfcb35a001c9f8c0b0291436_s390x as a component of Red Hat OpenShift Builds 1.7.2",
"product_id": "Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:7173a298b07cbde3cd9ff12ca25f26ccf79b9ff8cfcb35a001c9f8c0b0291436_s390x"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:7173a298b07cbde3cd9ff12ca25f26ccf79b9ff8cfcb35a001c9f8c0b0291436_s390x",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.7.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:16cf5e33f297c027686d3ba9c6cbb01dba7a39299e2765fe4eaacc892b32f0d1_amd64 as a component of Red Hat OpenShift Builds 1.7.2",
"product_id": "Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:16cf5e33f297c027686d3ba9c6cbb01dba7a39299e2765fe4eaacc892b32f0d1_amd64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:16cf5e33f297c027686d3ba9c6cbb01dba7a39299e2765fe4eaacc892b32f0d1_amd64",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.7.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:4715242f98234d2018f8317d9a57f63ff23b4d63be96491d55af2a2ef4572261_arm64 as a component of Red Hat OpenShift Builds 1.7.2",
"product_id": "Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:4715242f98234d2018f8317d9a57f63ff23b4d63be96491d55af2a2ef4572261_arm64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:4715242f98234d2018f8317d9a57f63ff23b4d63be96491d55af2a2ef4572261_arm64",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.7.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:678c8d38900d994c4aa2e23669b7901747028690a4c5e4ba9aced4cbfe22b248_ppc64le as a component of Red Hat OpenShift Builds 1.7.2",
"product_id": "Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:678c8d38900d994c4aa2e23669b7901747028690a4c5e4ba9aced4cbfe22b248_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:678c8d38900d994c4aa2e23669b7901747028690a4c5e4ba9aced4cbfe22b248_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.7.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:b39a2930e310d432a840798f03f7e55b8da42ff16ccda31790f85558d2be2537_s390x as a component of Red Hat OpenShift Builds 1.7.2",
"product_id": "Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:b39a2930e310d432a840798f03f7e55b8da42ff16ccda31790f85558d2be2537_s390x"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:b39a2930e310d432a840798f03f7e55b8da42ff16ccda31790f85558d2be2537_s390x",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.7.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:1d01e27a3cdea6c99a985b877e29629d1c1fb00203f4a90c45db6df7a602e2cc_s390x as a component of Red Hat OpenShift Builds 1.7.2",
"product_id": "Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:1d01e27a3cdea6c99a985b877e29629d1c1fb00203f4a90c45db6df7a602e2cc_s390x"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:1d01e27a3cdea6c99a985b877e29629d1c1fb00203f4a90c45db6df7a602e2cc_s390x",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.7.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:88b38ad10068e0574d2e5934849b98429c69305633b42aa4d19822ede2a6e10d_ppc64le as a component of Red Hat OpenShift Builds 1.7.2",
"product_id": "Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:88b38ad10068e0574d2e5934849b98429c69305633b42aa4d19822ede2a6e10d_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:88b38ad10068e0574d2e5934849b98429c69305633b42aa4d19822ede2a6e10d_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.7.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:b020334c46f2d7276ba0c3aa8be7951254b197b2da310f0c22d2e16681a6a265_arm64 as a component of Red Hat OpenShift Builds 1.7.2",
"product_id": "Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:b020334c46f2d7276ba0c3aa8be7951254b197b2da310f0c22d2e16681a6a265_arm64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:b020334c46f2d7276ba0c3aa8be7951254b197b2da310f0c22d2e16681a6a265_arm64",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.7.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:f2c222424cd66659ebea6787b6934c2d01d9eeb4f7db03ebfa16ab7b65aeb5b2_amd64 as a component of Red Hat OpenShift Builds 1.7.2",
"product_id": "Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:f2c222424cd66659ebea6787b6934c2d01d9eeb4f7db03ebfa16ab7b65aeb5b2_amd64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:f2c222424cd66659ebea6787b6934c2d01d9eeb4f7db03ebfa16ab7b65aeb5b2_amd64",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.7.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:153f9e059139e6dbaeb2e5166d21bfeec59a59aa5cd8045e11dbfa091479b4bb_amd64 as a component of Red Hat OpenShift Builds 1.7.2",
"product_id": "Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:153f9e059139e6dbaeb2e5166d21bfeec59a59aa5cd8045e11dbfa091479b4bb_amd64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:153f9e059139e6dbaeb2e5166d21bfeec59a59aa5cd8045e11dbfa091479b4bb_amd64",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.7.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:b2173caa314ae26d2a300f61cfa94031c34fe7676fd007418849212082db3636_s390x as a component of Red Hat OpenShift Builds 1.7.2",
"product_id": "Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:b2173caa314ae26d2a300f61cfa94031c34fe7676fd007418849212082db3636_s390x"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:b2173caa314ae26d2a300f61cfa94031c34fe7676fd007418849212082db3636_s390x",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.7.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:cd9ada6b38c080eec45e1d053ec305dde2d574899019ffb01a28dbe1dd582912_arm64 as a component of Red Hat OpenShift Builds 1.7.2",
"product_id": "Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:cd9ada6b38c080eec45e1d053ec305dde2d574899019ffb01a28dbe1dd582912_arm64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:cd9ada6b38c080eec45e1d053ec305dde2d574899019ffb01a28dbe1dd582912_arm64",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.7.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:f17eb032f7250aa4a3bb99e2754fa4cb0dbfc9fbbb8c787f70ad30b71b27b5a2_ppc64le as a component of Red Hat OpenShift Builds 1.7.2",
"product_id": "Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:f17eb032f7250aa4a3bb99e2754fa4cb0dbfc9fbbb8c787f70ad30b71b27b5a2_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:f17eb032f7250aa4a3bb99e2754fa4cb0dbfc9fbbb8c787f70ad30b71b27b5a2_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.7.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1a57b53f8642ccb95884687efc251ad52e8ee3e718b55d0f4d21f800dfd3f5fa_arm64 as a component of Red Hat OpenShift Builds 1.7.2",
"product_id": "Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1a57b53f8642ccb95884687efc251ad52e8ee3e718b55d0f4d21f800dfd3f5fa_arm64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1a57b53f8642ccb95884687efc251ad52e8ee3e718b55d0f4d21f800dfd3f5fa_arm64",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.7.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:6234cfecf4dd75b8c4ff1c527ad4eb306d966cfa0170ecdb8ea4bc69c2cdc495_amd64 as a component of Red Hat OpenShift Builds 1.7.2",
"product_id": "Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:6234cfecf4dd75b8c4ff1c527ad4eb306d966cfa0170ecdb8ea4bc69c2cdc495_amd64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:6234cfecf4dd75b8c4ff1c527ad4eb306d966cfa0170ecdb8ea4bc69c2cdc495_amd64",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.7.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:779e75a94141db7f8223b9861ba2fa3ba8baf6fa470bb0ab109945d75e20121b_ppc64le as a component of Red Hat OpenShift Builds 1.7.2",
"product_id": "Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:779e75a94141db7f8223b9861ba2fa3ba8baf6fa470bb0ab109945d75e20121b_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:779e75a94141db7f8223b9861ba2fa3ba8baf6fa470bb0ab109945d75e20121b_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.7.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:e593bebc4e753ac3c4cdd1be05711452dbda6e3b015b37926fa804851bdad6a8_s390x as a component of Red Hat OpenShift Builds 1.7.2",
"product_id": "Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:e593bebc4e753ac3c4cdd1be05711452dbda6e3b015b37926fa804851bdad6a8_s390x"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:e593bebc4e753ac3c4cdd1be05711452dbda6e3b015b37926fa804851bdad6a8_s390x",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.7.2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-68121",
"discovery_date": "2026-02-05T18:01:30.086058+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5008dcb0428a0837b9abd827963e7008c8e16af8cfcbd432421286fca63fe714_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5856cba3fe26ab7f756ba93e06caa6e522336ff36ff4c515132a8d35c85a2f64_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:6ddf185f2714d45fab92c831bf32673da55c7a43dbcf1bd22090b203791e03b2_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:eb32b129ea6a10b4aada4313ff11b04c33b99877eea9a5e567245d361d69f140_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:165f6085028f3859f6ede9176d413274ee1a457b72cd9c437795146c20b0722c_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:7a39f26f51bcbb4ef395208db01e2b0ee8b1fe9b15b3701c9c35d8f636f790d9_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:a4d609ff22b610b625a74fffd22883d5debe93c2e0c6ae2bcbbfd8f5f6b2cf12_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:ec02f5f031fefd5a610b69a81be5350f96e54511e2d2c619e8b9fe8f193297b6_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:0070df2a8c7882ae021000c498ead96b19f1bd6819e46657d5898cb71e6ec506_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:4b578a8ef1579d7168b7f0a1b7cebe66213003f8225a86cfdd4c9f24a5e2d871_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:8d6371a5fe374e3bc5c19a930ea712d266fab13a722768204b128bc71e928c97_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:985b19d79b3e54fc8b99b9b0239b74dcf6d0102d3ff0cd5363ae4627069d2ee1_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:2a0a6ea6465a6d165f072ef782a1825cc16ecfb2f8c58d5ec58c1d40d02e5208_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:679b470190ff7a7fc04e283884be4f24d1b0c475d0730fb718f2f45c60551b61_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:9734d0dc0367884e128837b7d02038a3b4136c4865ed3dc90902801393e178b4_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:f5f35702e424cd4e9b768c59d44928844b2d09fbb98d368ae7b54b7ec0771d13_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:093834bac2e2f7f01968ef542b9bcbf5fbe530c9f0dd86521825797abb4a33a2_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:190edd3effb60c56c885fc964d3eb48076293e1e43d745c4615ed00ef7daa145_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:382be8775c61942123adac2acec9f48085ebf7fd2b286c20e36a33ea6462baa7_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:5e83175abaef1e3046bac94621a86e036317833c740cdd6d235f1133a1388dd3_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:7173a298b07cbde3cd9ff12ca25f26ccf79b9ff8cfcb35a001c9f8c0b0291436_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:16cf5e33f297c027686d3ba9c6cbb01dba7a39299e2765fe4eaacc892b32f0d1_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:4715242f98234d2018f8317d9a57f63ff23b4d63be96491d55af2a2ef4572261_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:678c8d38900d994c4aa2e23669b7901747028690a4c5e4ba9aced4cbfe22b248_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:b39a2930e310d432a840798f03f7e55b8da42ff16ccda31790f85558d2be2537_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:1d01e27a3cdea6c99a985b877e29629d1c1fb00203f4a90c45db6df7a602e2cc_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:88b38ad10068e0574d2e5934849b98429c69305633b42aa4d19822ede2a6e10d_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:b020334c46f2d7276ba0c3aa8be7951254b197b2da310f0c22d2e16681a6a265_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:f2c222424cd66659ebea6787b6934c2d01d9eeb4f7db03ebfa16ab7b65aeb5b2_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1a57b53f8642ccb95884687efc251ad52e8ee3e718b55d0f4d21f800dfd3f5fa_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:6234cfecf4dd75b8c4ff1c527ad4eb306d966cfa0170ecdb8ea4bc69c2cdc495_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:779e75a94141db7f8223b9861ba2fa3ba8baf6fa470bb0ab109945d75e20121b_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:e593bebc4e753ac3c4cdd1be05711452dbda6e3b015b37926fa804851bdad6a8_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2437111"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the crypto/tls component. This vulnerability occurs during Transport Layer Security (TLS) session resumption when certificate authority (CA) settings are modified between the initial and resumed handshakes. An attacker could exploit this to bypass certificate validation, allowing a client or server to establish a connection that should have been rejected. This could lead to an authentication bypass under specific conditions.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/tls: crypto/tls: Incorrect certificate validation during TLS session resumption",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This is a moderate flaw because it only occurs under specific conditions, such as TLS session resumption with runtime changes to certificate authority settings. Exploitation is not straightforward and requires a controlled setup. The impact is limited to certificate validation within the same component and does not affect system availability.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:153f9e059139e6dbaeb2e5166d21bfeec59a59aa5cd8045e11dbfa091479b4bb_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:b2173caa314ae26d2a300f61cfa94031c34fe7676fd007418849212082db3636_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:cd9ada6b38c080eec45e1d053ec305dde2d574899019ffb01a28dbe1dd582912_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:f17eb032f7250aa4a3bb99e2754fa4cb0dbfc9fbbb8c787f70ad30b71b27b5a2_ppc64le"
],
"known_not_affected": [
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5008dcb0428a0837b9abd827963e7008c8e16af8cfcbd432421286fca63fe714_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5856cba3fe26ab7f756ba93e06caa6e522336ff36ff4c515132a8d35c85a2f64_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:6ddf185f2714d45fab92c831bf32673da55c7a43dbcf1bd22090b203791e03b2_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:eb32b129ea6a10b4aada4313ff11b04c33b99877eea9a5e567245d361d69f140_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:165f6085028f3859f6ede9176d413274ee1a457b72cd9c437795146c20b0722c_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:7a39f26f51bcbb4ef395208db01e2b0ee8b1fe9b15b3701c9c35d8f636f790d9_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:a4d609ff22b610b625a74fffd22883d5debe93c2e0c6ae2bcbbfd8f5f6b2cf12_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:ec02f5f031fefd5a610b69a81be5350f96e54511e2d2c619e8b9fe8f193297b6_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:0070df2a8c7882ae021000c498ead96b19f1bd6819e46657d5898cb71e6ec506_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:4b578a8ef1579d7168b7f0a1b7cebe66213003f8225a86cfdd4c9f24a5e2d871_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:8d6371a5fe374e3bc5c19a930ea712d266fab13a722768204b128bc71e928c97_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:985b19d79b3e54fc8b99b9b0239b74dcf6d0102d3ff0cd5363ae4627069d2ee1_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:2a0a6ea6465a6d165f072ef782a1825cc16ecfb2f8c58d5ec58c1d40d02e5208_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:679b470190ff7a7fc04e283884be4f24d1b0c475d0730fb718f2f45c60551b61_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:9734d0dc0367884e128837b7d02038a3b4136c4865ed3dc90902801393e178b4_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:f5f35702e424cd4e9b768c59d44928844b2d09fbb98d368ae7b54b7ec0771d13_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:093834bac2e2f7f01968ef542b9bcbf5fbe530c9f0dd86521825797abb4a33a2_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:190edd3effb60c56c885fc964d3eb48076293e1e43d745c4615ed00ef7daa145_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:382be8775c61942123adac2acec9f48085ebf7fd2b286c20e36a33ea6462baa7_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:5e83175abaef1e3046bac94621a86e036317833c740cdd6d235f1133a1388dd3_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:7173a298b07cbde3cd9ff12ca25f26ccf79b9ff8cfcb35a001c9f8c0b0291436_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:16cf5e33f297c027686d3ba9c6cbb01dba7a39299e2765fe4eaacc892b32f0d1_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:4715242f98234d2018f8317d9a57f63ff23b4d63be96491d55af2a2ef4572261_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:678c8d38900d994c4aa2e23669b7901747028690a4c5e4ba9aced4cbfe22b248_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:b39a2930e310d432a840798f03f7e55b8da42ff16ccda31790f85558d2be2537_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:1d01e27a3cdea6c99a985b877e29629d1c1fb00203f4a90c45db6df7a602e2cc_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:88b38ad10068e0574d2e5934849b98429c69305633b42aa4d19822ede2a6e10d_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:b020334c46f2d7276ba0c3aa8be7951254b197b2da310f0c22d2e16681a6a265_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:f2c222424cd66659ebea6787b6934c2d01d9eeb4f7db03ebfa16ab7b65aeb5b2_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1a57b53f8642ccb95884687efc251ad52e8ee3e718b55d0f4d21f800dfd3f5fa_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:6234cfecf4dd75b8c4ff1c527ad4eb306d966cfa0170ecdb8ea4bc69c2cdc495_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:779e75a94141db7f8223b9861ba2fa3ba8baf6fa470bb0ab109945d75e20121b_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:e593bebc4e753ac3c4cdd1be05711452dbda6e3b015b37926fa804851bdad6a8_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "RHBZ#2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"category": "external",
"summary": "https://go.dev/cl/737700",
"url": "https://go.dev/cl/737700"
},
{
"category": "external",
"summary": "https://go.dev/issue/77217",
"url": "https://go.dev/issue/77217"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk",
"url": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4337",
"url": "https://pkg.go.dev/vuln/GO-2026-4337"
}
],
"release_date": "2026-02-05T17:48:44.141000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-28T07:19:47+00:00",
"details": "It is recommended that existing users of Red Hat OpenShift Builds 1.7.1 upgrades to to 1.7.2",
"product_ids": [
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:153f9e059139e6dbaeb2e5166d21bfeec59a59aa5cd8045e11dbfa091479b4bb_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:b2173caa314ae26d2a300f61cfa94031c34fe7676fd007418849212082db3636_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:cd9ada6b38c080eec45e1d053ec305dde2d574899019ffb01a28dbe1dd582912_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:f17eb032f7250aa4a3bb99e2754fa4cb0dbfc9fbbb8c787f70ad30b71b27b5a2_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:11331"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5008dcb0428a0837b9abd827963e7008c8e16af8cfcbd432421286fca63fe714_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5856cba3fe26ab7f756ba93e06caa6e522336ff36ff4c515132a8d35c85a2f64_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:6ddf185f2714d45fab92c831bf32673da55c7a43dbcf1bd22090b203791e03b2_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:eb32b129ea6a10b4aada4313ff11b04c33b99877eea9a5e567245d361d69f140_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:165f6085028f3859f6ede9176d413274ee1a457b72cd9c437795146c20b0722c_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:7a39f26f51bcbb4ef395208db01e2b0ee8b1fe9b15b3701c9c35d8f636f790d9_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:a4d609ff22b610b625a74fffd22883d5debe93c2e0c6ae2bcbbfd8f5f6b2cf12_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:ec02f5f031fefd5a610b69a81be5350f96e54511e2d2c619e8b9fe8f193297b6_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:0070df2a8c7882ae021000c498ead96b19f1bd6819e46657d5898cb71e6ec506_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:4b578a8ef1579d7168b7f0a1b7cebe66213003f8225a86cfdd4c9f24a5e2d871_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:8d6371a5fe374e3bc5c19a930ea712d266fab13a722768204b128bc71e928c97_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:985b19d79b3e54fc8b99b9b0239b74dcf6d0102d3ff0cd5363ae4627069d2ee1_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:2a0a6ea6465a6d165f072ef782a1825cc16ecfb2f8c58d5ec58c1d40d02e5208_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:679b470190ff7a7fc04e283884be4f24d1b0c475d0730fb718f2f45c60551b61_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:9734d0dc0367884e128837b7d02038a3b4136c4865ed3dc90902801393e178b4_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:f5f35702e424cd4e9b768c59d44928844b2d09fbb98d368ae7b54b7ec0771d13_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:093834bac2e2f7f01968ef542b9bcbf5fbe530c9f0dd86521825797abb4a33a2_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:190edd3effb60c56c885fc964d3eb48076293e1e43d745c4615ed00ef7daa145_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:382be8775c61942123adac2acec9f48085ebf7fd2b286c20e36a33ea6462baa7_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:5e83175abaef1e3046bac94621a86e036317833c740cdd6d235f1133a1388dd3_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:7173a298b07cbde3cd9ff12ca25f26ccf79b9ff8cfcb35a001c9f8c0b0291436_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:16cf5e33f297c027686d3ba9c6cbb01dba7a39299e2765fe4eaacc892b32f0d1_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:4715242f98234d2018f8317d9a57f63ff23b4d63be96491d55af2a2ef4572261_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:678c8d38900d994c4aa2e23669b7901747028690a4c5e4ba9aced4cbfe22b248_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:b39a2930e310d432a840798f03f7e55b8da42ff16ccda31790f85558d2be2537_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:1d01e27a3cdea6c99a985b877e29629d1c1fb00203f4a90c45db6df7a602e2cc_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:88b38ad10068e0574d2e5934849b98429c69305633b42aa4d19822ede2a6e10d_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:b020334c46f2d7276ba0c3aa8be7951254b197b2da310f0c22d2e16681a6a265_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:f2c222424cd66659ebea6787b6934c2d01d9eeb4f7db03ebfa16ab7b65aeb5b2_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:153f9e059139e6dbaeb2e5166d21bfeec59a59aa5cd8045e11dbfa091479b4bb_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:b2173caa314ae26d2a300f61cfa94031c34fe7676fd007418849212082db3636_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:cd9ada6b38c080eec45e1d053ec305dde2d574899019ffb01a28dbe1dd582912_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:f17eb032f7250aa4a3bb99e2754fa4cb0dbfc9fbbb8c787f70ad30b71b27b5a2_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1a57b53f8642ccb95884687efc251ad52e8ee3e718b55d0f4d21f800dfd3f5fa_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:6234cfecf4dd75b8c4ff1c527ad4eb306d966cfa0170ecdb8ea4bc69c2cdc495_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:779e75a94141db7f8223b9861ba2fa3ba8baf6fa470bb0ab109945d75e20121b_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:e593bebc4e753ac3c4cdd1be05711452dbda6e3b015b37926fa804851bdad6a8_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "crypto/tls: crypto/tls: Incorrect certificate validation during TLS session resumption"
},
{
"cve": "CVE-2026-25679",
"cwe": {
"id": "CWE-1286",
"name": "Improper Validation of Syntactic Correctness of Input"
},
"discovery_date": "2026-03-06T22:02:11.567841+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5008dcb0428a0837b9abd827963e7008c8e16af8cfcbd432421286fca63fe714_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5856cba3fe26ab7f756ba93e06caa6e522336ff36ff4c515132a8d35c85a2f64_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:6ddf185f2714d45fab92c831bf32673da55c7a43dbcf1bd22090b203791e03b2_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:eb32b129ea6a10b4aada4313ff11b04c33b99877eea9a5e567245d361d69f140_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:165f6085028f3859f6ede9176d413274ee1a457b72cd9c437795146c20b0722c_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:7a39f26f51bcbb4ef395208db01e2b0ee8b1fe9b15b3701c9c35d8f636f790d9_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:a4d609ff22b610b625a74fffd22883d5debe93c2e0c6ae2bcbbfd8f5f6b2cf12_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:ec02f5f031fefd5a610b69a81be5350f96e54511e2d2c619e8b9fe8f193297b6_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:0070df2a8c7882ae021000c498ead96b19f1bd6819e46657d5898cb71e6ec506_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:4b578a8ef1579d7168b7f0a1b7cebe66213003f8225a86cfdd4c9f24a5e2d871_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:8d6371a5fe374e3bc5c19a930ea712d266fab13a722768204b128bc71e928c97_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:985b19d79b3e54fc8b99b9b0239b74dcf6d0102d3ff0cd5363ae4627069d2ee1_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:2a0a6ea6465a6d165f072ef782a1825cc16ecfb2f8c58d5ec58c1d40d02e5208_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:679b470190ff7a7fc04e283884be4f24d1b0c475d0730fb718f2f45c60551b61_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:9734d0dc0367884e128837b7d02038a3b4136c4865ed3dc90902801393e178b4_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:f5f35702e424cd4e9b768c59d44928844b2d09fbb98d368ae7b54b7ec0771d13_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:093834bac2e2f7f01968ef542b9bcbf5fbe530c9f0dd86521825797abb4a33a2_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:190edd3effb60c56c885fc964d3eb48076293e1e43d745c4615ed00ef7daa145_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:382be8775c61942123adac2acec9f48085ebf7fd2b286c20e36a33ea6462baa7_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:5e83175abaef1e3046bac94621a86e036317833c740cdd6d235f1133a1388dd3_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:7173a298b07cbde3cd9ff12ca25f26ccf79b9ff8cfcb35a001c9f8c0b0291436_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:16cf5e33f297c027686d3ba9c6cbb01dba7a39299e2765fe4eaacc892b32f0d1_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:4715242f98234d2018f8317d9a57f63ff23b4d63be96491d55af2a2ef4572261_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:678c8d38900d994c4aa2e23669b7901747028690a4c5e4ba9aced4cbfe22b248_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:b39a2930e310d432a840798f03f7e55b8da42ff16ccda31790f85558d2be2537_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:1d01e27a3cdea6c99a985b877e29629d1c1fb00203f4a90c45db6df7a602e2cc_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:88b38ad10068e0574d2e5934849b98429c69305633b42aa4d19822ede2a6e10d_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:b020334c46f2d7276ba0c3aa8be7951254b197b2da310f0c22d2e16681a6a265_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:f2c222424cd66659ebea6787b6934c2d01d9eeb4f7db03ebfa16ab7b65aeb5b2_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1a57b53f8642ccb95884687efc251ad52e8ee3e718b55d0f4d21f800dfd3f5fa_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:6234cfecf4dd75b8c4ff1c527ad4eb306d966cfa0170ecdb8ea4bc69c2cdc495_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:779e75a94141db7f8223b9861ba2fa3ba8baf6fa470bb0ab109945d75e20121b_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:e593bebc4e753ac3c4cdd1be05711452dbda6e3b015b37926fa804851bdad6a8_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2445356"
}
],
"notes": [
{
"category": "description",
"text": "The Go standard library function net/url.Parse insufficiently validated the host/authority component and accepted some invalid URLs by effectively treating garbage before an IP-literal as ignorable. The function should have rejected this as invalid.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "net/url: Incorrect parsing of IPv6 host literals in net/url",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:153f9e059139e6dbaeb2e5166d21bfeec59a59aa5cd8045e11dbfa091479b4bb_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:b2173caa314ae26d2a300f61cfa94031c34fe7676fd007418849212082db3636_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:cd9ada6b38c080eec45e1d053ec305dde2d574899019ffb01a28dbe1dd582912_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:f17eb032f7250aa4a3bb99e2754fa4cb0dbfc9fbbb8c787f70ad30b71b27b5a2_ppc64le"
],
"known_not_affected": [
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5008dcb0428a0837b9abd827963e7008c8e16af8cfcbd432421286fca63fe714_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5856cba3fe26ab7f756ba93e06caa6e522336ff36ff4c515132a8d35c85a2f64_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:6ddf185f2714d45fab92c831bf32673da55c7a43dbcf1bd22090b203791e03b2_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:eb32b129ea6a10b4aada4313ff11b04c33b99877eea9a5e567245d361d69f140_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:165f6085028f3859f6ede9176d413274ee1a457b72cd9c437795146c20b0722c_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:7a39f26f51bcbb4ef395208db01e2b0ee8b1fe9b15b3701c9c35d8f636f790d9_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:a4d609ff22b610b625a74fffd22883d5debe93c2e0c6ae2bcbbfd8f5f6b2cf12_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:ec02f5f031fefd5a610b69a81be5350f96e54511e2d2c619e8b9fe8f193297b6_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:0070df2a8c7882ae021000c498ead96b19f1bd6819e46657d5898cb71e6ec506_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:4b578a8ef1579d7168b7f0a1b7cebe66213003f8225a86cfdd4c9f24a5e2d871_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:8d6371a5fe374e3bc5c19a930ea712d266fab13a722768204b128bc71e928c97_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:985b19d79b3e54fc8b99b9b0239b74dcf6d0102d3ff0cd5363ae4627069d2ee1_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:2a0a6ea6465a6d165f072ef782a1825cc16ecfb2f8c58d5ec58c1d40d02e5208_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:679b470190ff7a7fc04e283884be4f24d1b0c475d0730fb718f2f45c60551b61_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:9734d0dc0367884e128837b7d02038a3b4136c4865ed3dc90902801393e178b4_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:f5f35702e424cd4e9b768c59d44928844b2d09fbb98d368ae7b54b7ec0771d13_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:093834bac2e2f7f01968ef542b9bcbf5fbe530c9f0dd86521825797abb4a33a2_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:190edd3effb60c56c885fc964d3eb48076293e1e43d745c4615ed00ef7daa145_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:382be8775c61942123adac2acec9f48085ebf7fd2b286c20e36a33ea6462baa7_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:5e83175abaef1e3046bac94621a86e036317833c740cdd6d235f1133a1388dd3_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:7173a298b07cbde3cd9ff12ca25f26ccf79b9ff8cfcb35a001c9f8c0b0291436_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:16cf5e33f297c027686d3ba9c6cbb01dba7a39299e2765fe4eaacc892b32f0d1_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:4715242f98234d2018f8317d9a57f63ff23b4d63be96491d55af2a2ef4572261_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:678c8d38900d994c4aa2e23669b7901747028690a4c5e4ba9aced4cbfe22b248_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:b39a2930e310d432a840798f03f7e55b8da42ff16ccda31790f85558d2be2537_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:1d01e27a3cdea6c99a985b877e29629d1c1fb00203f4a90c45db6df7a602e2cc_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:88b38ad10068e0574d2e5934849b98429c69305633b42aa4d19822ede2a6e10d_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:b020334c46f2d7276ba0c3aa8be7951254b197b2da310f0c22d2e16681a6a265_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:f2c222424cd66659ebea6787b6934c2d01d9eeb4f7db03ebfa16ab7b65aeb5b2_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1a57b53f8642ccb95884687efc251ad52e8ee3e718b55d0f4d21f800dfd3f5fa_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:6234cfecf4dd75b8c4ff1c527ad4eb306d966cfa0170ecdb8ea4bc69c2cdc495_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:779e75a94141db7f8223b9861ba2fa3ba8baf6fa470bb0ab109945d75e20121b_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:e593bebc4e753ac3c4cdd1be05711452dbda6e3b015b37926fa804851bdad6a8_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-25679"
},
{
"category": "external",
"summary": "RHBZ#2445356",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2445356"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-25679",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25679"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-25679",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25679"
},
{
"category": "external",
"summary": "https://go.dev/cl/752180",
"url": "https://go.dev/cl/752180"
},
{
"category": "external",
"summary": "https://go.dev/issue/77578",
"url": "https://go.dev/issue/77578"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk",
"url": "https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4601",
"url": "https://pkg.go.dev/vuln/GO-2026-4601"
}
],
"release_date": "2026-03-06T21:28:14.211000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-28T07:19:47+00:00",
"details": "It is recommended that existing users of Red Hat OpenShift Builds 1.7.1 upgrades to to 1.7.2",
"product_ids": [
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:153f9e059139e6dbaeb2e5166d21bfeec59a59aa5cd8045e11dbfa091479b4bb_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:b2173caa314ae26d2a300f61cfa94031c34fe7676fd007418849212082db3636_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:cd9ada6b38c080eec45e1d053ec305dde2d574899019ffb01a28dbe1dd582912_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:f17eb032f7250aa4a3bb99e2754fa4cb0dbfc9fbbb8c787f70ad30b71b27b5a2_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:11331"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5008dcb0428a0837b9abd827963e7008c8e16af8cfcbd432421286fca63fe714_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5856cba3fe26ab7f756ba93e06caa6e522336ff36ff4c515132a8d35c85a2f64_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:6ddf185f2714d45fab92c831bf32673da55c7a43dbcf1bd22090b203791e03b2_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:eb32b129ea6a10b4aada4313ff11b04c33b99877eea9a5e567245d361d69f140_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:165f6085028f3859f6ede9176d413274ee1a457b72cd9c437795146c20b0722c_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:7a39f26f51bcbb4ef395208db01e2b0ee8b1fe9b15b3701c9c35d8f636f790d9_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:a4d609ff22b610b625a74fffd22883d5debe93c2e0c6ae2bcbbfd8f5f6b2cf12_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:ec02f5f031fefd5a610b69a81be5350f96e54511e2d2c619e8b9fe8f193297b6_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:0070df2a8c7882ae021000c498ead96b19f1bd6819e46657d5898cb71e6ec506_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:4b578a8ef1579d7168b7f0a1b7cebe66213003f8225a86cfdd4c9f24a5e2d871_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:8d6371a5fe374e3bc5c19a930ea712d266fab13a722768204b128bc71e928c97_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:985b19d79b3e54fc8b99b9b0239b74dcf6d0102d3ff0cd5363ae4627069d2ee1_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:2a0a6ea6465a6d165f072ef782a1825cc16ecfb2f8c58d5ec58c1d40d02e5208_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:679b470190ff7a7fc04e283884be4f24d1b0c475d0730fb718f2f45c60551b61_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:9734d0dc0367884e128837b7d02038a3b4136c4865ed3dc90902801393e178b4_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:f5f35702e424cd4e9b768c59d44928844b2d09fbb98d368ae7b54b7ec0771d13_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:093834bac2e2f7f01968ef542b9bcbf5fbe530c9f0dd86521825797abb4a33a2_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:190edd3effb60c56c885fc964d3eb48076293e1e43d745c4615ed00ef7daa145_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:382be8775c61942123adac2acec9f48085ebf7fd2b286c20e36a33ea6462baa7_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:5e83175abaef1e3046bac94621a86e036317833c740cdd6d235f1133a1388dd3_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:7173a298b07cbde3cd9ff12ca25f26ccf79b9ff8cfcb35a001c9f8c0b0291436_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:16cf5e33f297c027686d3ba9c6cbb01dba7a39299e2765fe4eaacc892b32f0d1_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:4715242f98234d2018f8317d9a57f63ff23b4d63be96491d55af2a2ef4572261_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:678c8d38900d994c4aa2e23669b7901747028690a4c5e4ba9aced4cbfe22b248_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:b39a2930e310d432a840798f03f7e55b8da42ff16ccda31790f85558d2be2537_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:1d01e27a3cdea6c99a985b877e29629d1c1fb00203f4a90c45db6df7a602e2cc_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:88b38ad10068e0574d2e5934849b98429c69305633b42aa4d19822ede2a6e10d_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:b020334c46f2d7276ba0c3aa8be7951254b197b2da310f0c22d2e16681a6a265_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:f2c222424cd66659ebea6787b6934c2d01d9eeb4f7db03ebfa16ab7b65aeb5b2_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:153f9e059139e6dbaeb2e5166d21bfeec59a59aa5cd8045e11dbfa091479b4bb_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:b2173caa314ae26d2a300f61cfa94031c34fe7676fd007418849212082db3636_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:cd9ada6b38c080eec45e1d053ec305dde2d574899019ffb01a28dbe1dd582912_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:f17eb032f7250aa4a3bb99e2754fa4cb0dbfc9fbbb8c787f70ad30b71b27b5a2_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1a57b53f8642ccb95884687efc251ad52e8ee3e718b55d0f4d21f800dfd3f5fa_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:6234cfecf4dd75b8c4ff1c527ad4eb306d966cfa0170ecdb8ea4bc69c2cdc495_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:779e75a94141db7f8223b9861ba2fa3ba8baf6fa470bb0ab109945d75e20121b_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:e593bebc4e753ac3c4cdd1be05711452dbda6e3b015b37926fa804851bdad6a8_s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5008dcb0428a0837b9abd827963e7008c8e16af8cfcbd432421286fca63fe714_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5856cba3fe26ab7f756ba93e06caa6e522336ff36ff4c515132a8d35c85a2f64_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:6ddf185f2714d45fab92c831bf32673da55c7a43dbcf1bd22090b203791e03b2_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:eb32b129ea6a10b4aada4313ff11b04c33b99877eea9a5e567245d361d69f140_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:165f6085028f3859f6ede9176d413274ee1a457b72cd9c437795146c20b0722c_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:7a39f26f51bcbb4ef395208db01e2b0ee8b1fe9b15b3701c9c35d8f636f790d9_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:a4d609ff22b610b625a74fffd22883d5debe93c2e0c6ae2bcbbfd8f5f6b2cf12_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:ec02f5f031fefd5a610b69a81be5350f96e54511e2d2c619e8b9fe8f193297b6_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:0070df2a8c7882ae021000c498ead96b19f1bd6819e46657d5898cb71e6ec506_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:4b578a8ef1579d7168b7f0a1b7cebe66213003f8225a86cfdd4c9f24a5e2d871_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:8d6371a5fe374e3bc5c19a930ea712d266fab13a722768204b128bc71e928c97_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:985b19d79b3e54fc8b99b9b0239b74dcf6d0102d3ff0cd5363ae4627069d2ee1_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:2a0a6ea6465a6d165f072ef782a1825cc16ecfb2f8c58d5ec58c1d40d02e5208_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:679b470190ff7a7fc04e283884be4f24d1b0c475d0730fb718f2f45c60551b61_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:9734d0dc0367884e128837b7d02038a3b4136c4865ed3dc90902801393e178b4_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:f5f35702e424cd4e9b768c59d44928844b2d09fbb98d368ae7b54b7ec0771d13_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:093834bac2e2f7f01968ef542b9bcbf5fbe530c9f0dd86521825797abb4a33a2_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:190edd3effb60c56c885fc964d3eb48076293e1e43d745c4615ed00ef7daa145_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:382be8775c61942123adac2acec9f48085ebf7fd2b286c20e36a33ea6462baa7_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:5e83175abaef1e3046bac94621a86e036317833c740cdd6d235f1133a1388dd3_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:7173a298b07cbde3cd9ff12ca25f26ccf79b9ff8cfcb35a001c9f8c0b0291436_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:16cf5e33f297c027686d3ba9c6cbb01dba7a39299e2765fe4eaacc892b32f0d1_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:4715242f98234d2018f8317d9a57f63ff23b4d63be96491d55af2a2ef4572261_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:678c8d38900d994c4aa2e23669b7901747028690a4c5e4ba9aced4cbfe22b248_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:b39a2930e310d432a840798f03f7e55b8da42ff16ccda31790f85558d2be2537_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:1d01e27a3cdea6c99a985b877e29629d1c1fb00203f4a90c45db6df7a602e2cc_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:88b38ad10068e0574d2e5934849b98429c69305633b42aa4d19822ede2a6e10d_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:b020334c46f2d7276ba0c3aa8be7951254b197b2da310f0c22d2e16681a6a265_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:f2c222424cd66659ebea6787b6934c2d01d9eeb4f7db03ebfa16ab7b65aeb5b2_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:153f9e059139e6dbaeb2e5166d21bfeec59a59aa5cd8045e11dbfa091479b4bb_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:b2173caa314ae26d2a300f61cfa94031c34fe7676fd007418849212082db3636_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:cd9ada6b38c080eec45e1d053ec305dde2d574899019ffb01a28dbe1dd582912_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:f17eb032f7250aa4a3bb99e2754fa4cb0dbfc9fbbb8c787f70ad30b71b27b5a2_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1a57b53f8642ccb95884687efc251ad52e8ee3e718b55d0f4d21f800dfd3f5fa_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:6234cfecf4dd75b8c4ff1c527ad4eb306d966cfa0170ecdb8ea4bc69c2cdc495_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:779e75a94141db7f8223b9861ba2fa3ba8baf6fa470bb0ab109945d75e20121b_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:e593bebc4e753ac3c4cdd1be05711452dbda6e3b015b37926fa804851bdad6a8_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "net/url: Incorrect parsing of IPv6 host literals in net/url"
},
{
"cve": "CVE-2026-27137",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"discovery_date": "2026-03-06T22:01:38.859733+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5008dcb0428a0837b9abd827963e7008c8e16af8cfcbd432421286fca63fe714_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5856cba3fe26ab7f756ba93e06caa6e522336ff36ff4c515132a8d35c85a2f64_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:6ddf185f2714d45fab92c831bf32673da55c7a43dbcf1bd22090b203791e03b2_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:eb32b129ea6a10b4aada4313ff11b04c33b99877eea9a5e567245d361d69f140_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:165f6085028f3859f6ede9176d413274ee1a457b72cd9c437795146c20b0722c_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:7a39f26f51bcbb4ef395208db01e2b0ee8b1fe9b15b3701c9c35d8f636f790d9_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:a4d609ff22b610b625a74fffd22883d5debe93c2e0c6ae2bcbbfd8f5f6b2cf12_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:ec02f5f031fefd5a610b69a81be5350f96e54511e2d2c619e8b9fe8f193297b6_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:0070df2a8c7882ae021000c498ead96b19f1bd6819e46657d5898cb71e6ec506_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:4b578a8ef1579d7168b7f0a1b7cebe66213003f8225a86cfdd4c9f24a5e2d871_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:8d6371a5fe374e3bc5c19a930ea712d266fab13a722768204b128bc71e928c97_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:985b19d79b3e54fc8b99b9b0239b74dcf6d0102d3ff0cd5363ae4627069d2ee1_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:2a0a6ea6465a6d165f072ef782a1825cc16ecfb2f8c58d5ec58c1d40d02e5208_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:679b470190ff7a7fc04e283884be4f24d1b0c475d0730fb718f2f45c60551b61_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:9734d0dc0367884e128837b7d02038a3b4136c4865ed3dc90902801393e178b4_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:f5f35702e424cd4e9b768c59d44928844b2d09fbb98d368ae7b54b7ec0771d13_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:093834bac2e2f7f01968ef542b9bcbf5fbe530c9f0dd86521825797abb4a33a2_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:190edd3effb60c56c885fc964d3eb48076293e1e43d745c4615ed00ef7daa145_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:382be8775c61942123adac2acec9f48085ebf7fd2b286c20e36a33ea6462baa7_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:5e83175abaef1e3046bac94621a86e036317833c740cdd6d235f1133a1388dd3_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:7173a298b07cbde3cd9ff12ca25f26ccf79b9ff8cfcb35a001c9f8c0b0291436_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:16cf5e33f297c027686d3ba9c6cbb01dba7a39299e2765fe4eaacc892b32f0d1_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:4715242f98234d2018f8317d9a57f63ff23b4d63be96491d55af2a2ef4572261_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:678c8d38900d994c4aa2e23669b7901747028690a4c5e4ba9aced4cbfe22b248_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:b39a2930e310d432a840798f03f7e55b8da42ff16ccda31790f85558d2be2537_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:1d01e27a3cdea6c99a985b877e29629d1c1fb00203f4a90c45db6df7a602e2cc_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:88b38ad10068e0574d2e5934849b98429c69305633b42aa4d19822ede2a6e10d_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:b020334c46f2d7276ba0c3aa8be7951254b197b2da310f0c22d2e16681a6a265_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:f2c222424cd66659ebea6787b6934c2d01d9eeb4f7db03ebfa16ab7b65aeb5b2_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1a57b53f8642ccb95884687efc251ad52e8ee3e718b55d0f4d21f800dfd3f5fa_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:6234cfecf4dd75b8c4ff1c527ad4eb306d966cfa0170ecdb8ea4bc69c2cdc495_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:779e75a94141db7f8223b9861ba2fa3ba8baf6fa470bb0ab109945d75e20121b_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:e593bebc4e753ac3c4cdd1be05711452dbda6e3b015b37926fa804851bdad6a8_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2445345"
}
],
"notes": [
{
"category": "description",
"text": "A certificate validation flaw has been discovered in the golang crypto/x509 module. When verifying a certificate chain which contains a certificate containing multiple email address constraints which share common local portions but different domain portions, these constraints will not be properly applied, and only the last constraint will be considered.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: Incorrect enforcement of email constraints in crypto/x509",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:153f9e059139e6dbaeb2e5166d21bfeec59a59aa5cd8045e11dbfa091479b4bb_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:b2173caa314ae26d2a300f61cfa94031c34fe7676fd007418849212082db3636_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:cd9ada6b38c080eec45e1d053ec305dde2d574899019ffb01a28dbe1dd582912_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:f17eb032f7250aa4a3bb99e2754fa4cb0dbfc9fbbb8c787f70ad30b71b27b5a2_ppc64le"
],
"known_not_affected": [
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5008dcb0428a0837b9abd827963e7008c8e16af8cfcbd432421286fca63fe714_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5856cba3fe26ab7f756ba93e06caa6e522336ff36ff4c515132a8d35c85a2f64_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:6ddf185f2714d45fab92c831bf32673da55c7a43dbcf1bd22090b203791e03b2_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:eb32b129ea6a10b4aada4313ff11b04c33b99877eea9a5e567245d361d69f140_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:165f6085028f3859f6ede9176d413274ee1a457b72cd9c437795146c20b0722c_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:7a39f26f51bcbb4ef395208db01e2b0ee8b1fe9b15b3701c9c35d8f636f790d9_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:a4d609ff22b610b625a74fffd22883d5debe93c2e0c6ae2bcbbfd8f5f6b2cf12_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:ec02f5f031fefd5a610b69a81be5350f96e54511e2d2c619e8b9fe8f193297b6_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:0070df2a8c7882ae021000c498ead96b19f1bd6819e46657d5898cb71e6ec506_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:4b578a8ef1579d7168b7f0a1b7cebe66213003f8225a86cfdd4c9f24a5e2d871_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:8d6371a5fe374e3bc5c19a930ea712d266fab13a722768204b128bc71e928c97_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:985b19d79b3e54fc8b99b9b0239b74dcf6d0102d3ff0cd5363ae4627069d2ee1_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:2a0a6ea6465a6d165f072ef782a1825cc16ecfb2f8c58d5ec58c1d40d02e5208_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:679b470190ff7a7fc04e283884be4f24d1b0c475d0730fb718f2f45c60551b61_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:9734d0dc0367884e128837b7d02038a3b4136c4865ed3dc90902801393e178b4_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:f5f35702e424cd4e9b768c59d44928844b2d09fbb98d368ae7b54b7ec0771d13_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:093834bac2e2f7f01968ef542b9bcbf5fbe530c9f0dd86521825797abb4a33a2_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:190edd3effb60c56c885fc964d3eb48076293e1e43d745c4615ed00ef7daa145_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:382be8775c61942123adac2acec9f48085ebf7fd2b286c20e36a33ea6462baa7_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:5e83175abaef1e3046bac94621a86e036317833c740cdd6d235f1133a1388dd3_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:7173a298b07cbde3cd9ff12ca25f26ccf79b9ff8cfcb35a001c9f8c0b0291436_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:16cf5e33f297c027686d3ba9c6cbb01dba7a39299e2765fe4eaacc892b32f0d1_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:4715242f98234d2018f8317d9a57f63ff23b4d63be96491d55af2a2ef4572261_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:678c8d38900d994c4aa2e23669b7901747028690a4c5e4ba9aced4cbfe22b248_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:b39a2930e310d432a840798f03f7e55b8da42ff16ccda31790f85558d2be2537_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:1d01e27a3cdea6c99a985b877e29629d1c1fb00203f4a90c45db6df7a602e2cc_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:88b38ad10068e0574d2e5934849b98429c69305633b42aa4d19822ede2a6e10d_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:b020334c46f2d7276ba0c3aa8be7951254b197b2da310f0c22d2e16681a6a265_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:f2c222424cd66659ebea6787b6934c2d01d9eeb4f7db03ebfa16ab7b65aeb5b2_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1a57b53f8642ccb95884687efc251ad52e8ee3e718b55d0f4d21f800dfd3f5fa_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:6234cfecf4dd75b8c4ff1c527ad4eb306d966cfa0170ecdb8ea4bc69c2cdc495_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:779e75a94141db7f8223b9861ba2fa3ba8baf6fa470bb0ab109945d75e20121b_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:e593bebc4e753ac3c4cdd1be05711452dbda6e3b015b37926fa804851bdad6a8_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-27137"
},
{
"category": "external",
"summary": "RHBZ#2445345",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2445345"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-27137",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27137"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-27137",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27137"
},
{
"category": "external",
"summary": "https://go.dev/cl/752182",
"url": "https://go.dev/cl/752182"
},
{
"category": "external",
"summary": "https://go.dev/issue/77952",
"url": "https://go.dev/issue/77952"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk",
"url": "https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4599",
"url": "https://pkg.go.dev/vuln/GO-2026-4599"
}
],
"release_date": "2026-03-06T21:28:13.748000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-28T07:19:47+00:00",
"details": "It is recommended that existing users of Red Hat OpenShift Builds 1.7.1 upgrades to to 1.7.2",
"product_ids": [
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:153f9e059139e6dbaeb2e5166d21bfeec59a59aa5cd8045e11dbfa091479b4bb_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:b2173caa314ae26d2a300f61cfa94031c34fe7676fd007418849212082db3636_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:cd9ada6b38c080eec45e1d053ec305dde2d574899019ffb01a28dbe1dd582912_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:f17eb032f7250aa4a3bb99e2754fa4cb0dbfc9fbbb8c787f70ad30b71b27b5a2_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:11331"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5008dcb0428a0837b9abd827963e7008c8e16af8cfcbd432421286fca63fe714_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5856cba3fe26ab7f756ba93e06caa6e522336ff36ff4c515132a8d35c85a2f64_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:6ddf185f2714d45fab92c831bf32673da55c7a43dbcf1bd22090b203791e03b2_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:eb32b129ea6a10b4aada4313ff11b04c33b99877eea9a5e567245d361d69f140_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:165f6085028f3859f6ede9176d413274ee1a457b72cd9c437795146c20b0722c_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:7a39f26f51bcbb4ef395208db01e2b0ee8b1fe9b15b3701c9c35d8f636f790d9_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:a4d609ff22b610b625a74fffd22883d5debe93c2e0c6ae2bcbbfd8f5f6b2cf12_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:ec02f5f031fefd5a610b69a81be5350f96e54511e2d2c619e8b9fe8f193297b6_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:0070df2a8c7882ae021000c498ead96b19f1bd6819e46657d5898cb71e6ec506_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:4b578a8ef1579d7168b7f0a1b7cebe66213003f8225a86cfdd4c9f24a5e2d871_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:8d6371a5fe374e3bc5c19a930ea712d266fab13a722768204b128bc71e928c97_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:985b19d79b3e54fc8b99b9b0239b74dcf6d0102d3ff0cd5363ae4627069d2ee1_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:2a0a6ea6465a6d165f072ef782a1825cc16ecfb2f8c58d5ec58c1d40d02e5208_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:679b470190ff7a7fc04e283884be4f24d1b0c475d0730fb718f2f45c60551b61_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:9734d0dc0367884e128837b7d02038a3b4136c4865ed3dc90902801393e178b4_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:f5f35702e424cd4e9b768c59d44928844b2d09fbb98d368ae7b54b7ec0771d13_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:093834bac2e2f7f01968ef542b9bcbf5fbe530c9f0dd86521825797abb4a33a2_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:190edd3effb60c56c885fc964d3eb48076293e1e43d745c4615ed00ef7daa145_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:382be8775c61942123adac2acec9f48085ebf7fd2b286c20e36a33ea6462baa7_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:5e83175abaef1e3046bac94621a86e036317833c740cdd6d235f1133a1388dd3_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:7173a298b07cbde3cd9ff12ca25f26ccf79b9ff8cfcb35a001c9f8c0b0291436_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:16cf5e33f297c027686d3ba9c6cbb01dba7a39299e2765fe4eaacc892b32f0d1_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:4715242f98234d2018f8317d9a57f63ff23b4d63be96491d55af2a2ef4572261_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:678c8d38900d994c4aa2e23669b7901747028690a4c5e4ba9aced4cbfe22b248_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:b39a2930e310d432a840798f03f7e55b8da42ff16ccda31790f85558d2be2537_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:1d01e27a3cdea6c99a985b877e29629d1c1fb00203f4a90c45db6df7a602e2cc_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:88b38ad10068e0574d2e5934849b98429c69305633b42aa4d19822ede2a6e10d_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:b020334c46f2d7276ba0c3aa8be7951254b197b2da310f0c22d2e16681a6a265_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:f2c222424cd66659ebea6787b6934c2d01d9eeb4f7db03ebfa16ab7b65aeb5b2_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:153f9e059139e6dbaeb2e5166d21bfeec59a59aa5cd8045e11dbfa091479b4bb_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:b2173caa314ae26d2a300f61cfa94031c34fe7676fd007418849212082db3636_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:cd9ada6b38c080eec45e1d053ec305dde2d574899019ffb01a28dbe1dd582912_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:f17eb032f7250aa4a3bb99e2754fa4cb0dbfc9fbbb8c787f70ad30b71b27b5a2_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1a57b53f8642ccb95884687efc251ad52e8ee3e718b55d0f4d21f800dfd3f5fa_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:6234cfecf4dd75b8c4ff1c527ad4eb306d966cfa0170ecdb8ea4bc69c2cdc495_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:779e75a94141db7f8223b9861ba2fa3ba8baf6fa470bb0ab109945d75e20121b_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:e593bebc4e753ac3c4cdd1be05711452dbda6e3b015b37926fa804851bdad6a8_s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5008dcb0428a0837b9abd827963e7008c8e16af8cfcbd432421286fca63fe714_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5856cba3fe26ab7f756ba93e06caa6e522336ff36ff4c515132a8d35c85a2f64_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:6ddf185f2714d45fab92c831bf32673da55c7a43dbcf1bd22090b203791e03b2_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:eb32b129ea6a10b4aada4313ff11b04c33b99877eea9a5e567245d361d69f140_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:165f6085028f3859f6ede9176d413274ee1a457b72cd9c437795146c20b0722c_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:7a39f26f51bcbb4ef395208db01e2b0ee8b1fe9b15b3701c9c35d8f636f790d9_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:a4d609ff22b610b625a74fffd22883d5debe93c2e0c6ae2bcbbfd8f5f6b2cf12_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:ec02f5f031fefd5a610b69a81be5350f96e54511e2d2c619e8b9fe8f193297b6_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:0070df2a8c7882ae021000c498ead96b19f1bd6819e46657d5898cb71e6ec506_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:4b578a8ef1579d7168b7f0a1b7cebe66213003f8225a86cfdd4c9f24a5e2d871_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:8d6371a5fe374e3bc5c19a930ea712d266fab13a722768204b128bc71e928c97_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:985b19d79b3e54fc8b99b9b0239b74dcf6d0102d3ff0cd5363ae4627069d2ee1_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:2a0a6ea6465a6d165f072ef782a1825cc16ecfb2f8c58d5ec58c1d40d02e5208_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:679b470190ff7a7fc04e283884be4f24d1b0c475d0730fb718f2f45c60551b61_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:9734d0dc0367884e128837b7d02038a3b4136c4865ed3dc90902801393e178b4_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:f5f35702e424cd4e9b768c59d44928844b2d09fbb98d368ae7b54b7ec0771d13_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:093834bac2e2f7f01968ef542b9bcbf5fbe530c9f0dd86521825797abb4a33a2_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:190edd3effb60c56c885fc964d3eb48076293e1e43d745c4615ed00ef7daa145_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:382be8775c61942123adac2acec9f48085ebf7fd2b286c20e36a33ea6462baa7_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:5e83175abaef1e3046bac94621a86e036317833c740cdd6d235f1133a1388dd3_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:7173a298b07cbde3cd9ff12ca25f26ccf79b9ff8cfcb35a001c9f8c0b0291436_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:16cf5e33f297c027686d3ba9c6cbb01dba7a39299e2765fe4eaacc892b32f0d1_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:4715242f98234d2018f8317d9a57f63ff23b4d63be96491d55af2a2ef4572261_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:678c8d38900d994c4aa2e23669b7901747028690a4c5e4ba9aced4cbfe22b248_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:b39a2930e310d432a840798f03f7e55b8da42ff16ccda31790f85558d2be2537_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:1d01e27a3cdea6c99a985b877e29629d1c1fb00203f4a90c45db6df7a602e2cc_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:88b38ad10068e0574d2e5934849b98429c69305633b42aa4d19822ede2a6e10d_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:b020334c46f2d7276ba0c3aa8be7951254b197b2da310f0c22d2e16681a6a265_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:f2c222424cd66659ebea6787b6934c2d01d9eeb4f7db03ebfa16ab7b65aeb5b2_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:153f9e059139e6dbaeb2e5166d21bfeec59a59aa5cd8045e11dbfa091479b4bb_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:b2173caa314ae26d2a300f61cfa94031c34fe7676fd007418849212082db3636_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:cd9ada6b38c080eec45e1d053ec305dde2d574899019ffb01a28dbe1dd582912_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:f17eb032f7250aa4a3bb99e2754fa4cb0dbfc9fbbb8c787f70ad30b71b27b5a2_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1a57b53f8642ccb95884687efc251ad52e8ee3e718b55d0f4d21f800dfd3f5fa_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:6234cfecf4dd75b8c4ff1c527ad4eb306d966cfa0170ecdb8ea4bc69c2cdc495_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:779e75a94141db7f8223b9861ba2fa3ba8baf6fa470bb0ab109945d75e20121b_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:e593bebc4e753ac3c4cdd1be05711452dbda6e3b015b37926fa804851bdad6a8_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: Incorrect enforcement of email constraints in crypto/x509"
},
{
"cve": "CVE-2026-33186",
"cwe": {
"id": "CWE-551",
"name": "Incorrect Behavior Order: Authorization Before Parsing and Canonicalization"
},
"discovery_date": "2026-03-20T23:02:27.802640+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5008dcb0428a0837b9abd827963e7008c8e16af8cfcbd432421286fca63fe714_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5856cba3fe26ab7f756ba93e06caa6e522336ff36ff4c515132a8d35c85a2f64_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:6ddf185f2714d45fab92c831bf32673da55c7a43dbcf1bd22090b203791e03b2_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:eb32b129ea6a10b4aada4313ff11b04c33b99877eea9a5e567245d361d69f140_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:165f6085028f3859f6ede9176d413274ee1a457b72cd9c437795146c20b0722c_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:7a39f26f51bcbb4ef395208db01e2b0ee8b1fe9b15b3701c9c35d8f636f790d9_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:a4d609ff22b610b625a74fffd22883d5debe93c2e0c6ae2bcbbfd8f5f6b2cf12_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:ec02f5f031fefd5a610b69a81be5350f96e54511e2d2c619e8b9fe8f193297b6_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:0070df2a8c7882ae021000c498ead96b19f1bd6819e46657d5898cb71e6ec506_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:4b578a8ef1579d7168b7f0a1b7cebe66213003f8225a86cfdd4c9f24a5e2d871_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:8d6371a5fe374e3bc5c19a930ea712d266fab13a722768204b128bc71e928c97_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:985b19d79b3e54fc8b99b9b0239b74dcf6d0102d3ff0cd5363ae4627069d2ee1_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:2a0a6ea6465a6d165f072ef782a1825cc16ecfb2f8c58d5ec58c1d40d02e5208_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:679b470190ff7a7fc04e283884be4f24d1b0c475d0730fb718f2f45c60551b61_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:9734d0dc0367884e128837b7d02038a3b4136c4865ed3dc90902801393e178b4_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:f5f35702e424cd4e9b768c59d44928844b2d09fbb98d368ae7b54b7ec0771d13_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:093834bac2e2f7f01968ef542b9bcbf5fbe530c9f0dd86521825797abb4a33a2_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:153f9e059139e6dbaeb2e5166d21bfeec59a59aa5cd8045e11dbfa091479b4bb_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:b2173caa314ae26d2a300f61cfa94031c34fe7676fd007418849212082db3636_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:cd9ada6b38c080eec45e1d053ec305dde2d574899019ffb01a28dbe1dd582912_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:f17eb032f7250aa4a3bb99e2754fa4cb0dbfc9fbbb8c787f70ad30b71b27b5a2_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1a57b53f8642ccb95884687efc251ad52e8ee3e718b55d0f4d21f800dfd3f5fa_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:6234cfecf4dd75b8c4ff1c527ad4eb306d966cfa0170ecdb8ea4bc69c2cdc495_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:779e75a94141db7f8223b9861ba2fa3ba8baf6fa470bb0ab109945d75e20121b_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:e593bebc4e753ac3c4cdd1be05711452dbda6e3b015b37926fa804851bdad6a8_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2449833"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in gRPC-Go, the Go language implementation of gRPC. This vulnerability, an authorization bypass, is caused by improper input validation of the HTTP/2 `:path` pseudo-header. A remote attacker can exploit this by sending raw HTTP/2 frames with a malformed `:path` that omits the mandatory leading slash. This allows the attacker to bypass defined security policies, potentially leading to unauthorized access to services or information disclosure.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "google.golang.org/grpc/grpc-go: google.golang.org/grpc/authz: gRPC-Go: Authorization bypass due to improper HTTP/2 path validation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:190edd3effb60c56c885fc964d3eb48076293e1e43d745c4615ed00ef7daa145_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:382be8775c61942123adac2acec9f48085ebf7fd2b286c20e36a33ea6462baa7_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:5e83175abaef1e3046bac94621a86e036317833c740cdd6d235f1133a1388dd3_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:7173a298b07cbde3cd9ff12ca25f26ccf79b9ff8cfcb35a001c9f8c0b0291436_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:16cf5e33f297c027686d3ba9c6cbb01dba7a39299e2765fe4eaacc892b32f0d1_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:4715242f98234d2018f8317d9a57f63ff23b4d63be96491d55af2a2ef4572261_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:678c8d38900d994c4aa2e23669b7901747028690a4c5e4ba9aced4cbfe22b248_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:b39a2930e310d432a840798f03f7e55b8da42ff16ccda31790f85558d2be2537_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:1d01e27a3cdea6c99a985b877e29629d1c1fb00203f4a90c45db6df7a602e2cc_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:88b38ad10068e0574d2e5934849b98429c69305633b42aa4d19822ede2a6e10d_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:b020334c46f2d7276ba0c3aa8be7951254b197b2da310f0c22d2e16681a6a265_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:f2c222424cd66659ebea6787b6934c2d01d9eeb4f7db03ebfa16ab7b65aeb5b2_amd64"
],
"known_not_affected": [
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5008dcb0428a0837b9abd827963e7008c8e16af8cfcbd432421286fca63fe714_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5856cba3fe26ab7f756ba93e06caa6e522336ff36ff4c515132a8d35c85a2f64_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:6ddf185f2714d45fab92c831bf32673da55c7a43dbcf1bd22090b203791e03b2_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:eb32b129ea6a10b4aada4313ff11b04c33b99877eea9a5e567245d361d69f140_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:165f6085028f3859f6ede9176d413274ee1a457b72cd9c437795146c20b0722c_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:7a39f26f51bcbb4ef395208db01e2b0ee8b1fe9b15b3701c9c35d8f636f790d9_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:a4d609ff22b610b625a74fffd22883d5debe93c2e0c6ae2bcbbfd8f5f6b2cf12_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:ec02f5f031fefd5a610b69a81be5350f96e54511e2d2c619e8b9fe8f193297b6_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:0070df2a8c7882ae021000c498ead96b19f1bd6819e46657d5898cb71e6ec506_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:4b578a8ef1579d7168b7f0a1b7cebe66213003f8225a86cfdd4c9f24a5e2d871_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:8d6371a5fe374e3bc5c19a930ea712d266fab13a722768204b128bc71e928c97_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:985b19d79b3e54fc8b99b9b0239b74dcf6d0102d3ff0cd5363ae4627069d2ee1_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:2a0a6ea6465a6d165f072ef782a1825cc16ecfb2f8c58d5ec58c1d40d02e5208_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:679b470190ff7a7fc04e283884be4f24d1b0c475d0730fb718f2f45c60551b61_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:9734d0dc0367884e128837b7d02038a3b4136c4865ed3dc90902801393e178b4_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:f5f35702e424cd4e9b768c59d44928844b2d09fbb98d368ae7b54b7ec0771d13_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:093834bac2e2f7f01968ef542b9bcbf5fbe530c9f0dd86521825797abb4a33a2_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:153f9e059139e6dbaeb2e5166d21bfeec59a59aa5cd8045e11dbfa091479b4bb_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:b2173caa314ae26d2a300f61cfa94031c34fe7676fd007418849212082db3636_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:cd9ada6b38c080eec45e1d053ec305dde2d574899019ffb01a28dbe1dd582912_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:f17eb032f7250aa4a3bb99e2754fa4cb0dbfc9fbbb8c787f70ad30b71b27b5a2_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1a57b53f8642ccb95884687efc251ad52e8ee3e718b55d0f4d21f800dfd3f5fa_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:6234cfecf4dd75b8c4ff1c527ad4eb306d966cfa0170ecdb8ea4bc69c2cdc495_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:779e75a94141db7f8223b9861ba2fa3ba8baf6fa470bb0ab109945d75e20121b_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:e593bebc4e753ac3c4cdd1be05711452dbda6e3b015b37926fa804851bdad6a8_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-33186"
},
{
"category": "external",
"summary": "RHBZ#2449833",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2449833"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-33186",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33186"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186"
},
{
"category": "external",
"summary": "https://github.com/grpc/grpc-go/security/advisories/GHSA-p77j-4mvh-x3m3",
"url": "https://github.com/grpc/grpc-go/security/advisories/GHSA-p77j-4mvh-x3m3"
}
],
"release_date": "2026-03-20T22:23:32.147000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-28T07:19:47+00:00",
"details": "It is recommended that existing users of Red Hat OpenShift Builds 1.7.1 upgrades to to 1.7.2",
"product_ids": [
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:190edd3effb60c56c885fc964d3eb48076293e1e43d745c4615ed00ef7daa145_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:382be8775c61942123adac2acec9f48085ebf7fd2b286c20e36a33ea6462baa7_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:5e83175abaef1e3046bac94621a86e036317833c740cdd6d235f1133a1388dd3_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:7173a298b07cbde3cd9ff12ca25f26ccf79b9ff8cfcb35a001c9f8c0b0291436_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:16cf5e33f297c027686d3ba9c6cbb01dba7a39299e2765fe4eaacc892b32f0d1_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:4715242f98234d2018f8317d9a57f63ff23b4d63be96491d55af2a2ef4572261_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:678c8d38900d994c4aa2e23669b7901747028690a4c5e4ba9aced4cbfe22b248_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:b39a2930e310d432a840798f03f7e55b8da42ff16ccda31790f85558d2be2537_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:1d01e27a3cdea6c99a985b877e29629d1c1fb00203f4a90c45db6df7a602e2cc_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:88b38ad10068e0574d2e5934849b98429c69305633b42aa4d19822ede2a6e10d_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:b020334c46f2d7276ba0c3aa8be7951254b197b2da310f0c22d2e16681a6a265_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:f2c222424cd66659ebea6787b6934c2d01d9eeb4f7db03ebfa16ab7b65aeb5b2_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:11331"
},
{
"category": "workaround",
"details": "To mitigate this issue, implement infrastructure-level normalization to ensure all incoming HTTP/2 `:path` headers are properly formatted with a leading slash before reaching the gRPC-Go server. This can be achieved by configuring a reverse proxy or API gateway to validate and normalize the `:path` header. Ensure that any such intermediary is properly configured and restarted to apply the changes, which may temporarily impact service availability.",
"product_ids": [
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5008dcb0428a0837b9abd827963e7008c8e16af8cfcbd432421286fca63fe714_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5856cba3fe26ab7f756ba93e06caa6e522336ff36ff4c515132a8d35c85a2f64_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:6ddf185f2714d45fab92c831bf32673da55c7a43dbcf1bd22090b203791e03b2_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:eb32b129ea6a10b4aada4313ff11b04c33b99877eea9a5e567245d361d69f140_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:165f6085028f3859f6ede9176d413274ee1a457b72cd9c437795146c20b0722c_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:7a39f26f51bcbb4ef395208db01e2b0ee8b1fe9b15b3701c9c35d8f636f790d9_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:a4d609ff22b610b625a74fffd22883d5debe93c2e0c6ae2bcbbfd8f5f6b2cf12_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:ec02f5f031fefd5a610b69a81be5350f96e54511e2d2c619e8b9fe8f193297b6_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:0070df2a8c7882ae021000c498ead96b19f1bd6819e46657d5898cb71e6ec506_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:4b578a8ef1579d7168b7f0a1b7cebe66213003f8225a86cfdd4c9f24a5e2d871_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:8d6371a5fe374e3bc5c19a930ea712d266fab13a722768204b128bc71e928c97_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:985b19d79b3e54fc8b99b9b0239b74dcf6d0102d3ff0cd5363ae4627069d2ee1_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:2a0a6ea6465a6d165f072ef782a1825cc16ecfb2f8c58d5ec58c1d40d02e5208_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:679b470190ff7a7fc04e283884be4f24d1b0c475d0730fb718f2f45c60551b61_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:9734d0dc0367884e128837b7d02038a3b4136c4865ed3dc90902801393e178b4_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:f5f35702e424cd4e9b768c59d44928844b2d09fbb98d368ae7b54b7ec0771d13_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:093834bac2e2f7f01968ef542b9bcbf5fbe530c9f0dd86521825797abb4a33a2_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:190edd3effb60c56c885fc964d3eb48076293e1e43d745c4615ed00ef7daa145_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:382be8775c61942123adac2acec9f48085ebf7fd2b286c20e36a33ea6462baa7_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:5e83175abaef1e3046bac94621a86e036317833c740cdd6d235f1133a1388dd3_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:7173a298b07cbde3cd9ff12ca25f26ccf79b9ff8cfcb35a001c9f8c0b0291436_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:16cf5e33f297c027686d3ba9c6cbb01dba7a39299e2765fe4eaacc892b32f0d1_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:4715242f98234d2018f8317d9a57f63ff23b4d63be96491d55af2a2ef4572261_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:678c8d38900d994c4aa2e23669b7901747028690a4c5e4ba9aced4cbfe22b248_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:b39a2930e310d432a840798f03f7e55b8da42ff16ccda31790f85558d2be2537_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:1d01e27a3cdea6c99a985b877e29629d1c1fb00203f4a90c45db6df7a602e2cc_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:88b38ad10068e0574d2e5934849b98429c69305633b42aa4d19822ede2a6e10d_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:b020334c46f2d7276ba0c3aa8be7951254b197b2da310f0c22d2e16681a6a265_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:f2c222424cd66659ebea6787b6934c2d01d9eeb4f7db03ebfa16ab7b65aeb5b2_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:153f9e059139e6dbaeb2e5166d21bfeec59a59aa5cd8045e11dbfa091479b4bb_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:b2173caa314ae26d2a300f61cfa94031c34fe7676fd007418849212082db3636_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:cd9ada6b38c080eec45e1d053ec305dde2d574899019ffb01a28dbe1dd582912_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:f17eb032f7250aa4a3bb99e2754fa4cb0dbfc9fbbb8c787f70ad30b71b27b5a2_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1a57b53f8642ccb95884687efc251ad52e8ee3e718b55d0f4d21f800dfd3f5fa_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:6234cfecf4dd75b8c4ff1c527ad4eb306d966cfa0170ecdb8ea4bc69c2cdc495_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:779e75a94141db7f8223b9861ba2fa3ba8baf6fa470bb0ab109945d75e20121b_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:e593bebc4e753ac3c4cdd1be05711452dbda6e3b015b37926fa804851bdad6a8_s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5008dcb0428a0837b9abd827963e7008c8e16af8cfcbd432421286fca63fe714_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5856cba3fe26ab7f756ba93e06caa6e522336ff36ff4c515132a8d35c85a2f64_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:6ddf185f2714d45fab92c831bf32673da55c7a43dbcf1bd22090b203791e03b2_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:eb32b129ea6a10b4aada4313ff11b04c33b99877eea9a5e567245d361d69f140_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:165f6085028f3859f6ede9176d413274ee1a457b72cd9c437795146c20b0722c_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:7a39f26f51bcbb4ef395208db01e2b0ee8b1fe9b15b3701c9c35d8f636f790d9_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:a4d609ff22b610b625a74fffd22883d5debe93c2e0c6ae2bcbbfd8f5f6b2cf12_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:ec02f5f031fefd5a610b69a81be5350f96e54511e2d2c619e8b9fe8f193297b6_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:0070df2a8c7882ae021000c498ead96b19f1bd6819e46657d5898cb71e6ec506_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:4b578a8ef1579d7168b7f0a1b7cebe66213003f8225a86cfdd4c9f24a5e2d871_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:8d6371a5fe374e3bc5c19a930ea712d266fab13a722768204b128bc71e928c97_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:985b19d79b3e54fc8b99b9b0239b74dcf6d0102d3ff0cd5363ae4627069d2ee1_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:2a0a6ea6465a6d165f072ef782a1825cc16ecfb2f8c58d5ec58c1d40d02e5208_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:679b470190ff7a7fc04e283884be4f24d1b0c475d0730fb718f2f45c60551b61_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:9734d0dc0367884e128837b7d02038a3b4136c4865ed3dc90902801393e178b4_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:f5f35702e424cd4e9b768c59d44928844b2d09fbb98d368ae7b54b7ec0771d13_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:093834bac2e2f7f01968ef542b9bcbf5fbe530c9f0dd86521825797abb4a33a2_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:190edd3effb60c56c885fc964d3eb48076293e1e43d745c4615ed00ef7daa145_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:382be8775c61942123adac2acec9f48085ebf7fd2b286c20e36a33ea6462baa7_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:5e83175abaef1e3046bac94621a86e036317833c740cdd6d235f1133a1388dd3_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:7173a298b07cbde3cd9ff12ca25f26ccf79b9ff8cfcb35a001c9f8c0b0291436_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:16cf5e33f297c027686d3ba9c6cbb01dba7a39299e2765fe4eaacc892b32f0d1_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:4715242f98234d2018f8317d9a57f63ff23b4d63be96491d55af2a2ef4572261_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:678c8d38900d994c4aa2e23669b7901747028690a4c5e4ba9aced4cbfe22b248_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:b39a2930e310d432a840798f03f7e55b8da42ff16ccda31790f85558d2be2537_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:1d01e27a3cdea6c99a985b877e29629d1c1fb00203f4a90c45db6df7a602e2cc_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:88b38ad10068e0574d2e5934849b98429c69305633b42aa4d19822ede2a6e10d_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:b020334c46f2d7276ba0c3aa8be7951254b197b2da310f0c22d2e16681a6a265_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:f2c222424cd66659ebea6787b6934c2d01d9eeb4f7db03ebfa16ab7b65aeb5b2_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:153f9e059139e6dbaeb2e5166d21bfeec59a59aa5cd8045e11dbfa091479b4bb_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:b2173caa314ae26d2a300f61cfa94031c34fe7676fd007418849212082db3636_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:cd9ada6b38c080eec45e1d053ec305dde2d574899019ffb01a28dbe1dd582912_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:f17eb032f7250aa4a3bb99e2754fa4cb0dbfc9fbbb8c787f70ad30b71b27b5a2_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1a57b53f8642ccb95884687efc251ad52e8ee3e718b55d0f4d21f800dfd3f5fa_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:6234cfecf4dd75b8c4ff1c527ad4eb306d966cfa0170ecdb8ea4bc69c2cdc495_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:779e75a94141db7f8223b9861ba2fa3ba8baf6fa470bb0ab109945d75e20121b_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:e593bebc4e753ac3c4cdd1be05711452dbda6e3b015b37926fa804851bdad6a8_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "google.golang.org/grpc/grpc-go: google.golang.org/grpc/authz: gRPC-Go: Authorization bypass due to improper HTTP/2 path validation"
},
{
"cve": "CVE-2026-33211",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2026-03-24T00:02:20.093480+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5008dcb0428a0837b9abd827963e7008c8e16af8cfcbd432421286fca63fe714_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5856cba3fe26ab7f756ba93e06caa6e522336ff36ff4c515132a8d35c85a2f64_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:6ddf185f2714d45fab92c831bf32673da55c7a43dbcf1bd22090b203791e03b2_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:eb32b129ea6a10b4aada4313ff11b04c33b99877eea9a5e567245d361d69f140_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:165f6085028f3859f6ede9176d413274ee1a457b72cd9c437795146c20b0722c_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:7a39f26f51bcbb4ef395208db01e2b0ee8b1fe9b15b3701c9c35d8f636f790d9_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:a4d609ff22b610b625a74fffd22883d5debe93c2e0c6ae2bcbbfd8f5f6b2cf12_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:ec02f5f031fefd5a610b69a81be5350f96e54511e2d2c619e8b9fe8f193297b6_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:0070df2a8c7882ae021000c498ead96b19f1bd6819e46657d5898cb71e6ec506_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:4b578a8ef1579d7168b7f0a1b7cebe66213003f8225a86cfdd4c9f24a5e2d871_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:8d6371a5fe374e3bc5c19a930ea712d266fab13a722768204b128bc71e928c97_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:985b19d79b3e54fc8b99b9b0239b74dcf6d0102d3ff0cd5363ae4627069d2ee1_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:2a0a6ea6465a6d165f072ef782a1825cc16ecfb2f8c58d5ec58c1d40d02e5208_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:679b470190ff7a7fc04e283884be4f24d1b0c475d0730fb718f2f45c60551b61_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:9734d0dc0367884e128837b7d02038a3b4136c4865ed3dc90902801393e178b4_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:f5f35702e424cd4e9b768c59d44928844b2d09fbb98d368ae7b54b7ec0771d13_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:093834bac2e2f7f01968ef542b9bcbf5fbe530c9f0dd86521825797abb4a33a2_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:16cf5e33f297c027686d3ba9c6cbb01dba7a39299e2765fe4eaacc892b32f0d1_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:4715242f98234d2018f8317d9a57f63ff23b4d63be96491d55af2a2ef4572261_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:678c8d38900d994c4aa2e23669b7901747028690a4c5e4ba9aced4cbfe22b248_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:b39a2930e310d432a840798f03f7e55b8da42ff16ccda31790f85558d2be2537_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:1d01e27a3cdea6c99a985b877e29629d1c1fb00203f4a90c45db6df7a602e2cc_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:88b38ad10068e0574d2e5934849b98429c69305633b42aa4d19822ede2a6e10d_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:b020334c46f2d7276ba0c3aa8be7951254b197b2da310f0c22d2e16681a6a265_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:f2c222424cd66659ebea6787b6934c2d01d9eeb4f7db03ebfa16ab7b65aeb5b2_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:153f9e059139e6dbaeb2e5166d21bfeec59a59aa5cd8045e11dbfa091479b4bb_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:b2173caa314ae26d2a300f61cfa94031c34fe7676fd007418849212082db3636_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:cd9ada6b38c080eec45e1d053ec305dde2d574899019ffb01a28dbe1dd582912_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:f17eb032f7250aa4a3bb99e2754fa4cb0dbfc9fbbb8c787f70ad30b71b27b5a2_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1a57b53f8642ccb95884687efc251ad52e8ee3e718b55d0f4d21f800dfd3f5fa_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:6234cfecf4dd75b8c4ff1c527ad4eb306d966cfa0170ecdb8ea4bc69c2cdc495_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:779e75a94141db7f8223b9861ba2fa3ba8baf6fa470bb0ab109945d75e20121b_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:e593bebc4e753ac3c4cdd1be05711452dbda6e3b015b37926fa804851bdad6a8_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2450554"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Tekton Pipelines, specifically in the Tekton Pipelines git resolver. A tenant with permissions to create ResolutionRequests can exploit a path traversal vulnerability via the `pathInRepo` parameter. This allows the tenant to read arbitrary files from the resolver pod\u0027s filesystem, leading to information disclosure, including sensitive ServiceAccount tokens. The contents of these files are returned in a base64-encoded format.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Tekton Pipelines: github.com/tektoncd/pipeline: Tekton Pipelines: Information disclosure via path traversal in git resolver",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to have the permission to create ResolutionRequests (e.g., by creating TaskRuns or PipelineRuns that use the git resolver) within at least one specific namespace, limiting the exposure of this issue to authenticated users. Also, an attacker can read any file readable by the resolver pod process, including cluster secrets, allowing an escalation of privileges from namespace-scoped access to cluster-wide access. Due to these reasons, this vulnerability has been rated with an important severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:190edd3effb60c56c885fc964d3eb48076293e1e43d745c4615ed00ef7daa145_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:382be8775c61942123adac2acec9f48085ebf7fd2b286c20e36a33ea6462baa7_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:5e83175abaef1e3046bac94621a86e036317833c740cdd6d235f1133a1388dd3_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:7173a298b07cbde3cd9ff12ca25f26ccf79b9ff8cfcb35a001c9f8c0b0291436_s390x"
],
"known_not_affected": [
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5008dcb0428a0837b9abd827963e7008c8e16af8cfcbd432421286fca63fe714_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5856cba3fe26ab7f756ba93e06caa6e522336ff36ff4c515132a8d35c85a2f64_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:6ddf185f2714d45fab92c831bf32673da55c7a43dbcf1bd22090b203791e03b2_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:eb32b129ea6a10b4aada4313ff11b04c33b99877eea9a5e567245d361d69f140_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:165f6085028f3859f6ede9176d413274ee1a457b72cd9c437795146c20b0722c_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:7a39f26f51bcbb4ef395208db01e2b0ee8b1fe9b15b3701c9c35d8f636f790d9_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:a4d609ff22b610b625a74fffd22883d5debe93c2e0c6ae2bcbbfd8f5f6b2cf12_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:ec02f5f031fefd5a610b69a81be5350f96e54511e2d2c619e8b9fe8f193297b6_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:0070df2a8c7882ae021000c498ead96b19f1bd6819e46657d5898cb71e6ec506_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:4b578a8ef1579d7168b7f0a1b7cebe66213003f8225a86cfdd4c9f24a5e2d871_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:8d6371a5fe374e3bc5c19a930ea712d266fab13a722768204b128bc71e928c97_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:985b19d79b3e54fc8b99b9b0239b74dcf6d0102d3ff0cd5363ae4627069d2ee1_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:2a0a6ea6465a6d165f072ef782a1825cc16ecfb2f8c58d5ec58c1d40d02e5208_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:679b470190ff7a7fc04e283884be4f24d1b0c475d0730fb718f2f45c60551b61_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:9734d0dc0367884e128837b7d02038a3b4136c4865ed3dc90902801393e178b4_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:f5f35702e424cd4e9b768c59d44928844b2d09fbb98d368ae7b54b7ec0771d13_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:093834bac2e2f7f01968ef542b9bcbf5fbe530c9f0dd86521825797abb4a33a2_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:16cf5e33f297c027686d3ba9c6cbb01dba7a39299e2765fe4eaacc892b32f0d1_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:4715242f98234d2018f8317d9a57f63ff23b4d63be96491d55af2a2ef4572261_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:678c8d38900d994c4aa2e23669b7901747028690a4c5e4ba9aced4cbfe22b248_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:b39a2930e310d432a840798f03f7e55b8da42ff16ccda31790f85558d2be2537_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:1d01e27a3cdea6c99a985b877e29629d1c1fb00203f4a90c45db6df7a602e2cc_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:88b38ad10068e0574d2e5934849b98429c69305633b42aa4d19822ede2a6e10d_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:b020334c46f2d7276ba0c3aa8be7951254b197b2da310f0c22d2e16681a6a265_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:f2c222424cd66659ebea6787b6934c2d01d9eeb4f7db03ebfa16ab7b65aeb5b2_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:153f9e059139e6dbaeb2e5166d21bfeec59a59aa5cd8045e11dbfa091479b4bb_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:b2173caa314ae26d2a300f61cfa94031c34fe7676fd007418849212082db3636_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:cd9ada6b38c080eec45e1d053ec305dde2d574899019ffb01a28dbe1dd582912_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:f17eb032f7250aa4a3bb99e2754fa4cb0dbfc9fbbb8c787f70ad30b71b27b5a2_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1a57b53f8642ccb95884687efc251ad52e8ee3e718b55d0f4d21f800dfd3f5fa_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:6234cfecf4dd75b8c4ff1c527ad4eb306d966cfa0170ecdb8ea4bc69c2cdc495_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:779e75a94141db7f8223b9861ba2fa3ba8baf6fa470bb0ab109945d75e20121b_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:e593bebc4e753ac3c4cdd1be05711452dbda6e3b015b37926fa804851bdad6a8_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-33211"
},
{
"category": "external",
"summary": "RHBZ#2450554",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2450554"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-33211",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33211"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-33211",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33211"
},
{
"category": "external",
"summary": "https://github.com/tektoncd/pipeline/commit/10fa538f9a2b6d01c75138f1ed7ba3da0e34687c",
"url": "https://github.com/tektoncd/pipeline/commit/10fa538f9a2b6d01c75138f1ed7ba3da0e34687c"
},
{
"category": "external",
"summary": "https://github.com/tektoncd/pipeline/commit/318006c4e3a5",
"url": "https://github.com/tektoncd/pipeline/commit/318006c4e3a5"
},
{
"category": "external",
"summary": "https://github.com/tektoncd/pipeline/commit/3ca7bc6e6dd1d97f80b84f78370d91edaf023cbd",
"url": "https://github.com/tektoncd/pipeline/commit/3ca7bc6e6dd1d97f80b84f78370d91edaf023cbd"
},
{
"category": "external",
"summary": "https://github.com/tektoncd/pipeline/commit/961388fcf3374bc7656d28ab58ca84987e0a75ae",
"url": "https://github.com/tektoncd/pipeline/commit/961388fcf3374bc7656d28ab58ca84987e0a75ae"
},
{
"category": "external",
"summary": "https://github.com/tektoncd/pipeline/commit/b1fee65b88aa969069c14c120045e97c37d9ee5e",
"url": "https://github.com/tektoncd/pipeline/commit/b1fee65b88aa969069c14c120045e97c37d9ee5e"
},
{
"category": "external",
"summary": "https://github.com/tektoncd/pipeline/commit/cdb4e1e97a4f3170f9bc2cbfff83a6c8107bc3db",
"url": "https://github.com/tektoncd/pipeline/commit/cdb4e1e97a4f3170f9bc2cbfff83a6c8107bc3db"
},
{
"category": "external",
"summary": "https://github.com/tektoncd/pipeline/commit/ec7755031a183b345cf9e64bea0e0505c1b9cb78",
"url": "https://github.com/tektoncd/pipeline/commit/ec7755031a183b345cf9e64bea0e0505c1b9cb78"
},
{
"category": "external",
"summary": "https://github.com/tektoncd/pipeline/security/advisories/GHSA-j5q5-j9gm-2w5c",
"url": "https://github.com/tektoncd/pipeline/security/advisories/GHSA-j5q5-j9gm-2w5c"
}
],
"release_date": "2026-03-23T23:55:54.089000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-28T07:19:47+00:00",
"details": "It is recommended that existing users of Red Hat OpenShift Builds 1.7.1 upgrades to to 1.7.2",
"product_ids": [
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:190edd3effb60c56c885fc964d3eb48076293e1e43d745c4615ed00ef7daa145_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:382be8775c61942123adac2acec9f48085ebf7fd2b286c20e36a33ea6462baa7_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:5e83175abaef1e3046bac94621a86e036317833c740cdd6d235f1133a1388dd3_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:7173a298b07cbde3cd9ff12ca25f26ccf79b9ff8cfcb35a001c9f8c0b0291436_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:11331"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, restrict the creation of ResolutionRequests to trusted users and service accounts. Implement strict Role-Based Access Control (RBAC) policies to limit which tenants can create TaskRuns or PipelineRuns that utilize the Tekton Pipelines git resolver. This reduces the exposure by preventing unauthorized access to the resolver pod\u0027s filesystem.",
"product_ids": [
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5008dcb0428a0837b9abd827963e7008c8e16af8cfcbd432421286fca63fe714_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5856cba3fe26ab7f756ba93e06caa6e522336ff36ff4c515132a8d35c85a2f64_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:6ddf185f2714d45fab92c831bf32673da55c7a43dbcf1bd22090b203791e03b2_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:eb32b129ea6a10b4aada4313ff11b04c33b99877eea9a5e567245d361d69f140_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:165f6085028f3859f6ede9176d413274ee1a457b72cd9c437795146c20b0722c_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:7a39f26f51bcbb4ef395208db01e2b0ee8b1fe9b15b3701c9c35d8f636f790d9_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:a4d609ff22b610b625a74fffd22883d5debe93c2e0c6ae2bcbbfd8f5f6b2cf12_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:ec02f5f031fefd5a610b69a81be5350f96e54511e2d2c619e8b9fe8f193297b6_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:0070df2a8c7882ae021000c498ead96b19f1bd6819e46657d5898cb71e6ec506_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:4b578a8ef1579d7168b7f0a1b7cebe66213003f8225a86cfdd4c9f24a5e2d871_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:8d6371a5fe374e3bc5c19a930ea712d266fab13a722768204b128bc71e928c97_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:985b19d79b3e54fc8b99b9b0239b74dcf6d0102d3ff0cd5363ae4627069d2ee1_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:2a0a6ea6465a6d165f072ef782a1825cc16ecfb2f8c58d5ec58c1d40d02e5208_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:679b470190ff7a7fc04e283884be4f24d1b0c475d0730fb718f2f45c60551b61_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:9734d0dc0367884e128837b7d02038a3b4136c4865ed3dc90902801393e178b4_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:f5f35702e424cd4e9b768c59d44928844b2d09fbb98d368ae7b54b7ec0771d13_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:093834bac2e2f7f01968ef542b9bcbf5fbe530c9f0dd86521825797abb4a33a2_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:190edd3effb60c56c885fc964d3eb48076293e1e43d745c4615ed00ef7daa145_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:382be8775c61942123adac2acec9f48085ebf7fd2b286c20e36a33ea6462baa7_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:5e83175abaef1e3046bac94621a86e036317833c740cdd6d235f1133a1388dd3_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:7173a298b07cbde3cd9ff12ca25f26ccf79b9ff8cfcb35a001c9f8c0b0291436_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:16cf5e33f297c027686d3ba9c6cbb01dba7a39299e2765fe4eaacc892b32f0d1_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:4715242f98234d2018f8317d9a57f63ff23b4d63be96491d55af2a2ef4572261_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:678c8d38900d994c4aa2e23669b7901747028690a4c5e4ba9aced4cbfe22b248_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:b39a2930e310d432a840798f03f7e55b8da42ff16ccda31790f85558d2be2537_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:1d01e27a3cdea6c99a985b877e29629d1c1fb00203f4a90c45db6df7a602e2cc_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:88b38ad10068e0574d2e5934849b98429c69305633b42aa4d19822ede2a6e10d_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:b020334c46f2d7276ba0c3aa8be7951254b197b2da310f0c22d2e16681a6a265_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:f2c222424cd66659ebea6787b6934c2d01d9eeb4f7db03ebfa16ab7b65aeb5b2_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:153f9e059139e6dbaeb2e5166d21bfeec59a59aa5cd8045e11dbfa091479b4bb_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:b2173caa314ae26d2a300f61cfa94031c34fe7676fd007418849212082db3636_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:cd9ada6b38c080eec45e1d053ec305dde2d574899019ffb01a28dbe1dd582912_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:f17eb032f7250aa4a3bb99e2754fa4cb0dbfc9fbbb8c787f70ad30b71b27b5a2_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1a57b53f8642ccb95884687efc251ad52e8ee3e718b55d0f4d21f800dfd3f5fa_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:6234cfecf4dd75b8c4ff1c527ad4eb306d966cfa0170ecdb8ea4bc69c2cdc495_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:779e75a94141db7f8223b9861ba2fa3ba8baf6fa470bb0ab109945d75e20121b_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:e593bebc4e753ac3c4cdd1be05711452dbda6e3b015b37926fa804851bdad6a8_s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5008dcb0428a0837b9abd827963e7008c8e16af8cfcbd432421286fca63fe714_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5856cba3fe26ab7f756ba93e06caa6e522336ff36ff4c515132a8d35c85a2f64_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:6ddf185f2714d45fab92c831bf32673da55c7a43dbcf1bd22090b203791e03b2_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:eb32b129ea6a10b4aada4313ff11b04c33b99877eea9a5e567245d361d69f140_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:165f6085028f3859f6ede9176d413274ee1a457b72cd9c437795146c20b0722c_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:7a39f26f51bcbb4ef395208db01e2b0ee8b1fe9b15b3701c9c35d8f636f790d9_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:a4d609ff22b610b625a74fffd22883d5debe93c2e0c6ae2bcbbfd8f5f6b2cf12_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:ec02f5f031fefd5a610b69a81be5350f96e54511e2d2c619e8b9fe8f193297b6_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:0070df2a8c7882ae021000c498ead96b19f1bd6819e46657d5898cb71e6ec506_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:4b578a8ef1579d7168b7f0a1b7cebe66213003f8225a86cfdd4c9f24a5e2d871_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:8d6371a5fe374e3bc5c19a930ea712d266fab13a722768204b128bc71e928c97_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:985b19d79b3e54fc8b99b9b0239b74dcf6d0102d3ff0cd5363ae4627069d2ee1_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:2a0a6ea6465a6d165f072ef782a1825cc16ecfb2f8c58d5ec58c1d40d02e5208_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:679b470190ff7a7fc04e283884be4f24d1b0c475d0730fb718f2f45c60551b61_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:9734d0dc0367884e128837b7d02038a3b4136c4865ed3dc90902801393e178b4_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:f5f35702e424cd4e9b768c59d44928844b2d09fbb98d368ae7b54b7ec0771d13_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:093834bac2e2f7f01968ef542b9bcbf5fbe530c9f0dd86521825797abb4a33a2_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:190edd3effb60c56c885fc964d3eb48076293e1e43d745c4615ed00ef7daa145_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:382be8775c61942123adac2acec9f48085ebf7fd2b286c20e36a33ea6462baa7_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:5e83175abaef1e3046bac94621a86e036317833c740cdd6d235f1133a1388dd3_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:7173a298b07cbde3cd9ff12ca25f26ccf79b9ff8cfcb35a001c9f8c0b0291436_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:16cf5e33f297c027686d3ba9c6cbb01dba7a39299e2765fe4eaacc892b32f0d1_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:4715242f98234d2018f8317d9a57f63ff23b4d63be96491d55af2a2ef4572261_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:678c8d38900d994c4aa2e23669b7901747028690a4c5e4ba9aced4cbfe22b248_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:b39a2930e310d432a840798f03f7e55b8da42ff16ccda31790f85558d2be2537_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:1d01e27a3cdea6c99a985b877e29629d1c1fb00203f4a90c45db6df7a602e2cc_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:88b38ad10068e0574d2e5934849b98429c69305633b42aa4d19822ede2a6e10d_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:b020334c46f2d7276ba0c3aa8be7951254b197b2da310f0c22d2e16681a6a265_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:f2c222424cd66659ebea6787b6934c2d01d9eeb4f7db03ebfa16ab7b65aeb5b2_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:153f9e059139e6dbaeb2e5166d21bfeec59a59aa5cd8045e11dbfa091479b4bb_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:b2173caa314ae26d2a300f61cfa94031c34fe7676fd007418849212082db3636_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:cd9ada6b38c080eec45e1d053ec305dde2d574899019ffb01a28dbe1dd582912_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:f17eb032f7250aa4a3bb99e2754fa4cb0dbfc9fbbb8c787f70ad30b71b27b5a2_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1a57b53f8642ccb95884687efc251ad52e8ee3e718b55d0f4d21f800dfd3f5fa_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:6234cfecf4dd75b8c4ff1c527ad4eb306d966cfa0170ecdb8ea4bc69c2cdc495_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:779e75a94141db7f8223b9861ba2fa3ba8baf6fa470bb0ab109945d75e20121b_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:e593bebc4e753ac3c4cdd1be05711452dbda6e3b015b37926fa804851bdad6a8_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Tekton Pipelines: github.com/tektoncd/pipeline: Tekton Pipelines: Information disclosure via path traversal in git resolver"
},
{
"cve": "CVE-2026-33810",
"cwe": {
"id": "CWE-1289",
"name": "Improper Validation of Unsafe Equivalence in Input"
},
"discovery_date": "2026-04-08T02:01:09.100830+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5008dcb0428a0837b9abd827963e7008c8e16af8cfcbd432421286fca63fe714_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5856cba3fe26ab7f756ba93e06caa6e522336ff36ff4c515132a8d35c85a2f64_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:6ddf185f2714d45fab92c831bf32673da55c7a43dbcf1bd22090b203791e03b2_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:eb32b129ea6a10b4aada4313ff11b04c33b99877eea9a5e567245d361d69f140_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:165f6085028f3859f6ede9176d413274ee1a457b72cd9c437795146c20b0722c_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:7a39f26f51bcbb4ef395208db01e2b0ee8b1fe9b15b3701c9c35d8f636f790d9_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:a4d609ff22b610b625a74fffd22883d5debe93c2e0c6ae2bcbbfd8f5f6b2cf12_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:ec02f5f031fefd5a610b69a81be5350f96e54511e2d2c619e8b9fe8f193297b6_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:0070df2a8c7882ae021000c498ead96b19f1bd6819e46657d5898cb71e6ec506_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:4b578a8ef1579d7168b7f0a1b7cebe66213003f8225a86cfdd4c9f24a5e2d871_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:8d6371a5fe374e3bc5c19a930ea712d266fab13a722768204b128bc71e928c97_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:985b19d79b3e54fc8b99b9b0239b74dcf6d0102d3ff0cd5363ae4627069d2ee1_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:2a0a6ea6465a6d165f072ef782a1825cc16ecfb2f8c58d5ec58c1d40d02e5208_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:679b470190ff7a7fc04e283884be4f24d1b0c475d0730fb718f2f45c60551b61_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:9734d0dc0367884e128837b7d02038a3b4136c4865ed3dc90902801393e178b4_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:f5f35702e424cd4e9b768c59d44928844b2d09fbb98d368ae7b54b7ec0771d13_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:093834bac2e2f7f01968ef542b9bcbf5fbe530c9f0dd86521825797abb4a33a2_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:190edd3effb60c56c885fc964d3eb48076293e1e43d745c4615ed00ef7daa145_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:382be8775c61942123adac2acec9f48085ebf7fd2b286c20e36a33ea6462baa7_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:5e83175abaef1e3046bac94621a86e036317833c740cdd6d235f1133a1388dd3_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:7173a298b07cbde3cd9ff12ca25f26ccf79b9ff8cfcb35a001c9f8c0b0291436_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:16cf5e33f297c027686d3ba9c6cbb01dba7a39299e2765fe4eaacc892b32f0d1_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:4715242f98234d2018f8317d9a57f63ff23b4d63be96491d55af2a2ef4572261_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:678c8d38900d994c4aa2e23669b7901747028690a4c5e4ba9aced4cbfe22b248_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:b39a2930e310d432a840798f03f7e55b8da42ff16ccda31790f85558d2be2537_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:1d01e27a3cdea6c99a985b877e29629d1c1fb00203f4a90c45db6df7a602e2cc_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:88b38ad10068e0574d2e5934849b98429c69305633b42aa4d19822ede2a6e10d_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:b020334c46f2d7276ba0c3aa8be7951254b197b2da310f0c22d2e16681a6a265_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:f2c222424cd66659ebea6787b6934c2d01d9eeb4f7db03ebfa16ab7b65aeb5b2_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1a57b53f8642ccb95884687efc251ad52e8ee3e718b55d0f4d21f800dfd3f5fa_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:6234cfecf4dd75b8c4ff1c527ad4eb306d966cfa0170ecdb8ea4bc69c2cdc495_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:779e75a94141db7f8223b9861ba2fa3ba8baf6fa470bb0ab109945d75e20121b_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:e593bebc4e753ac3c4cdd1be05711452dbda6e3b015b37926fa804851bdad6a8_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2456335"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the `crypto/x509` package within Go (golang). When verifying a certificate chain, excluded DNS (Domain Name System) constraints are not correctly applied to wildcard DNS Subject Alternative Names (SANs) if the case of the SAN differs from the constraint. This oversight could allow an attacker to bypass certificate validation, potentially leading to the acceptance of a malicious certificate that should have been rejected. This issue specifically impacts the validation of trusted certificate chains.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Go crypto/x509: Certificate validation bypass due to incorrect DNS constraint application",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:153f9e059139e6dbaeb2e5166d21bfeec59a59aa5cd8045e11dbfa091479b4bb_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:b2173caa314ae26d2a300f61cfa94031c34fe7676fd007418849212082db3636_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:cd9ada6b38c080eec45e1d053ec305dde2d574899019ffb01a28dbe1dd582912_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:f17eb032f7250aa4a3bb99e2754fa4cb0dbfc9fbbb8c787f70ad30b71b27b5a2_ppc64le"
],
"known_not_affected": [
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5008dcb0428a0837b9abd827963e7008c8e16af8cfcbd432421286fca63fe714_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5856cba3fe26ab7f756ba93e06caa6e522336ff36ff4c515132a8d35c85a2f64_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:6ddf185f2714d45fab92c831bf32673da55c7a43dbcf1bd22090b203791e03b2_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:eb32b129ea6a10b4aada4313ff11b04c33b99877eea9a5e567245d361d69f140_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:165f6085028f3859f6ede9176d413274ee1a457b72cd9c437795146c20b0722c_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:7a39f26f51bcbb4ef395208db01e2b0ee8b1fe9b15b3701c9c35d8f636f790d9_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:a4d609ff22b610b625a74fffd22883d5debe93c2e0c6ae2bcbbfd8f5f6b2cf12_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:ec02f5f031fefd5a610b69a81be5350f96e54511e2d2c619e8b9fe8f193297b6_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:0070df2a8c7882ae021000c498ead96b19f1bd6819e46657d5898cb71e6ec506_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:4b578a8ef1579d7168b7f0a1b7cebe66213003f8225a86cfdd4c9f24a5e2d871_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:8d6371a5fe374e3bc5c19a930ea712d266fab13a722768204b128bc71e928c97_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:985b19d79b3e54fc8b99b9b0239b74dcf6d0102d3ff0cd5363ae4627069d2ee1_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:2a0a6ea6465a6d165f072ef782a1825cc16ecfb2f8c58d5ec58c1d40d02e5208_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:679b470190ff7a7fc04e283884be4f24d1b0c475d0730fb718f2f45c60551b61_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:9734d0dc0367884e128837b7d02038a3b4136c4865ed3dc90902801393e178b4_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:f5f35702e424cd4e9b768c59d44928844b2d09fbb98d368ae7b54b7ec0771d13_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:093834bac2e2f7f01968ef542b9bcbf5fbe530c9f0dd86521825797abb4a33a2_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:190edd3effb60c56c885fc964d3eb48076293e1e43d745c4615ed00ef7daa145_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:382be8775c61942123adac2acec9f48085ebf7fd2b286c20e36a33ea6462baa7_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:5e83175abaef1e3046bac94621a86e036317833c740cdd6d235f1133a1388dd3_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:7173a298b07cbde3cd9ff12ca25f26ccf79b9ff8cfcb35a001c9f8c0b0291436_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:16cf5e33f297c027686d3ba9c6cbb01dba7a39299e2765fe4eaacc892b32f0d1_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:4715242f98234d2018f8317d9a57f63ff23b4d63be96491d55af2a2ef4572261_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:678c8d38900d994c4aa2e23669b7901747028690a4c5e4ba9aced4cbfe22b248_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:b39a2930e310d432a840798f03f7e55b8da42ff16ccda31790f85558d2be2537_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:1d01e27a3cdea6c99a985b877e29629d1c1fb00203f4a90c45db6df7a602e2cc_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:88b38ad10068e0574d2e5934849b98429c69305633b42aa4d19822ede2a6e10d_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:b020334c46f2d7276ba0c3aa8be7951254b197b2da310f0c22d2e16681a6a265_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:f2c222424cd66659ebea6787b6934c2d01d9eeb4f7db03ebfa16ab7b65aeb5b2_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1a57b53f8642ccb95884687efc251ad52e8ee3e718b55d0f4d21f800dfd3f5fa_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:6234cfecf4dd75b8c4ff1c527ad4eb306d966cfa0170ecdb8ea4bc69c2cdc495_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:779e75a94141db7f8223b9861ba2fa3ba8baf6fa470bb0ab109945d75e20121b_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:e593bebc4e753ac3c4cdd1be05711452dbda6e3b015b37926fa804851bdad6a8_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-33810"
},
{
"category": "external",
"summary": "RHBZ#2456335",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2456335"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-33810",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33810"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-33810",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33810"
},
{
"category": "external",
"summary": "https://go.dev/cl/763763",
"url": "https://go.dev/cl/763763"
},
{
"category": "external",
"summary": "https://go.dev/issue/78332",
"url": "https://go.dev/issue/78332"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU",
"url": "https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4866",
"url": "https://pkg.go.dev/vuln/GO-2026-4866"
}
],
"release_date": "2026-04-08T01:06:56.546000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-28T07:19:47+00:00",
"details": "It is recommended that existing users of Red Hat OpenShift Builds 1.7.1 upgrades to to 1.7.2",
"product_ids": [
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:153f9e059139e6dbaeb2e5166d21bfeec59a59aa5cd8045e11dbfa091479b4bb_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:b2173caa314ae26d2a300f61cfa94031c34fe7676fd007418849212082db3636_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:cd9ada6b38c080eec45e1d053ec305dde2d574899019ffb01a28dbe1dd582912_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:f17eb032f7250aa4a3bb99e2754fa4cb0dbfc9fbbb8c787f70ad30b71b27b5a2_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:11331"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5008dcb0428a0837b9abd827963e7008c8e16af8cfcbd432421286fca63fe714_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5856cba3fe26ab7f756ba93e06caa6e522336ff36ff4c515132a8d35c85a2f64_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:6ddf185f2714d45fab92c831bf32673da55c7a43dbcf1bd22090b203791e03b2_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:eb32b129ea6a10b4aada4313ff11b04c33b99877eea9a5e567245d361d69f140_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:165f6085028f3859f6ede9176d413274ee1a457b72cd9c437795146c20b0722c_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:7a39f26f51bcbb4ef395208db01e2b0ee8b1fe9b15b3701c9c35d8f636f790d9_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:a4d609ff22b610b625a74fffd22883d5debe93c2e0c6ae2bcbbfd8f5f6b2cf12_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:ec02f5f031fefd5a610b69a81be5350f96e54511e2d2c619e8b9fe8f193297b6_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:0070df2a8c7882ae021000c498ead96b19f1bd6819e46657d5898cb71e6ec506_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:4b578a8ef1579d7168b7f0a1b7cebe66213003f8225a86cfdd4c9f24a5e2d871_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:8d6371a5fe374e3bc5c19a930ea712d266fab13a722768204b128bc71e928c97_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:985b19d79b3e54fc8b99b9b0239b74dcf6d0102d3ff0cd5363ae4627069d2ee1_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:2a0a6ea6465a6d165f072ef782a1825cc16ecfb2f8c58d5ec58c1d40d02e5208_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:679b470190ff7a7fc04e283884be4f24d1b0c475d0730fb718f2f45c60551b61_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:9734d0dc0367884e128837b7d02038a3b4136c4865ed3dc90902801393e178b4_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:f5f35702e424cd4e9b768c59d44928844b2d09fbb98d368ae7b54b7ec0771d13_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:093834bac2e2f7f01968ef542b9bcbf5fbe530c9f0dd86521825797abb4a33a2_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:190edd3effb60c56c885fc964d3eb48076293e1e43d745c4615ed00ef7daa145_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:382be8775c61942123adac2acec9f48085ebf7fd2b286c20e36a33ea6462baa7_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:5e83175abaef1e3046bac94621a86e036317833c740cdd6d235f1133a1388dd3_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:7173a298b07cbde3cd9ff12ca25f26ccf79b9ff8cfcb35a001c9f8c0b0291436_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:16cf5e33f297c027686d3ba9c6cbb01dba7a39299e2765fe4eaacc892b32f0d1_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:4715242f98234d2018f8317d9a57f63ff23b4d63be96491d55af2a2ef4572261_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:678c8d38900d994c4aa2e23669b7901747028690a4c5e4ba9aced4cbfe22b248_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:b39a2930e310d432a840798f03f7e55b8da42ff16ccda31790f85558d2be2537_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:1d01e27a3cdea6c99a985b877e29629d1c1fb00203f4a90c45db6df7a602e2cc_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:88b38ad10068e0574d2e5934849b98429c69305633b42aa4d19822ede2a6e10d_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:b020334c46f2d7276ba0c3aa8be7951254b197b2da310f0c22d2e16681a6a265_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:f2c222424cd66659ebea6787b6934c2d01d9eeb4f7db03ebfa16ab7b65aeb5b2_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:153f9e059139e6dbaeb2e5166d21bfeec59a59aa5cd8045e11dbfa091479b4bb_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:b2173caa314ae26d2a300f61cfa94031c34fe7676fd007418849212082db3636_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:cd9ada6b38c080eec45e1d053ec305dde2d574899019ffb01a28dbe1dd582912_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:f17eb032f7250aa4a3bb99e2754fa4cb0dbfc9fbbb8c787f70ad30b71b27b5a2_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1a57b53f8642ccb95884687efc251ad52e8ee3e718b55d0f4d21f800dfd3f5fa_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:6234cfecf4dd75b8c4ff1c527ad4eb306d966cfa0170ecdb8ea4bc69c2cdc495_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:779e75a94141db7f8223b9861ba2fa3ba8baf6fa470bb0ab109945d75e20121b_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:e593bebc4e753ac3c4cdd1be05711452dbda6e3b015b37926fa804851bdad6a8_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Go crypto/x509: Certificate validation bypass due to incorrect DNS constraint application"
}
]
}
RHSA-2026:10158
Vulnerability from csaf_redhat - Published: 2026-04-23 14:13 - Updated: 2026-05-04 17:04A flaw was found in the crypto/tls component. This vulnerability occurs during Transport Layer Security (TLS) session resumption when certificate authority (CA) settings are modified between the initial and resumed handshakes. An attacker could exploit this to bypass certificate validation, allowing a client or server to establish a connection that should have been rejected. This could lead to an authentication bypass under specific conditions.
The Go standard library function net/url.Parse insufficiently validated the host/authority component and accepted some invalid URLs by effectively treating garbage before an IP-literal as ignorable. The function should have rejected this as invalid.
A certificate validation flaw has been discovered in the golang crypto/x509 module. When verifying a certificate chain which contains a certificate containing multiple email address constraints which share common local portions but different domain portions, these constraints will not be properly applied, and only the last constraint will be considered.
A flaw was found in gRPC-Go, the Go language implementation of gRPC. This vulnerability, an authorization bypass, is caused by improper input validation of the HTTP/2 `:path` pseudo-header. A remote attacker can exploit this by sending raw HTTP/2 frames with a malformed `:path` that omits the mandatory leading slash. This allows the attacker to bypass defined security policies, potentially leading to unauthorized access to services or information disclosure.
A flaw was found in Tekton Pipelines, specifically in the Tekton Pipelines git resolver. A tenant with permissions to create ResolutionRequests can exploit a path traversal vulnerability via the `pathInRepo` parameter. This allows the tenant to read arbitrary files from the resolver pod's filesystem, leading to information disclosure, including sensitive ServiceAccount tokens. The contents of these files are returned in a base64-encoded format.
A flaw was found in the `crypto/x509` package within Go (golang). When verifying a certificate chain, excluded DNS (Domain Name System) constraints are not correctly applied to wildcard DNS Subject Alternative Names (SANs) if the case of the SAN differs from the constraint. This oversight could allow an attacker to bypass certificate validation, potentially leading to the acceptance of a malicious certificate that should have been rejected. This issue specifically impacts the validation of trusted certificate chains.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Builds 1.7.2",
"title": "Topic"
},
{
"category": "general",
"text": "Releases of Red Hat OpenShift Builds 1.7.2",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:10158",
"url": "https://access.redhat.com/errata/RHSA-2026:10158"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-68121",
"url": "https://access.redhat.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-25679",
"url": "https://access.redhat.com/security/cve/CVE-2026-25679"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-27137",
"url": "https://access.redhat.com/security/cve/CVE-2026-27137"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-33186",
"url": "https://access.redhat.com/security/cve/CVE-2026-33186"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-33211",
"url": "https://access.redhat.com/security/cve/CVE-2026-33211"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-33810",
"url": "https://access.redhat.com/security/cve/CVE-2026-33810"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/builds_for_red_hat_openshift/1.7",
"url": "https://docs.redhat.com/en/documentation/builds_for_red_hat_openshift/1.7"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_10158.json"
}
],
"title": "Red Hat Security Advisory: Red Hat OpenShift Builds 1.7.2",
"tracking": {
"current_release_date": "2026-05-04T17:04:13+00:00",
"generator": {
"date": "2026-05-04T17:04:13+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.9"
}
},
"id": "RHSA-2026:10158",
"initial_release_date": "2026-04-23T14:13:54+00:00",
"revision_history": [
{
"date": "2026-04-23T14:13:54+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-04-23T14:14:00+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-05-04T17:04:13+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Builds 1.7.2",
"product": {
"name": "Red Hat OpenShift Builds 1.7.2",
"product_id": "Red Hat OpenShift Builds 1.7.2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift_builds:1.7::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Builds"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5008dcb0428a0837b9abd827963e7008c8e16af8cfcbd432421286fca63fe714_amd64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5008dcb0428a0837b9abd827963e7008c8e16af8cfcbd432421286fca63fe714_amd64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5008dcb0428a0837b9abd827963e7008c8e16af8cfcbd432421286fca63fe714_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-controller-rhel9@sha256%3A5008dcb0428a0837b9abd827963e7008c8e16af8cfcbd432421286fca63fe714?arch=amd64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776846689"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:165f6085028f3859f6ede9176d413274ee1a457b72cd9c437795146c20b0722c_amd64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:165f6085028f3859f6ede9176d413274ee1a457b72cd9c437795146c20b0722c_amd64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:165f6085028f3859f6ede9176d413274ee1a457b72cd9c437795146c20b0722c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-git-cloner-rhel9@sha256%3A165f6085028f3859f6ede9176d413274ee1a457b72cd9c437795146c20b0722c?arch=amd64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776847166"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:985b19d79b3e54fc8b99b9b0239b74dcf6d0102d3ff0cd5363ae4627069d2ee1_amd64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:985b19d79b3e54fc8b99b9b0239b74dcf6d0102d3ff0cd5363ae4627069d2ee1_amd64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:985b19d79b3e54fc8b99b9b0239b74dcf6d0102d3ff0cd5363ae4627069d2ee1_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-image-bundler-rhel9@sha256%3A985b19d79b3e54fc8b99b9b0239b74dcf6d0102d3ff0cd5363ae4627069d2ee1?arch=amd64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776846372"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:f5f35702e424cd4e9b768c59d44928844b2d09fbb98d368ae7b54b7ec0771d13_amd64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:f5f35702e424cd4e9b768c59d44928844b2d09fbb98d368ae7b54b7ec0771d13_amd64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:f5f35702e424cd4e9b768c59d44928844b2d09fbb98d368ae7b54b7ec0771d13_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-image-processing-rhel9@sha256%3Af5f35702e424cd4e9b768c59d44928844b2d09fbb98d368ae7b54b7ec0771d13?arch=amd64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776849396"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:5e83175abaef1e3046bac94621a86e036317833c740cdd6d235f1133a1388dd3_amd64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:5e83175abaef1e3046bac94621a86e036317833c740cdd6d235f1133a1388dd3_amd64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:5e83175abaef1e3046bac94621a86e036317833c740cdd6d235f1133a1388dd3_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-rhel9-operator@sha256%3A5e83175abaef1e3046bac94621a86e036317833c740cdd6d235f1133a1388dd3?arch=amd64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776860241"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:093834bac2e2f7f01968ef542b9bcbf5fbe530c9f0dd86521825797abb4a33a2_amd64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:093834bac2e2f7f01968ef542b9bcbf5fbe530c9f0dd86521825797abb4a33a2_amd64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:093834bac2e2f7f01968ef542b9bcbf5fbe530c9f0dd86521825797abb4a33a2_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-operator-bundle@sha256%3A093834bac2e2f7f01968ef542b9bcbf5fbe530c9f0dd86521825797abb4a33a2?arch=amd64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776937971"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:16cf5e33f297c027686d3ba9c6cbb01dba7a39299e2765fe4eaacc892b32f0d1_amd64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:16cf5e33f297c027686d3ba9c6cbb01dba7a39299e2765fe4eaacc892b32f0d1_amd64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:16cf5e33f297c027686d3ba9c6cbb01dba7a39299e2765fe4eaacc892b32f0d1_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-shared-resource-rhel9@sha256%3A16cf5e33f297c027686d3ba9c6cbb01dba7a39299e2765fe4eaacc892b32f0d1?arch=amd64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776851459"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:f2c222424cd66659ebea6787b6934c2d01d9eeb4f7db03ebfa16ab7b65aeb5b2_amd64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:f2c222424cd66659ebea6787b6934c2d01d9eeb4f7db03ebfa16ab7b65aeb5b2_amd64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:f2c222424cd66659ebea6787b6934c2d01d9eeb4f7db03ebfa16ab7b65aeb5b2_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-shared-resource-webhook-rhel9@sha256%3Af2c222424cd66659ebea6787b6934c2d01d9eeb4f7db03ebfa16ab7b65aeb5b2?arch=amd64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776852111"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:153f9e059139e6dbaeb2e5166d21bfeec59a59aa5cd8045e11dbfa091479b4bb_amd64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:153f9e059139e6dbaeb2e5166d21bfeec59a59aa5cd8045e11dbfa091479b4bb_amd64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:153f9e059139e6dbaeb2e5166d21bfeec59a59aa5cd8045e11dbfa091479b4bb_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-waiters-rhel9@sha256%3A153f9e059139e6dbaeb2e5166d21bfeec59a59aa5cd8045e11dbfa091479b4bb?arch=amd64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776846936"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:6234cfecf4dd75b8c4ff1c527ad4eb306d966cfa0170ecdb8ea4bc69c2cdc495_amd64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:6234cfecf4dd75b8c4ff1c527ad4eb306d966cfa0170ecdb8ea4bc69c2cdc495_amd64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:6234cfecf4dd75b8c4ff1c527ad4eb306d966cfa0170ecdb8ea4bc69c2cdc495_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-webhook-rhel9@sha256%3A6234cfecf4dd75b8c4ff1c527ad4eb306d966cfa0170ecdb8ea4bc69c2cdc495?arch=amd64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776846493"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:eb32b129ea6a10b4aada4313ff11b04c33b99877eea9a5e567245d361d69f140_arm64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:eb32b129ea6a10b4aada4313ff11b04c33b99877eea9a5e567245d361d69f140_arm64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:eb32b129ea6a10b4aada4313ff11b04c33b99877eea9a5e567245d361d69f140_arm64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-controller-rhel9@sha256%3Aeb32b129ea6a10b4aada4313ff11b04c33b99877eea9a5e567245d361d69f140?arch=arm64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776846689"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:7a39f26f51bcbb4ef395208db01e2b0ee8b1fe9b15b3701c9c35d8f636f790d9_arm64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:7a39f26f51bcbb4ef395208db01e2b0ee8b1fe9b15b3701c9c35d8f636f790d9_arm64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:7a39f26f51bcbb4ef395208db01e2b0ee8b1fe9b15b3701c9c35d8f636f790d9_arm64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-git-cloner-rhel9@sha256%3A7a39f26f51bcbb4ef395208db01e2b0ee8b1fe9b15b3701c9c35d8f636f790d9?arch=arm64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776847166"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:0070df2a8c7882ae021000c498ead96b19f1bd6819e46657d5898cb71e6ec506_arm64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:0070df2a8c7882ae021000c498ead96b19f1bd6819e46657d5898cb71e6ec506_arm64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:0070df2a8c7882ae021000c498ead96b19f1bd6819e46657d5898cb71e6ec506_arm64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-image-bundler-rhel9@sha256%3A0070df2a8c7882ae021000c498ead96b19f1bd6819e46657d5898cb71e6ec506?arch=arm64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776846372"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:2a0a6ea6465a6d165f072ef782a1825cc16ecfb2f8c58d5ec58c1d40d02e5208_arm64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:2a0a6ea6465a6d165f072ef782a1825cc16ecfb2f8c58d5ec58c1d40d02e5208_arm64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:2a0a6ea6465a6d165f072ef782a1825cc16ecfb2f8c58d5ec58c1d40d02e5208_arm64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-image-processing-rhel9@sha256%3A2a0a6ea6465a6d165f072ef782a1825cc16ecfb2f8c58d5ec58c1d40d02e5208?arch=arm64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776849396"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:382be8775c61942123adac2acec9f48085ebf7fd2b286c20e36a33ea6462baa7_arm64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:382be8775c61942123adac2acec9f48085ebf7fd2b286c20e36a33ea6462baa7_arm64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:382be8775c61942123adac2acec9f48085ebf7fd2b286c20e36a33ea6462baa7_arm64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-rhel9-operator@sha256%3A382be8775c61942123adac2acec9f48085ebf7fd2b286c20e36a33ea6462baa7?arch=arm64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776860241"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:4715242f98234d2018f8317d9a57f63ff23b4d63be96491d55af2a2ef4572261_arm64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:4715242f98234d2018f8317d9a57f63ff23b4d63be96491d55af2a2ef4572261_arm64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:4715242f98234d2018f8317d9a57f63ff23b4d63be96491d55af2a2ef4572261_arm64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-shared-resource-rhel9@sha256%3A4715242f98234d2018f8317d9a57f63ff23b4d63be96491d55af2a2ef4572261?arch=arm64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776851459"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:b020334c46f2d7276ba0c3aa8be7951254b197b2da310f0c22d2e16681a6a265_arm64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:b020334c46f2d7276ba0c3aa8be7951254b197b2da310f0c22d2e16681a6a265_arm64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:b020334c46f2d7276ba0c3aa8be7951254b197b2da310f0c22d2e16681a6a265_arm64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-shared-resource-webhook-rhel9@sha256%3Ab020334c46f2d7276ba0c3aa8be7951254b197b2da310f0c22d2e16681a6a265?arch=arm64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776852111"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:cd9ada6b38c080eec45e1d053ec305dde2d574899019ffb01a28dbe1dd582912_arm64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:cd9ada6b38c080eec45e1d053ec305dde2d574899019ffb01a28dbe1dd582912_arm64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:cd9ada6b38c080eec45e1d053ec305dde2d574899019ffb01a28dbe1dd582912_arm64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-waiters-rhel9@sha256%3Acd9ada6b38c080eec45e1d053ec305dde2d574899019ffb01a28dbe1dd582912?arch=arm64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776846936"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1a57b53f8642ccb95884687efc251ad52e8ee3e718b55d0f4d21f800dfd3f5fa_arm64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1a57b53f8642ccb95884687efc251ad52e8ee3e718b55d0f4d21f800dfd3f5fa_arm64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1a57b53f8642ccb95884687efc251ad52e8ee3e718b55d0f4d21f800dfd3f5fa_arm64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-webhook-rhel9@sha256%3A1a57b53f8642ccb95884687efc251ad52e8ee3e718b55d0f4d21f800dfd3f5fa?arch=arm64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776846493"
}
}
}
],
"category": "architecture",
"name": "arm64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:6ddf185f2714d45fab92c831bf32673da55c7a43dbcf1bd22090b203791e03b2_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:6ddf185f2714d45fab92c831bf32673da55c7a43dbcf1bd22090b203791e03b2_ppc64le",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:6ddf185f2714d45fab92c831bf32673da55c7a43dbcf1bd22090b203791e03b2_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-controller-rhel9@sha256%3A6ddf185f2714d45fab92c831bf32673da55c7a43dbcf1bd22090b203791e03b2?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776846689"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:ec02f5f031fefd5a610b69a81be5350f96e54511e2d2c619e8b9fe8f193297b6_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:ec02f5f031fefd5a610b69a81be5350f96e54511e2d2c619e8b9fe8f193297b6_ppc64le",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:ec02f5f031fefd5a610b69a81be5350f96e54511e2d2c619e8b9fe8f193297b6_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-git-cloner-rhel9@sha256%3Aec02f5f031fefd5a610b69a81be5350f96e54511e2d2c619e8b9fe8f193297b6?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776847166"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:4b578a8ef1579d7168b7f0a1b7cebe66213003f8225a86cfdd4c9f24a5e2d871_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:4b578a8ef1579d7168b7f0a1b7cebe66213003f8225a86cfdd4c9f24a5e2d871_ppc64le",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:4b578a8ef1579d7168b7f0a1b7cebe66213003f8225a86cfdd4c9f24a5e2d871_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-image-bundler-rhel9@sha256%3A4b578a8ef1579d7168b7f0a1b7cebe66213003f8225a86cfdd4c9f24a5e2d871?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776846372"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:9734d0dc0367884e128837b7d02038a3b4136c4865ed3dc90902801393e178b4_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:9734d0dc0367884e128837b7d02038a3b4136c4865ed3dc90902801393e178b4_ppc64le",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:9734d0dc0367884e128837b7d02038a3b4136c4865ed3dc90902801393e178b4_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-image-processing-rhel9@sha256%3A9734d0dc0367884e128837b7d02038a3b4136c4865ed3dc90902801393e178b4?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776849396"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:190edd3effb60c56c885fc964d3eb48076293e1e43d745c4615ed00ef7daa145_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:190edd3effb60c56c885fc964d3eb48076293e1e43d745c4615ed00ef7daa145_ppc64le",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:190edd3effb60c56c885fc964d3eb48076293e1e43d745c4615ed00ef7daa145_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-rhel9-operator@sha256%3A190edd3effb60c56c885fc964d3eb48076293e1e43d745c4615ed00ef7daa145?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776860241"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:678c8d38900d994c4aa2e23669b7901747028690a4c5e4ba9aced4cbfe22b248_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:678c8d38900d994c4aa2e23669b7901747028690a4c5e4ba9aced4cbfe22b248_ppc64le",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:678c8d38900d994c4aa2e23669b7901747028690a4c5e4ba9aced4cbfe22b248_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-shared-resource-rhel9@sha256%3A678c8d38900d994c4aa2e23669b7901747028690a4c5e4ba9aced4cbfe22b248?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776851459"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:88b38ad10068e0574d2e5934849b98429c69305633b42aa4d19822ede2a6e10d_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:88b38ad10068e0574d2e5934849b98429c69305633b42aa4d19822ede2a6e10d_ppc64le",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:88b38ad10068e0574d2e5934849b98429c69305633b42aa4d19822ede2a6e10d_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-shared-resource-webhook-rhel9@sha256%3A88b38ad10068e0574d2e5934849b98429c69305633b42aa4d19822ede2a6e10d?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776852111"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:f17eb032f7250aa4a3bb99e2754fa4cb0dbfc9fbbb8c787f70ad30b71b27b5a2_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:f17eb032f7250aa4a3bb99e2754fa4cb0dbfc9fbbb8c787f70ad30b71b27b5a2_ppc64le",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:f17eb032f7250aa4a3bb99e2754fa4cb0dbfc9fbbb8c787f70ad30b71b27b5a2_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-waiters-rhel9@sha256%3Af17eb032f7250aa4a3bb99e2754fa4cb0dbfc9fbbb8c787f70ad30b71b27b5a2?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776846936"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:779e75a94141db7f8223b9861ba2fa3ba8baf6fa470bb0ab109945d75e20121b_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:779e75a94141db7f8223b9861ba2fa3ba8baf6fa470bb0ab109945d75e20121b_ppc64le",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:779e75a94141db7f8223b9861ba2fa3ba8baf6fa470bb0ab109945d75e20121b_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-webhook-rhel9@sha256%3A779e75a94141db7f8223b9861ba2fa3ba8baf6fa470bb0ab109945d75e20121b?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776846493"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5856cba3fe26ab7f756ba93e06caa6e522336ff36ff4c515132a8d35c85a2f64_s390x",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5856cba3fe26ab7f756ba93e06caa6e522336ff36ff4c515132a8d35c85a2f64_s390x",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5856cba3fe26ab7f756ba93e06caa6e522336ff36ff4c515132a8d35c85a2f64_s390x",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-controller-rhel9@sha256%3A5856cba3fe26ab7f756ba93e06caa6e522336ff36ff4c515132a8d35c85a2f64?arch=s390x\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776846689"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:a4d609ff22b610b625a74fffd22883d5debe93c2e0c6ae2bcbbfd8f5f6b2cf12_s390x",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:a4d609ff22b610b625a74fffd22883d5debe93c2e0c6ae2bcbbfd8f5f6b2cf12_s390x",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:a4d609ff22b610b625a74fffd22883d5debe93c2e0c6ae2bcbbfd8f5f6b2cf12_s390x",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-git-cloner-rhel9@sha256%3Aa4d609ff22b610b625a74fffd22883d5debe93c2e0c6ae2bcbbfd8f5f6b2cf12?arch=s390x\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776847166"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:8d6371a5fe374e3bc5c19a930ea712d266fab13a722768204b128bc71e928c97_s390x",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:8d6371a5fe374e3bc5c19a930ea712d266fab13a722768204b128bc71e928c97_s390x",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:8d6371a5fe374e3bc5c19a930ea712d266fab13a722768204b128bc71e928c97_s390x",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-image-bundler-rhel9@sha256%3A8d6371a5fe374e3bc5c19a930ea712d266fab13a722768204b128bc71e928c97?arch=s390x\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776846372"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:679b470190ff7a7fc04e283884be4f24d1b0c475d0730fb718f2f45c60551b61_s390x",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:679b470190ff7a7fc04e283884be4f24d1b0c475d0730fb718f2f45c60551b61_s390x",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:679b470190ff7a7fc04e283884be4f24d1b0c475d0730fb718f2f45c60551b61_s390x",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-image-processing-rhel9@sha256%3A679b470190ff7a7fc04e283884be4f24d1b0c475d0730fb718f2f45c60551b61?arch=s390x\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776849396"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:7173a298b07cbde3cd9ff12ca25f26ccf79b9ff8cfcb35a001c9f8c0b0291436_s390x",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:7173a298b07cbde3cd9ff12ca25f26ccf79b9ff8cfcb35a001c9f8c0b0291436_s390x",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:7173a298b07cbde3cd9ff12ca25f26ccf79b9ff8cfcb35a001c9f8c0b0291436_s390x",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-rhel9-operator@sha256%3A7173a298b07cbde3cd9ff12ca25f26ccf79b9ff8cfcb35a001c9f8c0b0291436?arch=s390x\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776860241"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:b39a2930e310d432a840798f03f7e55b8da42ff16ccda31790f85558d2be2537_s390x",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:b39a2930e310d432a840798f03f7e55b8da42ff16ccda31790f85558d2be2537_s390x",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:b39a2930e310d432a840798f03f7e55b8da42ff16ccda31790f85558d2be2537_s390x",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-shared-resource-rhel9@sha256%3Ab39a2930e310d432a840798f03f7e55b8da42ff16ccda31790f85558d2be2537?arch=s390x\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776851459"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:1d01e27a3cdea6c99a985b877e29629d1c1fb00203f4a90c45db6df7a602e2cc_s390x",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:1d01e27a3cdea6c99a985b877e29629d1c1fb00203f4a90c45db6df7a602e2cc_s390x",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:1d01e27a3cdea6c99a985b877e29629d1c1fb00203f4a90c45db6df7a602e2cc_s390x",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-shared-resource-webhook-rhel9@sha256%3A1d01e27a3cdea6c99a985b877e29629d1c1fb00203f4a90c45db6df7a602e2cc?arch=s390x\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776852111"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:b2173caa314ae26d2a300f61cfa94031c34fe7676fd007418849212082db3636_s390x",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:b2173caa314ae26d2a300f61cfa94031c34fe7676fd007418849212082db3636_s390x",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:b2173caa314ae26d2a300f61cfa94031c34fe7676fd007418849212082db3636_s390x",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-waiters-rhel9@sha256%3Ab2173caa314ae26d2a300f61cfa94031c34fe7676fd007418849212082db3636?arch=s390x\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776846936"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:e593bebc4e753ac3c4cdd1be05711452dbda6e3b015b37926fa804851bdad6a8_s390x",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:e593bebc4e753ac3c4cdd1be05711452dbda6e3b015b37926fa804851bdad6a8_s390x",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:e593bebc4e753ac3c4cdd1be05711452dbda6e3b015b37926fa804851bdad6a8_s390x",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-webhook-rhel9@sha256%3Ae593bebc4e753ac3c4cdd1be05711452dbda6e3b015b37926fa804851bdad6a8?arch=s390x\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776846493"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5008dcb0428a0837b9abd827963e7008c8e16af8cfcbd432421286fca63fe714_amd64 as a component of Red Hat OpenShift Builds 1.7.2",
"product_id": "Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5008dcb0428a0837b9abd827963e7008c8e16af8cfcbd432421286fca63fe714_amd64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5008dcb0428a0837b9abd827963e7008c8e16af8cfcbd432421286fca63fe714_amd64",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.7.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5856cba3fe26ab7f756ba93e06caa6e522336ff36ff4c515132a8d35c85a2f64_s390x as a component of Red Hat OpenShift Builds 1.7.2",
"product_id": "Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5856cba3fe26ab7f756ba93e06caa6e522336ff36ff4c515132a8d35c85a2f64_s390x"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5856cba3fe26ab7f756ba93e06caa6e522336ff36ff4c515132a8d35c85a2f64_s390x",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.7.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:6ddf185f2714d45fab92c831bf32673da55c7a43dbcf1bd22090b203791e03b2_ppc64le as a component of Red Hat OpenShift Builds 1.7.2",
"product_id": "Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:6ddf185f2714d45fab92c831bf32673da55c7a43dbcf1bd22090b203791e03b2_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:6ddf185f2714d45fab92c831bf32673da55c7a43dbcf1bd22090b203791e03b2_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.7.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:eb32b129ea6a10b4aada4313ff11b04c33b99877eea9a5e567245d361d69f140_arm64 as a component of Red Hat OpenShift Builds 1.7.2",
"product_id": "Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:eb32b129ea6a10b4aada4313ff11b04c33b99877eea9a5e567245d361d69f140_arm64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:eb32b129ea6a10b4aada4313ff11b04c33b99877eea9a5e567245d361d69f140_arm64",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.7.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:165f6085028f3859f6ede9176d413274ee1a457b72cd9c437795146c20b0722c_amd64 as a component of Red Hat OpenShift Builds 1.7.2",
"product_id": "Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:165f6085028f3859f6ede9176d413274ee1a457b72cd9c437795146c20b0722c_amd64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:165f6085028f3859f6ede9176d413274ee1a457b72cd9c437795146c20b0722c_amd64",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.7.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:7a39f26f51bcbb4ef395208db01e2b0ee8b1fe9b15b3701c9c35d8f636f790d9_arm64 as a component of Red Hat OpenShift Builds 1.7.2",
"product_id": "Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:7a39f26f51bcbb4ef395208db01e2b0ee8b1fe9b15b3701c9c35d8f636f790d9_arm64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:7a39f26f51bcbb4ef395208db01e2b0ee8b1fe9b15b3701c9c35d8f636f790d9_arm64",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.7.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:a4d609ff22b610b625a74fffd22883d5debe93c2e0c6ae2bcbbfd8f5f6b2cf12_s390x as a component of Red Hat OpenShift Builds 1.7.2",
"product_id": "Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:a4d609ff22b610b625a74fffd22883d5debe93c2e0c6ae2bcbbfd8f5f6b2cf12_s390x"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:a4d609ff22b610b625a74fffd22883d5debe93c2e0c6ae2bcbbfd8f5f6b2cf12_s390x",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.7.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:ec02f5f031fefd5a610b69a81be5350f96e54511e2d2c619e8b9fe8f193297b6_ppc64le as a component of Red Hat OpenShift Builds 1.7.2",
"product_id": "Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:ec02f5f031fefd5a610b69a81be5350f96e54511e2d2c619e8b9fe8f193297b6_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:ec02f5f031fefd5a610b69a81be5350f96e54511e2d2c619e8b9fe8f193297b6_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.7.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:0070df2a8c7882ae021000c498ead96b19f1bd6819e46657d5898cb71e6ec506_arm64 as a component of Red Hat OpenShift Builds 1.7.2",
"product_id": "Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:0070df2a8c7882ae021000c498ead96b19f1bd6819e46657d5898cb71e6ec506_arm64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:0070df2a8c7882ae021000c498ead96b19f1bd6819e46657d5898cb71e6ec506_arm64",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.7.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:4b578a8ef1579d7168b7f0a1b7cebe66213003f8225a86cfdd4c9f24a5e2d871_ppc64le as a component of Red Hat OpenShift Builds 1.7.2",
"product_id": "Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:4b578a8ef1579d7168b7f0a1b7cebe66213003f8225a86cfdd4c9f24a5e2d871_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:4b578a8ef1579d7168b7f0a1b7cebe66213003f8225a86cfdd4c9f24a5e2d871_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.7.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:8d6371a5fe374e3bc5c19a930ea712d266fab13a722768204b128bc71e928c97_s390x as a component of Red Hat OpenShift Builds 1.7.2",
"product_id": "Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:8d6371a5fe374e3bc5c19a930ea712d266fab13a722768204b128bc71e928c97_s390x"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:8d6371a5fe374e3bc5c19a930ea712d266fab13a722768204b128bc71e928c97_s390x",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.7.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:985b19d79b3e54fc8b99b9b0239b74dcf6d0102d3ff0cd5363ae4627069d2ee1_amd64 as a component of Red Hat OpenShift Builds 1.7.2",
"product_id": "Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:985b19d79b3e54fc8b99b9b0239b74dcf6d0102d3ff0cd5363ae4627069d2ee1_amd64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:985b19d79b3e54fc8b99b9b0239b74dcf6d0102d3ff0cd5363ae4627069d2ee1_amd64",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.7.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:2a0a6ea6465a6d165f072ef782a1825cc16ecfb2f8c58d5ec58c1d40d02e5208_arm64 as a component of Red Hat OpenShift Builds 1.7.2",
"product_id": "Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:2a0a6ea6465a6d165f072ef782a1825cc16ecfb2f8c58d5ec58c1d40d02e5208_arm64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:2a0a6ea6465a6d165f072ef782a1825cc16ecfb2f8c58d5ec58c1d40d02e5208_arm64",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.7.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:679b470190ff7a7fc04e283884be4f24d1b0c475d0730fb718f2f45c60551b61_s390x as a component of Red Hat OpenShift Builds 1.7.2",
"product_id": "Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:679b470190ff7a7fc04e283884be4f24d1b0c475d0730fb718f2f45c60551b61_s390x"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:679b470190ff7a7fc04e283884be4f24d1b0c475d0730fb718f2f45c60551b61_s390x",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.7.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:9734d0dc0367884e128837b7d02038a3b4136c4865ed3dc90902801393e178b4_ppc64le as a component of Red Hat OpenShift Builds 1.7.2",
"product_id": "Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:9734d0dc0367884e128837b7d02038a3b4136c4865ed3dc90902801393e178b4_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:9734d0dc0367884e128837b7d02038a3b4136c4865ed3dc90902801393e178b4_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.7.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:f5f35702e424cd4e9b768c59d44928844b2d09fbb98d368ae7b54b7ec0771d13_amd64 as a component of Red Hat OpenShift Builds 1.7.2",
"product_id": "Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:f5f35702e424cd4e9b768c59d44928844b2d09fbb98d368ae7b54b7ec0771d13_amd64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:f5f35702e424cd4e9b768c59d44928844b2d09fbb98d368ae7b54b7ec0771d13_amd64",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.7.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:093834bac2e2f7f01968ef542b9bcbf5fbe530c9f0dd86521825797abb4a33a2_amd64 as a component of Red Hat OpenShift Builds 1.7.2",
"product_id": "Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:093834bac2e2f7f01968ef542b9bcbf5fbe530c9f0dd86521825797abb4a33a2_amd64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:093834bac2e2f7f01968ef542b9bcbf5fbe530c9f0dd86521825797abb4a33a2_amd64",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.7.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:190edd3effb60c56c885fc964d3eb48076293e1e43d745c4615ed00ef7daa145_ppc64le as a component of Red Hat OpenShift Builds 1.7.2",
"product_id": "Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:190edd3effb60c56c885fc964d3eb48076293e1e43d745c4615ed00ef7daa145_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:190edd3effb60c56c885fc964d3eb48076293e1e43d745c4615ed00ef7daa145_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.7.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:382be8775c61942123adac2acec9f48085ebf7fd2b286c20e36a33ea6462baa7_arm64 as a component of Red Hat OpenShift Builds 1.7.2",
"product_id": "Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:382be8775c61942123adac2acec9f48085ebf7fd2b286c20e36a33ea6462baa7_arm64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:382be8775c61942123adac2acec9f48085ebf7fd2b286c20e36a33ea6462baa7_arm64",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.7.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:5e83175abaef1e3046bac94621a86e036317833c740cdd6d235f1133a1388dd3_amd64 as a component of Red Hat OpenShift Builds 1.7.2",
"product_id": "Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:5e83175abaef1e3046bac94621a86e036317833c740cdd6d235f1133a1388dd3_amd64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:5e83175abaef1e3046bac94621a86e036317833c740cdd6d235f1133a1388dd3_amd64",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.7.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:7173a298b07cbde3cd9ff12ca25f26ccf79b9ff8cfcb35a001c9f8c0b0291436_s390x as a component of Red Hat OpenShift Builds 1.7.2",
"product_id": "Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:7173a298b07cbde3cd9ff12ca25f26ccf79b9ff8cfcb35a001c9f8c0b0291436_s390x"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:7173a298b07cbde3cd9ff12ca25f26ccf79b9ff8cfcb35a001c9f8c0b0291436_s390x",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.7.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:16cf5e33f297c027686d3ba9c6cbb01dba7a39299e2765fe4eaacc892b32f0d1_amd64 as a component of Red Hat OpenShift Builds 1.7.2",
"product_id": "Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:16cf5e33f297c027686d3ba9c6cbb01dba7a39299e2765fe4eaacc892b32f0d1_amd64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:16cf5e33f297c027686d3ba9c6cbb01dba7a39299e2765fe4eaacc892b32f0d1_amd64",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.7.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:4715242f98234d2018f8317d9a57f63ff23b4d63be96491d55af2a2ef4572261_arm64 as a component of Red Hat OpenShift Builds 1.7.2",
"product_id": "Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:4715242f98234d2018f8317d9a57f63ff23b4d63be96491d55af2a2ef4572261_arm64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:4715242f98234d2018f8317d9a57f63ff23b4d63be96491d55af2a2ef4572261_arm64",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.7.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:678c8d38900d994c4aa2e23669b7901747028690a4c5e4ba9aced4cbfe22b248_ppc64le as a component of Red Hat OpenShift Builds 1.7.2",
"product_id": "Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:678c8d38900d994c4aa2e23669b7901747028690a4c5e4ba9aced4cbfe22b248_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:678c8d38900d994c4aa2e23669b7901747028690a4c5e4ba9aced4cbfe22b248_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.7.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:b39a2930e310d432a840798f03f7e55b8da42ff16ccda31790f85558d2be2537_s390x as a component of Red Hat OpenShift Builds 1.7.2",
"product_id": "Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:b39a2930e310d432a840798f03f7e55b8da42ff16ccda31790f85558d2be2537_s390x"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:b39a2930e310d432a840798f03f7e55b8da42ff16ccda31790f85558d2be2537_s390x",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.7.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:1d01e27a3cdea6c99a985b877e29629d1c1fb00203f4a90c45db6df7a602e2cc_s390x as a component of Red Hat OpenShift Builds 1.7.2",
"product_id": "Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:1d01e27a3cdea6c99a985b877e29629d1c1fb00203f4a90c45db6df7a602e2cc_s390x"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:1d01e27a3cdea6c99a985b877e29629d1c1fb00203f4a90c45db6df7a602e2cc_s390x",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.7.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:88b38ad10068e0574d2e5934849b98429c69305633b42aa4d19822ede2a6e10d_ppc64le as a component of Red Hat OpenShift Builds 1.7.2",
"product_id": "Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:88b38ad10068e0574d2e5934849b98429c69305633b42aa4d19822ede2a6e10d_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:88b38ad10068e0574d2e5934849b98429c69305633b42aa4d19822ede2a6e10d_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.7.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:b020334c46f2d7276ba0c3aa8be7951254b197b2da310f0c22d2e16681a6a265_arm64 as a component of Red Hat OpenShift Builds 1.7.2",
"product_id": "Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:b020334c46f2d7276ba0c3aa8be7951254b197b2da310f0c22d2e16681a6a265_arm64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:b020334c46f2d7276ba0c3aa8be7951254b197b2da310f0c22d2e16681a6a265_arm64",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.7.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:f2c222424cd66659ebea6787b6934c2d01d9eeb4f7db03ebfa16ab7b65aeb5b2_amd64 as a component of Red Hat OpenShift Builds 1.7.2",
"product_id": "Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:f2c222424cd66659ebea6787b6934c2d01d9eeb4f7db03ebfa16ab7b65aeb5b2_amd64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:f2c222424cd66659ebea6787b6934c2d01d9eeb4f7db03ebfa16ab7b65aeb5b2_amd64",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.7.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:153f9e059139e6dbaeb2e5166d21bfeec59a59aa5cd8045e11dbfa091479b4bb_amd64 as a component of Red Hat OpenShift Builds 1.7.2",
"product_id": "Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:153f9e059139e6dbaeb2e5166d21bfeec59a59aa5cd8045e11dbfa091479b4bb_amd64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:153f9e059139e6dbaeb2e5166d21bfeec59a59aa5cd8045e11dbfa091479b4bb_amd64",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.7.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:b2173caa314ae26d2a300f61cfa94031c34fe7676fd007418849212082db3636_s390x as a component of Red Hat OpenShift Builds 1.7.2",
"product_id": "Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:b2173caa314ae26d2a300f61cfa94031c34fe7676fd007418849212082db3636_s390x"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:b2173caa314ae26d2a300f61cfa94031c34fe7676fd007418849212082db3636_s390x",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.7.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:cd9ada6b38c080eec45e1d053ec305dde2d574899019ffb01a28dbe1dd582912_arm64 as a component of Red Hat OpenShift Builds 1.7.2",
"product_id": "Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:cd9ada6b38c080eec45e1d053ec305dde2d574899019ffb01a28dbe1dd582912_arm64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:cd9ada6b38c080eec45e1d053ec305dde2d574899019ffb01a28dbe1dd582912_arm64",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.7.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:f17eb032f7250aa4a3bb99e2754fa4cb0dbfc9fbbb8c787f70ad30b71b27b5a2_ppc64le as a component of Red Hat OpenShift Builds 1.7.2",
"product_id": "Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:f17eb032f7250aa4a3bb99e2754fa4cb0dbfc9fbbb8c787f70ad30b71b27b5a2_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:f17eb032f7250aa4a3bb99e2754fa4cb0dbfc9fbbb8c787f70ad30b71b27b5a2_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.7.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1a57b53f8642ccb95884687efc251ad52e8ee3e718b55d0f4d21f800dfd3f5fa_arm64 as a component of Red Hat OpenShift Builds 1.7.2",
"product_id": "Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1a57b53f8642ccb95884687efc251ad52e8ee3e718b55d0f4d21f800dfd3f5fa_arm64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1a57b53f8642ccb95884687efc251ad52e8ee3e718b55d0f4d21f800dfd3f5fa_arm64",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.7.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:6234cfecf4dd75b8c4ff1c527ad4eb306d966cfa0170ecdb8ea4bc69c2cdc495_amd64 as a component of Red Hat OpenShift Builds 1.7.2",
"product_id": "Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:6234cfecf4dd75b8c4ff1c527ad4eb306d966cfa0170ecdb8ea4bc69c2cdc495_amd64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:6234cfecf4dd75b8c4ff1c527ad4eb306d966cfa0170ecdb8ea4bc69c2cdc495_amd64",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.7.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:779e75a94141db7f8223b9861ba2fa3ba8baf6fa470bb0ab109945d75e20121b_ppc64le as a component of Red Hat OpenShift Builds 1.7.2",
"product_id": "Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:779e75a94141db7f8223b9861ba2fa3ba8baf6fa470bb0ab109945d75e20121b_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:779e75a94141db7f8223b9861ba2fa3ba8baf6fa470bb0ab109945d75e20121b_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.7.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:e593bebc4e753ac3c4cdd1be05711452dbda6e3b015b37926fa804851bdad6a8_s390x as a component of Red Hat OpenShift Builds 1.7.2",
"product_id": "Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:e593bebc4e753ac3c4cdd1be05711452dbda6e3b015b37926fa804851bdad6a8_s390x"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:e593bebc4e753ac3c4cdd1be05711452dbda6e3b015b37926fa804851bdad6a8_s390x",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.7.2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-68121",
"discovery_date": "2026-02-05T18:01:30.086058+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5008dcb0428a0837b9abd827963e7008c8e16af8cfcbd432421286fca63fe714_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5856cba3fe26ab7f756ba93e06caa6e522336ff36ff4c515132a8d35c85a2f64_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:6ddf185f2714d45fab92c831bf32673da55c7a43dbcf1bd22090b203791e03b2_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:eb32b129ea6a10b4aada4313ff11b04c33b99877eea9a5e567245d361d69f140_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:165f6085028f3859f6ede9176d413274ee1a457b72cd9c437795146c20b0722c_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:7a39f26f51bcbb4ef395208db01e2b0ee8b1fe9b15b3701c9c35d8f636f790d9_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:a4d609ff22b610b625a74fffd22883d5debe93c2e0c6ae2bcbbfd8f5f6b2cf12_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:ec02f5f031fefd5a610b69a81be5350f96e54511e2d2c619e8b9fe8f193297b6_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:0070df2a8c7882ae021000c498ead96b19f1bd6819e46657d5898cb71e6ec506_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:4b578a8ef1579d7168b7f0a1b7cebe66213003f8225a86cfdd4c9f24a5e2d871_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:8d6371a5fe374e3bc5c19a930ea712d266fab13a722768204b128bc71e928c97_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:985b19d79b3e54fc8b99b9b0239b74dcf6d0102d3ff0cd5363ae4627069d2ee1_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:2a0a6ea6465a6d165f072ef782a1825cc16ecfb2f8c58d5ec58c1d40d02e5208_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:679b470190ff7a7fc04e283884be4f24d1b0c475d0730fb718f2f45c60551b61_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:9734d0dc0367884e128837b7d02038a3b4136c4865ed3dc90902801393e178b4_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:f5f35702e424cd4e9b768c59d44928844b2d09fbb98d368ae7b54b7ec0771d13_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:093834bac2e2f7f01968ef542b9bcbf5fbe530c9f0dd86521825797abb4a33a2_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:190edd3effb60c56c885fc964d3eb48076293e1e43d745c4615ed00ef7daa145_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:382be8775c61942123adac2acec9f48085ebf7fd2b286c20e36a33ea6462baa7_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:5e83175abaef1e3046bac94621a86e036317833c740cdd6d235f1133a1388dd3_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:7173a298b07cbde3cd9ff12ca25f26ccf79b9ff8cfcb35a001c9f8c0b0291436_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:16cf5e33f297c027686d3ba9c6cbb01dba7a39299e2765fe4eaacc892b32f0d1_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:4715242f98234d2018f8317d9a57f63ff23b4d63be96491d55af2a2ef4572261_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:678c8d38900d994c4aa2e23669b7901747028690a4c5e4ba9aced4cbfe22b248_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:b39a2930e310d432a840798f03f7e55b8da42ff16ccda31790f85558d2be2537_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:1d01e27a3cdea6c99a985b877e29629d1c1fb00203f4a90c45db6df7a602e2cc_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:88b38ad10068e0574d2e5934849b98429c69305633b42aa4d19822ede2a6e10d_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:b020334c46f2d7276ba0c3aa8be7951254b197b2da310f0c22d2e16681a6a265_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:f2c222424cd66659ebea6787b6934c2d01d9eeb4f7db03ebfa16ab7b65aeb5b2_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1a57b53f8642ccb95884687efc251ad52e8ee3e718b55d0f4d21f800dfd3f5fa_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:6234cfecf4dd75b8c4ff1c527ad4eb306d966cfa0170ecdb8ea4bc69c2cdc495_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:779e75a94141db7f8223b9861ba2fa3ba8baf6fa470bb0ab109945d75e20121b_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:e593bebc4e753ac3c4cdd1be05711452dbda6e3b015b37926fa804851bdad6a8_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2437111"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the crypto/tls component. This vulnerability occurs during Transport Layer Security (TLS) session resumption when certificate authority (CA) settings are modified between the initial and resumed handshakes. An attacker could exploit this to bypass certificate validation, allowing a client or server to establish a connection that should have been rejected. This could lead to an authentication bypass under specific conditions.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/tls: crypto/tls: Incorrect certificate validation during TLS session resumption",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This is a moderate flaw because it only occurs under specific conditions, such as TLS session resumption with runtime changes to certificate authority settings. Exploitation is not straightforward and requires a controlled setup. The impact is limited to certificate validation within the same component and does not affect system availability.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:153f9e059139e6dbaeb2e5166d21bfeec59a59aa5cd8045e11dbfa091479b4bb_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:b2173caa314ae26d2a300f61cfa94031c34fe7676fd007418849212082db3636_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:cd9ada6b38c080eec45e1d053ec305dde2d574899019ffb01a28dbe1dd582912_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:f17eb032f7250aa4a3bb99e2754fa4cb0dbfc9fbbb8c787f70ad30b71b27b5a2_ppc64le"
],
"known_not_affected": [
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5008dcb0428a0837b9abd827963e7008c8e16af8cfcbd432421286fca63fe714_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5856cba3fe26ab7f756ba93e06caa6e522336ff36ff4c515132a8d35c85a2f64_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:6ddf185f2714d45fab92c831bf32673da55c7a43dbcf1bd22090b203791e03b2_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:eb32b129ea6a10b4aada4313ff11b04c33b99877eea9a5e567245d361d69f140_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:165f6085028f3859f6ede9176d413274ee1a457b72cd9c437795146c20b0722c_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:7a39f26f51bcbb4ef395208db01e2b0ee8b1fe9b15b3701c9c35d8f636f790d9_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:a4d609ff22b610b625a74fffd22883d5debe93c2e0c6ae2bcbbfd8f5f6b2cf12_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:ec02f5f031fefd5a610b69a81be5350f96e54511e2d2c619e8b9fe8f193297b6_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:0070df2a8c7882ae021000c498ead96b19f1bd6819e46657d5898cb71e6ec506_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:4b578a8ef1579d7168b7f0a1b7cebe66213003f8225a86cfdd4c9f24a5e2d871_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:8d6371a5fe374e3bc5c19a930ea712d266fab13a722768204b128bc71e928c97_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:985b19d79b3e54fc8b99b9b0239b74dcf6d0102d3ff0cd5363ae4627069d2ee1_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:2a0a6ea6465a6d165f072ef782a1825cc16ecfb2f8c58d5ec58c1d40d02e5208_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:679b470190ff7a7fc04e283884be4f24d1b0c475d0730fb718f2f45c60551b61_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:9734d0dc0367884e128837b7d02038a3b4136c4865ed3dc90902801393e178b4_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:f5f35702e424cd4e9b768c59d44928844b2d09fbb98d368ae7b54b7ec0771d13_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:093834bac2e2f7f01968ef542b9bcbf5fbe530c9f0dd86521825797abb4a33a2_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:190edd3effb60c56c885fc964d3eb48076293e1e43d745c4615ed00ef7daa145_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:382be8775c61942123adac2acec9f48085ebf7fd2b286c20e36a33ea6462baa7_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:5e83175abaef1e3046bac94621a86e036317833c740cdd6d235f1133a1388dd3_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:7173a298b07cbde3cd9ff12ca25f26ccf79b9ff8cfcb35a001c9f8c0b0291436_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:16cf5e33f297c027686d3ba9c6cbb01dba7a39299e2765fe4eaacc892b32f0d1_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:4715242f98234d2018f8317d9a57f63ff23b4d63be96491d55af2a2ef4572261_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:678c8d38900d994c4aa2e23669b7901747028690a4c5e4ba9aced4cbfe22b248_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:b39a2930e310d432a840798f03f7e55b8da42ff16ccda31790f85558d2be2537_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:1d01e27a3cdea6c99a985b877e29629d1c1fb00203f4a90c45db6df7a602e2cc_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:88b38ad10068e0574d2e5934849b98429c69305633b42aa4d19822ede2a6e10d_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:b020334c46f2d7276ba0c3aa8be7951254b197b2da310f0c22d2e16681a6a265_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:f2c222424cd66659ebea6787b6934c2d01d9eeb4f7db03ebfa16ab7b65aeb5b2_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1a57b53f8642ccb95884687efc251ad52e8ee3e718b55d0f4d21f800dfd3f5fa_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:6234cfecf4dd75b8c4ff1c527ad4eb306d966cfa0170ecdb8ea4bc69c2cdc495_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:779e75a94141db7f8223b9861ba2fa3ba8baf6fa470bb0ab109945d75e20121b_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:e593bebc4e753ac3c4cdd1be05711452dbda6e3b015b37926fa804851bdad6a8_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "RHBZ#2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"category": "external",
"summary": "https://go.dev/cl/737700",
"url": "https://go.dev/cl/737700"
},
{
"category": "external",
"summary": "https://go.dev/issue/77217",
"url": "https://go.dev/issue/77217"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk",
"url": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4337",
"url": "https://pkg.go.dev/vuln/GO-2026-4337"
}
],
"release_date": "2026-02-05T17:48:44.141000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-23T14:13:54+00:00",
"details": "It is recommended that existing users of Red Hat OpenShift Builds 1.7.1 upgrades to to 1.7.2",
"product_ids": [
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:153f9e059139e6dbaeb2e5166d21bfeec59a59aa5cd8045e11dbfa091479b4bb_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:b2173caa314ae26d2a300f61cfa94031c34fe7676fd007418849212082db3636_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:cd9ada6b38c080eec45e1d053ec305dde2d574899019ffb01a28dbe1dd582912_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:f17eb032f7250aa4a3bb99e2754fa4cb0dbfc9fbbb8c787f70ad30b71b27b5a2_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:10158"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5008dcb0428a0837b9abd827963e7008c8e16af8cfcbd432421286fca63fe714_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5856cba3fe26ab7f756ba93e06caa6e522336ff36ff4c515132a8d35c85a2f64_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:6ddf185f2714d45fab92c831bf32673da55c7a43dbcf1bd22090b203791e03b2_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:eb32b129ea6a10b4aada4313ff11b04c33b99877eea9a5e567245d361d69f140_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:165f6085028f3859f6ede9176d413274ee1a457b72cd9c437795146c20b0722c_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:7a39f26f51bcbb4ef395208db01e2b0ee8b1fe9b15b3701c9c35d8f636f790d9_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:a4d609ff22b610b625a74fffd22883d5debe93c2e0c6ae2bcbbfd8f5f6b2cf12_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:ec02f5f031fefd5a610b69a81be5350f96e54511e2d2c619e8b9fe8f193297b6_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:0070df2a8c7882ae021000c498ead96b19f1bd6819e46657d5898cb71e6ec506_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:4b578a8ef1579d7168b7f0a1b7cebe66213003f8225a86cfdd4c9f24a5e2d871_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:8d6371a5fe374e3bc5c19a930ea712d266fab13a722768204b128bc71e928c97_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:985b19d79b3e54fc8b99b9b0239b74dcf6d0102d3ff0cd5363ae4627069d2ee1_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:2a0a6ea6465a6d165f072ef782a1825cc16ecfb2f8c58d5ec58c1d40d02e5208_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:679b470190ff7a7fc04e283884be4f24d1b0c475d0730fb718f2f45c60551b61_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:9734d0dc0367884e128837b7d02038a3b4136c4865ed3dc90902801393e178b4_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:f5f35702e424cd4e9b768c59d44928844b2d09fbb98d368ae7b54b7ec0771d13_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:093834bac2e2f7f01968ef542b9bcbf5fbe530c9f0dd86521825797abb4a33a2_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:190edd3effb60c56c885fc964d3eb48076293e1e43d745c4615ed00ef7daa145_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:382be8775c61942123adac2acec9f48085ebf7fd2b286c20e36a33ea6462baa7_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:5e83175abaef1e3046bac94621a86e036317833c740cdd6d235f1133a1388dd3_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:7173a298b07cbde3cd9ff12ca25f26ccf79b9ff8cfcb35a001c9f8c0b0291436_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:16cf5e33f297c027686d3ba9c6cbb01dba7a39299e2765fe4eaacc892b32f0d1_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:4715242f98234d2018f8317d9a57f63ff23b4d63be96491d55af2a2ef4572261_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:678c8d38900d994c4aa2e23669b7901747028690a4c5e4ba9aced4cbfe22b248_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:b39a2930e310d432a840798f03f7e55b8da42ff16ccda31790f85558d2be2537_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:1d01e27a3cdea6c99a985b877e29629d1c1fb00203f4a90c45db6df7a602e2cc_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:88b38ad10068e0574d2e5934849b98429c69305633b42aa4d19822ede2a6e10d_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:b020334c46f2d7276ba0c3aa8be7951254b197b2da310f0c22d2e16681a6a265_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:f2c222424cd66659ebea6787b6934c2d01d9eeb4f7db03ebfa16ab7b65aeb5b2_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:153f9e059139e6dbaeb2e5166d21bfeec59a59aa5cd8045e11dbfa091479b4bb_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:b2173caa314ae26d2a300f61cfa94031c34fe7676fd007418849212082db3636_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:cd9ada6b38c080eec45e1d053ec305dde2d574899019ffb01a28dbe1dd582912_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:f17eb032f7250aa4a3bb99e2754fa4cb0dbfc9fbbb8c787f70ad30b71b27b5a2_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1a57b53f8642ccb95884687efc251ad52e8ee3e718b55d0f4d21f800dfd3f5fa_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:6234cfecf4dd75b8c4ff1c527ad4eb306d966cfa0170ecdb8ea4bc69c2cdc495_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:779e75a94141db7f8223b9861ba2fa3ba8baf6fa470bb0ab109945d75e20121b_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:e593bebc4e753ac3c4cdd1be05711452dbda6e3b015b37926fa804851bdad6a8_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "crypto/tls: crypto/tls: Incorrect certificate validation during TLS session resumption"
},
{
"cve": "CVE-2026-25679",
"cwe": {
"id": "CWE-1286",
"name": "Improper Validation of Syntactic Correctness of Input"
},
"discovery_date": "2026-03-06T22:02:11.567841+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5008dcb0428a0837b9abd827963e7008c8e16af8cfcbd432421286fca63fe714_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5856cba3fe26ab7f756ba93e06caa6e522336ff36ff4c515132a8d35c85a2f64_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:6ddf185f2714d45fab92c831bf32673da55c7a43dbcf1bd22090b203791e03b2_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:eb32b129ea6a10b4aada4313ff11b04c33b99877eea9a5e567245d361d69f140_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:165f6085028f3859f6ede9176d413274ee1a457b72cd9c437795146c20b0722c_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:7a39f26f51bcbb4ef395208db01e2b0ee8b1fe9b15b3701c9c35d8f636f790d9_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:a4d609ff22b610b625a74fffd22883d5debe93c2e0c6ae2bcbbfd8f5f6b2cf12_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:ec02f5f031fefd5a610b69a81be5350f96e54511e2d2c619e8b9fe8f193297b6_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:0070df2a8c7882ae021000c498ead96b19f1bd6819e46657d5898cb71e6ec506_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:4b578a8ef1579d7168b7f0a1b7cebe66213003f8225a86cfdd4c9f24a5e2d871_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:8d6371a5fe374e3bc5c19a930ea712d266fab13a722768204b128bc71e928c97_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:985b19d79b3e54fc8b99b9b0239b74dcf6d0102d3ff0cd5363ae4627069d2ee1_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:2a0a6ea6465a6d165f072ef782a1825cc16ecfb2f8c58d5ec58c1d40d02e5208_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:679b470190ff7a7fc04e283884be4f24d1b0c475d0730fb718f2f45c60551b61_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:9734d0dc0367884e128837b7d02038a3b4136c4865ed3dc90902801393e178b4_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:f5f35702e424cd4e9b768c59d44928844b2d09fbb98d368ae7b54b7ec0771d13_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:093834bac2e2f7f01968ef542b9bcbf5fbe530c9f0dd86521825797abb4a33a2_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:190edd3effb60c56c885fc964d3eb48076293e1e43d745c4615ed00ef7daa145_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:382be8775c61942123adac2acec9f48085ebf7fd2b286c20e36a33ea6462baa7_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:5e83175abaef1e3046bac94621a86e036317833c740cdd6d235f1133a1388dd3_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:7173a298b07cbde3cd9ff12ca25f26ccf79b9ff8cfcb35a001c9f8c0b0291436_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:16cf5e33f297c027686d3ba9c6cbb01dba7a39299e2765fe4eaacc892b32f0d1_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:4715242f98234d2018f8317d9a57f63ff23b4d63be96491d55af2a2ef4572261_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:678c8d38900d994c4aa2e23669b7901747028690a4c5e4ba9aced4cbfe22b248_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:b39a2930e310d432a840798f03f7e55b8da42ff16ccda31790f85558d2be2537_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:1d01e27a3cdea6c99a985b877e29629d1c1fb00203f4a90c45db6df7a602e2cc_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:88b38ad10068e0574d2e5934849b98429c69305633b42aa4d19822ede2a6e10d_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:b020334c46f2d7276ba0c3aa8be7951254b197b2da310f0c22d2e16681a6a265_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:f2c222424cd66659ebea6787b6934c2d01d9eeb4f7db03ebfa16ab7b65aeb5b2_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1a57b53f8642ccb95884687efc251ad52e8ee3e718b55d0f4d21f800dfd3f5fa_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:6234cfecf4dd75b8c4ff1c527ad4eb306d966cfa0170ecdb8ea4bc69c2cdc495_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:779e75a94141db7f8223b9861ba2fa3ba8baf6fa470bb0ab109945d75e20121b_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:e593bebc4e753ac3c4cdd1be05711452dbda6e3b015b37926fa804851bdad6a8_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2445356"
}
],
"notes": [
{
"category": "description",
"text": "The Go standard library function net/url.Parse insufficiently validated the host/authority component and accepted some invalid URLs by effectively treating garbage before an IP-literal as ignorable. The function should have rejected this as invalid.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "net/url: Incorrect parsing of IPv6 host literals in net/url",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:153f9e059139e6dbaeb2e5166d21bfeec59a59aa5cd8045e11dbfa091479b4bb_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:b2173caa314ae26d2a300f61cfa94031c34fe7676fd007418849212082db3636_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:cd9ada6b38c080eec45e1d053ec305dde2d574899019ffb01a28dbe1dd582912_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:f17eb032f7250aa4a3bb99e2754fa4cb0dbfc9fbbb8c787f70ad30b71b27b5a2_ppc64le"
],
"known_not_affected": [
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5008dcb0428a0837b9abd827963e7008c8e16af8cfcbd432421286fca63fe714_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5856cba3fe26ab7f756ba93e06caa6e522336ff36ff4c515132a8d35c85a2f64_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:6ddf185f2714d45fab92c831bf32673da55c7a43dbcf1bd22090b203791e03b2_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:eb32b129ea6a10b4aada4313ff11b04c33b99877eea9a5e567245d361d69f140_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:165f6085028f3859f6ede9176d413274ee1a457b72cd9c437795146c20b0722c_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:7a39f26f51bcbb4ef395208db01e2b0ee8b1fe9b15b3701c9c35d8f636f790d9_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:a4d609ff22b610b625a74fffd22883d5debe93c2e0c6ae2bcbbfd8f5f6b2cf12_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:ec02f5f031fefd5a610b69a81be5350f96e54511e2d2c619e8b9fe8f193297b6_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:0070df2a8c7882ae021000c498ead96b19f1bd6819e46657d5898cb71e6ec506_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:4b578a8ef1579d7168b7f0a1b7cebe66213003f8225a86cfdd4c9f24a5e2d871_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:8d6371a5fe374e3bc5c19a930ea712d266fab13a722768204b128bc71e928c97_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:985b19d79b3e54fc8b99b9b0239b74dcf6d0102d3ff0cd5363ae4627069d2ee1_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:2a0a6ea6465a6d165f072ef782a1825cc16ecfb2f8c58d5ec58c1d40d02e5208_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:679b470190ff7a7fc04e283884be4f24d1b0c475d0730fb718f2f45c60551b61_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:9734d0dc0367884e128837b7d02038a3b4136c4865ed3dc90902801393e178b4_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:f5f35702e424cd4e9b768c59d44928844b2d09fbb98d368ae7b54b7ec0771d13_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:093834bac2e2f7f01968ef542b9bcbf5fbe530c9f0dd86521825797abb4a33a2_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:190edd3effb60c56c885fc964d3eb48076293e1e43d745c4615ed00ef7daa145_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:382be8775c61942123adac2acec9f48085ebf7fd2b286c20e36a33ea6462baa7_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:5e83175abaef1e3046bac94621a86e036317833c740cdd6d235f1133a1388dd3_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:7173a298b07cbde3cd9ff12ca25f26ccf79b9ff8cfcb35a001c9f8c0b0291436_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:16cf5e33f297c027686d3ba9c6cbb01dba7a39299e2765fe4eaacc892b32f0d1_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:4715242f98234d2018f8317d9a57f63ff23b4d63be96491d55af2a2ef4572261_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:678c8d38900d994c4aa2e23669b7901747028690a4c5e4ba9aced4cbfe22b248_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:b39a2930e310d432a840798f03f7e55b8da42ff16ccda31790f85558d2be2537_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:1d01e27a3cdea6c99a985b877e29629d1c1fb00203f4a90c45db6df7a602e2cc_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:88b38ad10068e0574d2e5934849b98429c69305633b42aa4d19822ede2a6e10d_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:b020334c46f2d7276ba0c3aa8be7951254b197b2da310f0c22d2e16681a6a265_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:f2c222424cd66659ebea6787b6934c2d01d9eeb4f7db03ebfa16ab7b65aeb5b2_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1a57b53f8642ccb95884687efc251ad52e8ee3e718b55d0f4d21f800dfd3f5fa_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:6234cfecf4dd75b8c4ff1c527ad4eb306d966cfa0170ecdb8ea4bc69c2cdc495_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:779e75a94141db7f8223b9861ba2fa3ba8baf6fa470bb0ab109945d75e20121b_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:e593bebc4e753ac3c4cdd1be05711452dbda6e3b015b37926fa804851bdad6a8_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-25679"
},
{
"category": "external",
"summary": "RHBZ#2445356",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2445356"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-25679",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25679"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-25679",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25679"
},
{
"category": "external",
"summary": "https://go.dev/cl/752180",
"url": "https://go.dev/cl/752180"
},
{
"category": "external",
"summary": "https://go.dev/issue/77578",
"url": "https://go.dev/issue/77578"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk",
"url": "https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4601",
"url": "https://pkg.go.dev/vuln/GO-2026-4601"
}
],
"release_date": "2026-03-06T21:28:14.211000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-23T14:13:54+00:00",
"details": "It is recommended that existing users of Red Hat OpenShift Builds 1.7.1 upgrades to to 1.7.2",
"product_ids": [
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:153f9e059139e6dbaeb2e5166d21bfeec59a59aa5cd8045e11dbfa091479b4bb_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:b2173caa314ae26d2a300f61cfa94031c34fe7676fd007418849212082db3636_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:cd9ada6b38c080eec45e1d053ec305dde2d574899019ffb01a28dbe1dd582912_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:f17eb032f7250aa4a3bb99e2754fa4cb0dbfc9fbbb8c787f70ad30b71b27b5a2_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:10158"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5008dcb0428a0837b9abd827963e7008c8e16af8cfcbd432421286fca63fe714_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5856cba3fe26ab7f756ba93e06caa6e522336ff36ff4c515132a8d35c85a2f64_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:6ddf185f2714d45fab92c831bf32673da55c7a43dbcf1bd22090b203791e03b2_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:eb32b129ea6a10b4aada4313ff11b04c33b99877eea9a5e567245d361d69f140_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:165f6085028f3859f6ede9176d413274ee1a457b72cd9c437795146c20b0722c_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:7a39f26f51bcbb4ef395208db01e2b0ee8b1fe9b15b3701c9c35d8f636f790d9_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:a4d609ff22b610b625a74fffd22883d5debe93c2e0c6ae2bcbbfd8f5f6b2cf12_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:ec02f5f031fefd5a610b69a81be5350f96e54511e2d2c619e8b9fe8f193297b6_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:0070df2a8c7882ae021000c498ead96b19f1bd6819e46657d5898cb71e6ec506_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:4b578a8ef1579d7168b7f0a1b7cebe66213003f8225a86cfdd4c9f24a5e2d871_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:8d6371a5fe374e3bc5c19a930ea712d266fab13a722768204b128bc71e928c97_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:985b19d79b3e54fc8b99b9b0239b74dcf6d0102d3ff0cd5363ae4627069d2ee1_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:2a0a6ea6465a6d165f072ef782a1825cc16ecfb2f8c58d5ec58c1d40d02e5208_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:679b470190ff7a7fc04e283884be4f24d1b0c475d0730fb718f2f45c60551b61_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:9734d0dc0367884e128837b7d02038a3b4136c4865ed3dc90902801393e178b4_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:f5f35702e424cd4e9b768c59d44928844b2d09fbb98d368ae7b54b7ec0771d13_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:093834bac2e2f7f01968ef542b9bcbf5fbe530c9f0dd86521825797abb4a33a2_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:190edd3effb60c56c885fc964d3eb48076293e1e43d745c4615ed00ef7daa145_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:382be8775c61942123adac2acec9f48085ebf7fd2b286c20e36a33ea6462baa7_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:5e83175abaef1e3046bac94621a86e036317833c740cdd6d235f1133a1388dd3_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:7173a298b07cbde3cd9ff12ca25f26ccf79b9ff8cfcb35a001c9f8c0b0291436_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:16cf5e33f297c027686d3ba9c6cbb01dba7a39299e2765fe4eaacc892b32f0d1_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:4715242f98234d2018f8317d9a57f63ff23b4d63be96491d55af2a2ef4572261_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:678c8d38900d994c4aa2e23669b7901747028690a4c5e4ba9aced4cbfe22b248_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:b39a2930e310d432a840798f03f7e55b8da42ff16ccda31790f85558d2be2537_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:1d01e27a3cdea6c99a985b877e29629d1c1fb00203f4a90c45db6df7a602e2cc_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:88b38ad10068e0574d2e5934849b98429c69305633b42aa4d19822ede2a6e10d_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:b020334c46f2d7276ba0c3aa8be7951254b197b2da310f0c22d2e16681a6a265_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:f2c222424cd66659ebea6787b6934c2d01d9eeb4f7db03ebfa16ab7b65aeb5b2_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:153f9e059139e6dbaeb2e5166d21bfeec59a59aa5cd8045e11dbfa091479b4bb_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:b2173caa314ae26d2a300f61cfa94031c34fe7676fd007418849212082db3636_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:cd9ada6b38c080eec45e1d053ec305dde2d574899019ffb01a28dbe1dd582912_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:f17eb032f7250aa4a3bb99e2754fa4cb0dbfc9fbbb8c787f70ad30b71b27b5a2_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1a57b53f8642ccb95884687efc251ad52e8ee3e718b55d0f4d21f800dfd3f5fa_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:6234cfecf4dd75b8c4ff1c527ad4eb306d966cfa0170ecdb8ea4bc69c2cdc495_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:779e75a94141db7f8223b9861ba2fa3ba8baf6fa470bb0ab109945d75e20121b_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:e593bebc4e753ac3c4cdd1be05711452dbda6e3b015b37926fa804851bdad6a8_s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5008dcb0428a0837b9abd827963e7008c8e16af8cfcbd432421286fca63fe714_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5856cba3fe26ab7f756ba93e06caa6e522336ff36ff4c515132a8d35c85a2f64_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:6ddf185f2714d45fab92c831bf32673da55c7a43dbcf1bd22090b203791e03b2_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:eb32b129ea6a10b4aada4313ff11b04c33b99877eea9a5e567245d361d69f140_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:165f6085028f3859f6ede9176d413274ee1a457b72cd9c437795146c20b0722c_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:7a39f26f51bcbb4ef395208db01e2b0ee8b1fe9b15b3701c9c35d8f636f790d9_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:a4d609ff22b610b625a74fffd22883d5debe93c2e0c6ae2bcbbfd8f5f6b2cf12_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:ec02f5f031fefd5a610b69a81be5350f96e54511e2d2c619e8b9fe8f193297b6_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:0070df2a8c7882ae021000c498ead96b19f1bd6819e46657d5898cb71e6ec506_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:4b578a8ef1579d7168b7f0a1b7cebe66213003f8225a86cfdd4c9f24a5e2d871_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:8d6371a5fe374e3bc5c19a930ea712d266fab13a722768204b128bc71e928c97_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:985b19d79b3e54fc8b99b9b0239b74dcf6d0102d3ff0cd5363ae4627069d2ee1_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:2a0a6ea6465a6d165f072ef782a1825cc16ecfb2f8c58d5ec58c1d40d02e5208_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:679b470190ff7a7fc04e283884be4f24d1b0c475d0730fb718f2f45c60551b61_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:9734d0dc0367884e128837b7d02038a3b4136c4865ed3dc90902801393e178b4_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:f5f35702e424cd4e9b768c59d44928844b2d09fbb98d368ae7b54b7ec0771d13_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:093834bac2e2f7f01968ef542b9bcbf5fbe530c9f0dd86521825797abb4a33a2_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:190edd3effb60c56c885fc964d3eb48076293e1e43d745c4615ed00ef7daa145_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:382be8775c61942123adac2acec9f48085ebf7fd2b286c20e36a33ea6462baa7_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:5e83175abaef1e3046bac94621a86e036317833c740cdd6d235f1133a1388dd3_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:7173a298b07cbde3cd9ff12ca25f26ccf79b9ff8cfcb35a001c9f8c0b0291436_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:16cf5e33f297c027686d3ba9c6cbb01dba7a39299e2765fe4eaacc892b32f0d1_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:4715242f98234d2018f8317d9a57f63ff23b4d63be96491d55af2a2ef4572261_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:678c8d38900d994c4aa2e23669b7901747028690a4c5e4ba9aced4cbfe22b248_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:b39a2930e310d432a840798f03f7e55b8da42ff16ccda31790f85558d2be2537_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:1d01e27a3cdea6c99a985b877e29629d1c1fb00203f4a90c45db6df7a602e2cc_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:88b38ad10068e0574d2e5934849b98429c69305633b42aa4d19822ede2a6e10d_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:b020334c46f2d7276ba0c3aa8be7951254b197b2da310f0c22d2e16681a6a265_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:f2c222424cd66659ebea6787b6934c2d01d9eeb4f7db03ebfa16ab7b65aeb5b2_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:153f9e059139e6dbaeb2e5166d21bfeec59a59aa5cd8045e11dbfa091479b4bb_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:b2173caa314ae26d2a300f61cfa94031c34fe7676fd007418849212082db3636_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:cd9ada6b38c080eec45e1d053ec305dde2d574899019ffb01a28dbe1dd582912_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:f17eb032f7250aa4a3bb99e2754fa4cb0dbfc9fbbb8c787f70ad30b71b27b5a2_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1a57b53f8642ccb95884687efc251ad52e8ee3e718b55d0f4d21f800dfd3f5fa_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:6234cfecf4dd75b8c4ff1c527ad4eb306d966cfa0170ecdb8ea4bc69c2cdc495_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:779e75a94141db7f8223b9861ba2fa3ba8baf6fa470bb0ab109945d75e20121b_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:e593bebc4e753ac3c4cdd1be05711452dbda6e3b015b37926fa804851bdad6a8_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "net/url: Incorrect parsing of IPv6 host literals in net/url"
},
{
"cve": "CVE-2026-27137",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"discovery_date": "2026-03-06T22:01:38.859733+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5008dcb0428a0837b9abd827963e7008c8e16af8cfcbd432421286fca63fe714_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5856cba3fe26ab7f756ba93e06caa6e522336ff36ff4c515132a8d35c85a2f64_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:6ddf185f2714d45fab92c831bf32673da55c7a43dbcf1bd22090b203791e03b2_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:eb32b129ea6a10b4aada4313ff11b04c33b99877eea9a5e567245d361d69f140_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:165f6085028f3859f6ede9176d413274ee1a457b72cd9c437795146c20b0722c_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:7a39f26f51bcbb4ef395208db01e2b0ee8b1fe9b15b3701c9c35d8f636f790d9_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:a4d609ff22b610b625a74fffd22883d5debe93c2e0c6ae2bcbbfd8f5f6b2cf12_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:ec02f5f031fefd5a610b69a81be5350f96e54511e2d2c619e8b9fe8f193297b6_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:0070df2a8c7882ae021000c498ead96b19f1bd6819e46657d5898cb71e6ec506_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:4b578a8ef1579d7168b7f0a1b7cebe66213003f8225a86cfdd4c9f24a5e2d871_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:8d6371a5fe374e3bc5c19a930ea712d266fab13a722768204b128bc71e928c97_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:985b19d79b3e54fc8b99b9b0239b74dcf6d0102d3ff0cd5363ae4627069d2ee1_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:2a0a6ea6465a6d165f072ef782a1825cc16ecfb2f8c58d5ec58c1d40d02e5208_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:679b470190ff7a7fc04e283884be4f24d1b0c475d0730fb718f2f45c60551b61_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:9734d0dc0367884e128837b7d02038a3b4136c4865ed3dc90902801393e178b4_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:f5f35702e424cd4e9b768c59d44928844b2d09fbb98d368ae7b54b7ec0771d13_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:093834bac2e2f7f01968ef542b9bcbf5fbe530c9f0dd86521825797abb4a33a2_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:190edd3effb60c56c885fc964d3eb48076293e1e43d745c4615ed00ef7daa145_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:382be8775c61942123adac2acec9f48085ebf7fd2b286c20e36a33ea6462baa7_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:5e83175abaef1e3046bac94621a86e036317833c740cdd6d235f1133a1388dd3_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:7173a298b07cbde3cd9ff12ca25f26ccf79b9ff8cfcb35a001c9f8c0b0291436_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:16cf5e33f297c027686d3ba9c6cbb01dba7a39299e2765fe4eaacc892b32f0d1_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:4715242f98234d2018f8317d9a57f63ff23b4d63be96491d55af2a2ef4572261_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:678c8d38900d994c4aa2e23669b7901747028690a4c5e4ba9aced4cbfe22b248_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:b39a2930e310d432a840798f03f7e55b8da42ff16ccda31790f85558d2be2537_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:1d01e27a3cdea6c99a985b877e29629d1c1fb00203f4a90c45db6df7a602e2cc_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:88b38ad10068e0574d2e5934849b98429c69305633b42aa4d19822ede2a6e10d_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:b020334c46f2d7276ba0c3aa8be7951254b197b2da310f0c22d2e16681a6a265_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:f2c222424cd66659ebea6787b6934c2d01d9eeb4f7db03ebfa16ab7b65aeb5b2_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1a57b53f8642ccb95884687efc251ad52e8ee3e718b55d0f4d21f800dfd3f5fa_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:6234cfecf4dd75b8c4ff1c527ad4eb306d966cfa0170ecdb8ea4bc69c2cdc495_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:779e75a94141db7f8223b9861ba2fa3ba8baf6fa470bb0ab109945d75e20121b_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:e593bebc4e753ac3c4cdd1be05711452dbda6e3b015b37926fa804851bdad6a8_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2445345"
}
],
"notes": [
{
"category": "description",
"text": "A certificate validation flaw has been discovered in the golang crypto/x509 module. When verifying a certificate chain which contains a certificate containing multiple email address constraints which share common local portions but different domain portions, these constraints will not be properly applied, and only the last constraint will be considered.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: Incorrect enforcement of email constraints in crypto/x509",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:153f9e059139e6dbaeb2e5166d21bfeec59a59aa5cd8045e11dbfa091479b4bb_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:b2173caa314ae26d2a300f61cfa94031c34fe7676fd007418849212082db3636_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:cd9ada6b38c080eec45e1d053ec305dde2d574899019ffb01a28dbe1dd582912_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:f17eb032f7250aa4a3bb99e2754fa4cb0dbfc9fbbb8c787f70ad30b71b27b5a2_ppc64le"
],
"known_not_affected": [
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5008dcb0428a0837b9abd827963e7008c8e16af8cfcbd432421286fca63fe714_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5856cba3fe26ab7f756ba93e06caa6e522336ff36ff4c515132a8d35c85a2f64_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:6ddf185f2714d45fab92c831bf32673da55c7a43dbcf1bd22090b203791e03b2_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:eb32b129ea6a10b4aada4313ff11b04c33b99877eea9a5e567245d361d69f140_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:165f6085028f3859f6ede9176d413274ee1a457b72cd9c437795146c20b0722c_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:7a39f26f51bcbb4ef395208db01e2b0ee8b1fe9b15b3701c9c35d8f636f790d9_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:a4d609ff22b610b625a74fffd22883d5debe93c2e0c6ae2bcbbfd8f5f6b2cf12_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:ec02f5f031fefd5a610b69a81be5350f96e54511e2d2c619e8b9fe8f193297b6_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:0070df2a8c7882ae021000c498ead96b19f1bd6819e46657d5898cb71e6ec506_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:4b578a8ef1579d7168b7f0a1b7cebe66213003f8225a86cfdd4c9f24a5e2d871_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:8d6371a5fe374e3bc5c19a930ea712d266fab13a722768204b128bc71e928c97_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:985b19d79b3e54fc8b99b9b0239b74dcf6d0102d3ff0cd5363ae4627069d2ee1_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:2a0a6ea6465a6d165f072ef782a1825cc16ecfb2f8c58d5ec58c1d40d02e5208_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:679b470190ff7a7fc04e283884be4f24d1b0c475d0730fb718f2f45c60551b61_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:9734d0dc0367884e128837b7d02038a3b4136c4865ed3dc90902801393e178b4_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:f5f35702e424cd4e9b768c59d44928844b2d09fbb98d368ae7b54b7ec0771d13_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:093834bac2e2f7f01968ef542b9bcbf5fbe530c9f0dd86521825797abb4a33a2_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:190edd3effb60c56c885fc964d3eb48076293e1e43d745c4615ed00ef7daa145_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:382be8775c61942123adac2acec9f48085ebf7fd2b286c20e36a33ea6462baa7_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:5e83175abaef1e3046bac94621a86e036317833c740cdd6d235f1133a1388dd3_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:7173a298b07cbde3cd9ff12ca25f26ccf79b9ff8cfcb35a001c9f8c0b0291436_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:16cf5e33f297c027686d3ba9c6cbb01dba7a39299e2765fe4eaacc892b32f0d1_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:4715242f98234d2018f8317d9a57f63ff23b4d63be96491d55af2a2ef4572261_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:678c8d38900d994c4aa2e23669b7901747028690a4c5e4ba9aced4cbfe22b248_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:b39a2930e310d432a840798f03f7e55b8da42ff16ccda31790f85558d2be2537_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:1d01e27a3cdea6c99a985b877e29629d1c1fb00203f4a90c45db6df7a602e2cc_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:88b38ad10068e0574d2e5934849b98429c69305633b42aa4d19822ede2a6e10d_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:b020334c46f2d7276ba0c3aa8be7951254b197b2da310f0c22d2e16681a6a265_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:f2c222424cd66659ebea6787b6934c2d01d9eeb4f7db03ebfa16ab7b65aeb5b2_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1a57b53f8642ccb95884687efc251ad52e8ee3e718b55d0f4d21f800dfd3f5fa_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:6234cfecf4dd75b8c4ff1c527ad4eb306d966cfa0170ecdb8ea4bc69c2cdc495_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:779e75a94141db7f8223b9861ba2fa3ba8baf6fa470bb0ab109945d75e20121b_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:e593bebc4e753ac3c4cdd1be05711452dbda6e3b015b37926fa804851bdad6a8_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-27137"
},
{
"category": "external",
"summary": "RHBZ#2445345",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2445345"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-27137",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27137"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-27137",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27137"
},
{
"category": "external",
"summary": "https://go.dev/cl/752182",
"url": "https://go.dev/cl/752182"
},
{
"category": "external",
"summary": "https://go.dev/issue/77952",
"url": "https://go.dev/issue/77952"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk",
"url": "https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4599",
"url": "https://pkg.go.dev/vuln/GO-2026-4599"
}
],
"release_date": "2026-03-06T21:28:13.748000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-23T14:13:54+00:00",
"details": "It is recommended that existing users of Red Hat OpenShift Builds 1.7.1 upgrades to to 1.7.2",
"product_ids": [
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:153f9e059139e6dbaeb2e5166d21bfeec59a59aa5cd8045e11dbfa091479b4bb_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:b2173caa314ae26d2a300f61cfa94031c34fe7676fd007418849212082db3636_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:cd9ada6b38c080eec45e1d053ec305dde2d574899019ffb01a28dbe1dd582912_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:f17eb032f7250aa4a3bb99e2754fa4cb0dbfc9fbbb8c787f70ad30b71b27b5a2_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:10158"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5008dcb0428a0837b9abd827963e7008c8e16af8cfcbd432421286fca63fe714_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5856cba3fe26ab7f756ba93e06caa6e522336ff36ff4c515132a8d35c85a2f64_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:6ddf185f2714d45fab92c831bf32673da55c7a43dbcf1bd22090b203791e03b2_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:eb32b129ea6a10b4aada4313ff11b04c33b99877eea9a5e567245d361d69f140_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:165f6085028f3859f6ede9176d413274ee1a457b72cd9c437795146c20b0722c_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:7a39f26f51bcbb4ef395208db01e2b0ee8b1fe9b15b3701c9c35d8f636f790d9_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:a4d609ff22b610b625a74fffd22883d5debe93c2e0c6ae2bcbbfd8f5f6b2cf12_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:ec02f5f031fefd5a610b69a81be5350f96e54511e2d2c619e8b9fe8f193297b6_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:0070df2a8c7882ae021000c498ead96b19f1bd6819e46657d5898cb71e6ec506_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:4b578a8ef1579d7168b7f0a1b7cebe66213003f8225a86cfdd4c9f24a5e2d871_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:8d6371a5fe374e3bc5c19a930ea712d266fab13a722768204b128bc71e928c97_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:985b19d79b3e54fc8b99b9b0239b74dcf6d0102d3ff0cd5363ae4627069d2ee1_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:2a0a6ea6465a6d165f072ef782a1825cc16ecfb2f8c58d5ec58c1d40d02e5208_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:679b470190ff7a7fc04e283884be4f24d1b0c475d0730fb718f2f45c60551b61_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:9734d0dc0367884e128837b7d02038a3b4136c4865ed3dc90902801393e178b4_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:f5f35702e424cd4e9b768c59d44928844b2d09fbb98d368ae7b54b7ec0771d13_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:093834bac2e2f7f01968ef542b9bcbf5fbe530c9f0dd86521825797abb4a33a2_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:190edd3effb60c56c885fc964d3eb48076293e1e43d745c4615ed00ef7daa145_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:382be8775c61942123adac2acec9f48085ebf7fd2b286c20e36a33ea6462baa7_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:5e83175abaef1e3046bac94621a86e036317833c740cdd6d235f1133a1388dd3_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:7173a298b07cbde3cd9ff12ca25f26ccf79b9ff8cfcb35a001c9f8c0b0291436_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:16cf5e33f297c027686d3ba9c6cbb01dba7a39299e2765fe4eaacc892b32f0d1_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:4715242f98234d2018f8317d9a57f63ff23b4d63be96491d55af2a2ef4572261_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:678c8d38900d994c4aa2e23669b7901747028690a4c5e4ba9aced4cbfe22b248_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:b39a2930e310d432a840798f03f7e55b8da42ff16ccda31790f85558d2be2537_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:1d01e27a3cdea6c99a985b877e29629d1c1fb00203f4a90c45db6df7a602e2cc_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:88b38ad10068e0574d2e5934849b98429c69305633b42aa4d19822ede2a6e10d_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:b020334c46f2d7276ba0c3aa8be7951254b197b2da310f0c22d2e16681a6a265_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:f2c222424cd66659ebea6787b6934c2d01d9eeb4f7db03ebfa16ab7b65aeb5b2_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:153f9e059139e6dbaeb2e5166d21bfeec59a59aa5cd8045e11dbfa091479b4bb_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:b2173caa314ae26d2a300f61cfa94031c34fe7676fd007418849212082db3636_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:cd9ada6b38c080eec45e1d053ec305dde2d574899019ffb01a28dbe1dd582912_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:f17eb032f7250aa4a3bb99e2754fa4cb0dbfc9fbbb8c787f70ad30b71b27b5a2_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1a57b53f8642ccb95884687efc251ad52e8ee3e718b55d0f4d21f800dfd3f5fa_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:6234cfecf4dd75b8c4ff1c527ad4eb306d966cfa0170ecdb8ea4bc69c2cdc495_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:779e75a94141db7f8223b9861ba2fa3ba8baf6fa470bb0ab109945d75e20121b_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:e593bebc4e753ac3c4cdd1be05711452dbda6e3b015b37926fa804851bdad6a8_s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5008dcb0428a0837b9abd827963e7008c8e16af8cfcbd432421286fca63fe714_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5856cba3fe26ab7f756ba93e06caa6e522336ff36ff4c515132a8d35c85a2f64_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:6ddf185f2714d45fab92c831bf32673da55c7a43dbcf1bd22090b203791e03b2_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:eb32b129ea6a10b4aada4313ff11b04c33b99877eea9a5e567245d361d69f140_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:165f6085028f3859f6ede9176d413274ee1a457b72cd9c437795146c20b0722c_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:7a39f26f51bcbb4ef395208db01e2b0ee8b1fe9b15b3701c9c35d8f636f790d9_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:a4d609ff22b610b625a74fffd22883d5debe93c2e0c6ae2bcbbfd8f5f6b2cf12_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:ec02f5f031fefd5a610b69a81be5350f96e54511e2d2c619e8b9fe8f193297b6_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:0070df2a8c7882ae021000c498ead96b19f1bd6819e46657d5898cb71e6ec506_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:4b578a8ef1579d7168b7f0a1b7cebe66213003f8225a86cfdd4c9f24a5e2d871_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:8d6371a5fe374e3bc5c19a930ea712d266fab13a722768204b128bc71e928c97_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:985b19d79b3e54fc8b99b9b0239b74dcf6d0102d3ff0cd5363ae4627069d2ee1_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:2a0a6ea6465a6d165f072ef782a1825cc16ecfb2f8c58d5ec58c1d40d02e5208_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:679b470190ff7a7fc04e283884be4f24d1b0c475d0730fb718f2f45c60551b61_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:9734d0dc0367884e128837b7d02038a3b4136c4865ed3dc90902801393e178b4_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:f5f35702e424cd4e9b768c59d44928844b2d09fbb98d368ae7b54b7ec0771d13_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:093834bac2e2f7f01968ef542b9bcbf5fbe530c9f0dd86521825797abb4a33a2_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:190edd3effb60c56c885fc964d3eb48076293e1e43d745c4615ed00ef7daa145_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:382be8775c61942123adac2acec9f48085ebf7fd2b286c20e36a33ea6462baa7_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:5e83175abaef1e3046bac94621a86e036317833c740cdd6d235f1133a1388dd3_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:7173a298b07cbde3cd9ff12ca25f26ccf79b9ff8cfcb35a001c9f8c0b0291436_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:16cf5e33f297c027686d3ba9c6cbb01dba7a39299e2765fe4eaacc892b32f0d1_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:4715242f98234d2018f8317d9a57f63ff23b4d63be96491d55af2a2ef4572261_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:678c8d38900d994c4aa2e23669b7901747028690a4c5e4ba9aced4cbfe22b248_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:b39a2930e310d432a840798f03f7e55b8da42ff16ccda31790f85558d2be2537_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:1d01e27a3cdea6c99a985b877e29629d1c1fb00203f4a90c45db6df7a602e2cc_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:88b38ad10068e0574d2e5934849b98429c69305633b42aa4d19822ede2a6e10d_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:b020334c46f2d7276ba0c3aa8be7951254b197b2da310f0c22d2e16681a6a265_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:f2c222424cd66659ebea6787b6934c2d01d9eeb4f7db03ebfa16ab7b65aeb5b2_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:153f9e059139e6dbaeb2e5166d21bfeec59a59aa5cd8045e11dbfa091479b4bb_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:b2173caa314ae26d2a300f61cfa94031c34fe7676fd007418849212082db3636_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:cd9ada6b38c080eec45e1d053ec305dde2d574899019ffb01a28dbe1dd582912_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:f17eb032f7250aa4a3bb99e2754fa4cb0dbfc9fbbb8c787f70ad30b71b27b5a2_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1a57b53f8642ccb95884687efc251ad52e8ee3e718b55d0f4d21f800dfd3f5fa_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:6234cfecf4dd75b8c4ff1c527ad4eb306d966cfa0170ecdb8ea4bc69c2cdc495_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:779e75a94141db7f8223b9861ba2fa3ba8baf6fa470bb0ab109945d75e20121b_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:e593bebc4e753ac3c4cdd1be05711452dbda6e3b015b37926fa804851bdad6a8_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: Incorrect enforcement of email constraints in crypto/x509"
},
{
"cve": "CVE-2026-33186",
"cwe": {
"id": "CWE-551",
"name": "Incorrect Behavior Order: Authorization Before Parsing and Canonicalization"
},
"discovery_date": "2026-03-20T23:02:27.802640+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5008dcb0428a0837b9abd827963e7008c8e16af8cfcbd432421286fca63fe714_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5856cba3fe26ab7f756ba93e06caa6e522336ff36ff4c515132a8d35c85a2f64_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:6ddf185f2714d45fab92c831bf32673da55c7a43dbcf1bd22090b203791e03b2_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:eb32b129ea6a10b4aada4313ff11b04c33b99877eea9a5e567245d361d69f140_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:165f6085028f3859f6ede9176d413274ee1a457b72cd9c437795146c20b0722c_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:7a39f26f51bcbb4ef395208db01e2b0ee8b1fe9b15b3701c9c35d8f636f790d9_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:a4d609ff22b610b625a74fffd22883d5debe93c2e0c6ae2bcbbfd8f5f6b2cf12_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:ec02f5f031fefd5a610b69a81be5350f96e54511e2d2c619e8b9fe8f193297b6_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:0070df2a8c7882ae021000c498ead96b19f1bd6819e46657d5898cb71e6ec506_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:4b578a8ef1579d7168b7f0a1b7cebe66213003f8225a86cfdd4c9f24a5e2d871_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:8d6371a5fe374e3bc5c19a930ea712d266fab13a722768204b128bc71e928c97_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:985b19d79b3e54fc8b99b9b0239b74dcf6d0102d3ff0cd5363ae4627069d2ee1_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:2a0a6ea6465a6d165f072ef782a1825cc16ecfb2f8c58d5ec58c1d40d02e5208_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:679b470190ff7a7fc04e283884be4f24d1b0c475d0730fb718f2f45c60551b61_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:9734d0dc0367884e128837b7d02038a3b4136c4865ed3dc90902801393e178b4_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:f5f35702e424cd4e9b768c59d44928844b2d09fbb98d368ae7b54b7ec0771d13_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:093834bac2e2f7f01968ef542b9bcbf5fbe530c9f0dd86521825797abb4a33a2_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:153f9e059139e6dbaeb2e5166d21bfeec59a59aa5cd8045e11dbfa091479b4bb_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:b2173caa314ae26d2a300f61cfa94031c34fe7676fd007418849212082db3636_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:cd9ada6b38c080eec45e1d053ec305dde2d574899019ffb01a28dbe1dd582912_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:f17eb032f7250aa4a3bb99e2754fa4cb0dbfc9fbbb8c787f70ad30b71b27b5a2_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1a57b53f8642ccb95884687efc251ad52e8ee3e718b55d0f4d21f800dfd3f5fa_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:6234cfecf4dd75b8c4ff1c527ad4eb306d966cfa0170ecdb8ea4bc69c2cdc495_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:779e75a94141db7f8223b9861ba2fa3ba8baf6fa470bb0ab109945d75e20121b_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:e593bebc4e753ac3c4cdd1be05711452dbda6e3b015b37926fa804851bdad6a8_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2449833"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in gRPC-Go, the Go language implementation of gRPC. This vulnerability, an authorization bypass, is caused by improper input validation of the HTTP/2 `:path` pseudo-header. A remote attacker can exploit this by sending raw HTTP/2 frames with a malformed `:path` that omits the mandatory leading slash. This allows the attacker to bypass defined security policies, potentially leading to unauthorized access to services or information disclosure.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "google.golang.org/grpc/grpc-go: google.golang.org/grpc/authz: gRPC-Go: Authorization bypass due to improper HTTP/2 path validation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:190edd3effb60c56c885fc964d3eb48076293e1e43d745c4615ed00ef7daa145_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:382be8775c61942123adac2acec9f48085ebf7fd2b286c20e36a33ea6462baa7_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:5e83175abaef1e3046bac94621a86e036317833c740cdd6d235f1133a1388dd3_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:7173a298b07cbde3cd9ff12ca25f26ccf79b9ff8cfcb35a001c9f8c0b0291436_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:16cf5e33f297c027686d3ba9c6cbb01dba7a39299e2765fe4eaacc892b32f0d1_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:4715242f98234d2018f8317d9a57f63ff23b4d63be96491d55af2a2ef4572261_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:678c8d38900d994c4aa2e23669b7901747028690a4c5e4ba9aced4cbfe22b248_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:b39a2930e310d432a840798f03f7e55b8da42ff16ccda31790f85558d2be2537_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:1d01e27a3cdea6c99a985b877e29629d1c1fb00203f4a90c45db6df7a602e2cc_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:88b38ad10068e0574d2e5934849b98429c69305633b42aa4d19822ede2a6e10d_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:b020334c46f2d7276ba0c3aa8be7951254b197b2da310f0c22d2e16681a6a265_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:f2c222424cd66659ebea6787b6934c2d01d9eeb4f7db03ebfa16ab7b65aeb5b2_amd64"
],
"known_not_affected": [
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5008dcb0428a0837b9abd827963e7008c8e16af8cfcbd432421286fca63fe714_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5856cba3fe26ab7f756ba93e06caa6e522336ff36ff4c515132a8d35c85a2f64_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:6ddf185f2714d45fab92c831bf32673da55c7a43dbcf1bd22090b203791e03b2_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:eb32b129ea6a10b4aada4313ff11b04c33b99877eea9a5e567245d361d69f140_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:165f6085028f3859f6ede9176d413274ee1a457b72cd9c437795146c20b0722c_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:7a39f26f51bcbb4ef395208db01e2b0ee8b1fe9b15b3701c9c35d8f636f790d9_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:a4d609ff22b610b625a74fffd22883d5debe93c2e0c6ae2bcbbfd8f5f6b2cf12_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:ec02f5f031fefd5a610b69a81be5350f96e54511e2d2c619e8b9fe8f193297b6_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:0070df2a8c7882ae021000c498ead96b19f1bd6819e46657d5898cb71e6ec506_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:4b578a8ef1579d7168b7f0a1b7cebe66213003f8225a86cfdd4c9f24a5e2d871_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:8d6371a5fe374e3bc5c19a930ea712d266fab13a722768204b128bc71e928c97_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:985b19d79b3e54fc8b99b9b0239b74dcf6d0102d3ff0cd5363ae4627069d2ee1_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:2a0a6ea6465a6d165f072ef782a1825cc16ecfb2f8c58d5ec58c1d40d02e5208_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:679b470190ff7a7fc04e283884be4f24d1b0c475d0730fb718f2f45c60551b61_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:9734d0dc0367884e128837b7d02038a3b4136c4865ed3dc90902801393e178b4_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:f5f35702e424cd4e9b768c59d44928844b2d09fbb98d368ae7b54b7ec0771d13_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:093834bac2e2f7f01968ef542b9bcbf5fbe530c9f0dd86521825797abb4a33a2_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:153f9e059139e6dbaeb2e5166d21bfeec59a59aa5cd8045e11dbfa091479b4bb_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:b2173caa314ae26d2a300f61cfa94031c34fe7676fd007418849212082db3636_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:cd9ada6b38c080eec45e1d053ec305dde2d574899019ffb01a28dbe1dd582912_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:f17eb032f7250aa4a3bb99e2754fa4cb0dbfc9fbbb8c787f70ad30b71b27b5a2_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1a57b53f8642ccb95884687efc251ad52e8ee3e718b55d0f4d21f800dfd3f5fa_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:6234cfecf4dd75b8c4ff1c527ad4eb306d966cfa0170ecdb8ea4bc69c2cdc495_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:779e75a94141db7f8223b9861ba2fa3ba8baf6fa470bb0ab109945d75e20121b_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:e593bebc4e753ac3c4cdd1be05711452dbda6e3b015b37926fa804851bdad6a8_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-33186"
},
{
"category": "external",
"summary": "RHBZ#2449833",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2449833"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-33186",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33186"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186"
},
{
"category": "external",
"summary": "https://github.com/grpc/grpc-go/security/advisories/GHSA-p77j-4mvh-x3m3",
"url": "https://github.com/grpc/grpc-go/security/advisories/GHSA-p77j-4mvh-x3m3"
}
],
"release_date": "2026-03-20T22:23:32.147000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-23T14:13:54+00:00",
"details": "It is recommended that existing users of Red Hat OpenShift Builds 1.7.1 upgrades to to 1.7.2",
"product_ids": [
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:190edd3effb60c56c885fc964d3eb48076293e1e43d745c4615ed00ef7daa145_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:382be8775c61942123adac2acec9f48085ebf7fd2b286c20e36a33ea6462baa7_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:5e83175abaef1e3046bac94621a86e036317833c740cdd6d235f1133a1388dd3_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:7173a298b07cbde3cd9ff12ca25f26ccf79b9ff8cfcb35a001c9f8c0b0291436_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:16cf5e33f297c027686d3ba9c6cbb01dba7a39299e2765fe4eaacc892b32f0d1_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:4715242f98234d2018f8317d9a57f63ff23b4d63be96491d55af2a2ef4572261_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:678c8d38900d994c4aa2e23669b7901747028690a4c5e4ba9aced4cbfe22b248_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:b39a2930e310d432a840798f03f7e55b8da42ff16ccda31790f85558d2be2537_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:1d01e27a3cdea6c99a985b877e29629d1c1fb00203f4a90c45db6df7a602e2cc_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:88b38ad10068e0574d2e5934849b98429c69305633b42aa4d19822ede2a6e10d_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:b020334c46f2d7276ba0c3aa8be7951254b197b2da310f0c22d2e16681a6a265_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:f2c222424cd66659ebea6787b6934c2d01d9eeb4f7db03ebfa16ab7b65aeb5b2_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:10158"
},
{
"category": "workaround",
"details": "To mitigate this issue, implement infrastructure-level normalization to ensure all incoming HTTP/2 `:path` headers are properly formatted with a leading slash before reaching the gRPC-Go server. This can be achieved by configuring a reverse proxy or API gateway to validate and normalize the `:path` header. Ensure that any such intermediary is properly configured and restarted to apply the changes, which may temporarily impact service availability.",
"product_ids": [
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5008dcb0428a0837b9abd827963e7008c8e16af8cfcbd432421286fca63fe714_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5856cba3fe26ab7f756ba93e06caa6e522336ff36ff4c515132a8d35c85a2f64_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:6ddf185f2714d45fab92c831bf32673da55c7a43dbcf1bd22090b203791e03b2_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:eb32b129ea6a10b4aada4313ff11b04c33b99877eea9a5e567245d361d69f140_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:165f6085028f3859f6ede9176d413274ee1a457b72cd9c437795146c20b0722c_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:7a39f26f51bcbb4ef395208db01e2b0ee8b1fe9b15b3701c9c35d8f636f790d9_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:a4d609ff22b610b625a74fffd22883d5debe93c2e0c6ae2bcbbfd8f5f6b2cf12_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:ec02f5f031fefd5a610b69a81be5350f96e54511e2d2c619e8b9fe8f193297b6_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:0070df2a8c7882ae021000c498ead96b19f1bd6819e46657d5898cb71e6ec506_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:4b578a8ef1579d7168b7f0a1b7cebe66213003f8225a86cfdd4c9f24a5e2d871_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:8d6371a5fe374e3bc5c19a930ea712d266fab13a722768204b128bc71e928c97_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:985b19d79b3e54fc8b99b9b0239b74dcf6d0102d3ff0cd5363ae4627069d2ee1_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:2a0a6ea6465a6d165f072ef782a1825cc16ecfb2f8c58d5ec58c1d40d02e5208_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:679b470190ff7a7fc04e283884be4f24d1b0c475d0730fb718f2f45c60551b61_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:9734d0dc0367884e128837b7d02038a3b4136c4865ed3dc90902801393e178b4_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:f5f35702e424cd4e9b768c59d44928844b2d09fbb98d368ae7b54b7ec0771d13_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:093834bac2e2f7f01968ef542b9bcbf5fbe530c9f0dd86521825797abb4a33a2_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:190edd3effb60c56c885fc964d3eb48076293e1e43d745c4615ed00ef7daa145_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:382be8775c61942123adac2acec9f48085ebf7fd2b286c20e36a33ea6462baa7_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:5e83175abaef1e3046bac94621a86e036317833c740cdd6d235f1133a1388dd3_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:7173a298b07cbde3cd9ff12ca25f26ccf79b9ff8cfcb35a001c9f8c0b0291436_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:16cf5e33f297c027686d3ba9c6cbb01dba7a39299e2765fe4eaacc892b32f0d1_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:4715242f98234d2018f8317d9a57f63ff23b4d63be96491d55af2a2ef4572261_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:678c8d38900d994c4aa2e23669b7901747028690a4c5e4ba9aced4cbfe22b248_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:b39a2930e310d432a840798f03f7e55b8da42ff16ccda31790f85558d2be2537_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:1d01e27a3cdea6c99a985b877e29629d1c1fb00203f4a90c45db6df7a602e2cc_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:88b38ad10068e0574d2e5934849b98429c69305633b42aa4d19822ede2a6e10d_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:b020334c46f2d7276ba0c3aa8be7951254b197b2da310f0c22d2e16681a6a265_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:f2c222424cd66659ebea6787b6934c2d01d9eeb4f7db03ebfa16ab7b65aeb5b2_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:153f9e059139e6dbaeb2e5166d21bfeec59a59aa5cd8045e11dbfa091479b4bb_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:b2173caa314ae26d2a300f61cfa94031c34fe7676fd007418849212082db3636_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:cd9ada6b38c080eec45e1d053ec305dde2d574899019ffb01a28dbe1dd582912_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:f17eb032f7250aa4a3bb99e2754fa4cb0dbfc9fbbb8c787f70ad30b71b27b5a2_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1a57b53f8642ccb95884687efc251ad52e8ee3e718b55d0f4d21f800dfd3f5fa_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:6234cfecf4dd75b8c4ff1c527ad4eb306d966cfa0170ecdb8ea4bc69c2cdc495_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:779e75a94141db7f8223b9861ba2fa3ba8baf6fa470bb0ab109945d75e20121b_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:e593bebc4e753ac3c4cdd1be05711452dbda6e3b015b37926fa804851bdad6a8_s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5008dcb0428a0837b9abd827963e7008c8e16af8cfcbd432421286fca63fe714_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5856cba3fe26ab7f756ba93e06caa6e522336ff36ff4c515132a8d35c85a2f64_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:6ddf185f2714d45fab92c831bf32673da55c7a43dbcf1bd22090b203791e03b2_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:eb32b129ea6a10b4aada4313ff11b04c33b99877eea9a5e567245d361d69f140_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:165f6085028f3859f6ede9176d413274ee1a457b72cd9c437795146c20b0722c_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:7a39f26f51bcbb4ef395208db01e2b0ee8b1fe9b15b3701c9c35d8f636f790d9_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:a4d609ff22b610b625a74fffd22883d5debe93c2e0c6ae2bcbbfd8f5f6b2cf12_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:ec02f5f031fefd5a610b69a81be5350f96e54511e2d2c619e8b9fe8f193297b6_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:0070df2a8c7882ae021000c498ead96b19f1bd6819e46657d5898cb71e6ec506_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:4b578a8ef1579d7168b7f0a1b7cebe66213003f8225a86cfdd4c9f24a5e2d871_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:8d6371a5fe374e3bc5c19a930ea712d266fab13a722768204b128bc71e928c97_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:985b19d79b3e54fc8b99b9b0239b74dcf6d0102d3ff0cd5363ae4627069d2ee1_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:2a0a6ea6465a6d165f072ef782a1825cc16ecfb2f8c58d5ec58c1d40d02e5208_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:679b470190ff7a7fc04e283884be4f24d1b0c475d0730fb718f2f45c60551b61_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:9734d0dc0367884e128837b7d02038a3b4136c4865ed3dc90902801393e178b4_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:f5f35702e424cd4e9b768c59d44928844b2d09fbb98d368ae7b54b7ec0771d13_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:093834bac2e2f7f01968ef542b9bcbf5fbe530c9f0dd86521825797abb4a33a2_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:190edd3effb60c56c885fc964d3eb48076293e1e43d745c4615ed00ef7daa145_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:382be8775c61942123adac2acec9f48085ebf7fd2b286c20e36a33ea6462baa7_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:5e83175abaef1e3046bac94621a86e036317833c740cdd6d235f1133a1388dd3_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:7173a298b07cbde3cd9ff12ca25f26ccf79b9ff8cfcb35a001c9f8c0b0291436_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:16cf5e33f297c027686d3ba9c6cbb01dba7a39299e2765fe4eaacc892b32f0d1_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:4715242f98234d2018f8317d9a57f63ff23b4d63be96491d55af2a2ef4572261_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:678c8d38900d994c4aa2e23669b7901747028690a4c5e4ba9aced4cbfe22b248_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:b39a2930e310d432a840798f03f7e55b8da42ff16ccda31790f85558d2be2537_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:1d01e27a3cdea6c99a985b877e29629d1c1fb00203f4a90c45db6df7a602e2cc_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:88b38ad10068e0574d2e5934849b98429c69305633b42aa4d19822ede2a6e10d_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:b020334c46f2d7276ba0c3aa8be7951254b197b2da310f0c22d2e16681a6a265_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:f2c222424cd66659ebea6787b6934c2d01d9eeb4f7db03ebfa16ab7b65aeb5b2_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:153f9e059139e6dbaeb2e5166d21bfeec59a59aa5cd8045e11dbfa091479b4bb_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:b2173caa314ae26d2a300f61cfa94031c34fe7676fd007418849212082db3636_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:cd9ada6b38c080eec45e1d053ec305dde2d574899019ffb01a28dbe1dd582912_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:f17eb032f7250aa4a3bb99e2754fa4cb0dbfc9fbbb8c787f70ad30b71b27b5a2_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1a57b53f8642ccb95884687efc251ad52e8ee3e718b55d0f4d21f800dfd3f5fa_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:6234cfecf4dd75b8c4ff1c527ad4eb306d966cfa0170ecdb8ea4bc69c2cdc495_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:779e75a94141db7f8223b9861ba2fa3ba8baf6fa470bb0ab109945d75e20121b_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:e593bebc4e753ac3c4cdd1be05711452dbda6e3b015b37926fa804851bdad6a8_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "google.golang.org/grpc/grpc-go: google.golang.org/grpc/authz: gRPC-Go: Authorization bypass due to improper HTTP/2 path validation"
},
{
"cve": "CVE-2026-33211",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2026-03-24T00:02:20.093480+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5008dcb0428a0837b9abd827963e7008c8e16af8cfcbd432421286fca63fe714_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5856cba3fe26ab7f756ba93e06caa6e522336ff36ff4c515132a8d35c85a2f64_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:6ddf185f2714d45fab92c831bf32673da55c7a43dbcf1bd22090b203791e03b2_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:eb32b129ea6a10b4aada4313ff11b04c33b99877eea9a5e567245d361d69f140_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:165f6085028f3859f6ede9176d413274ee1a457b72cd9c437795146c20b0722c_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:7a39f26f51bcbb4ef395208db01e2b0ee8b1fe9b15b3701c9c35d8f636f790d9_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:a4d609ff22b610b625a74fffd22883d5debe93c2e0c6ae2bcbbfd8f5f6b2cf12_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:ec02f5f031fefd5a610b69a81be5350f96e54511e2d2c619e8b9fe8f193297b6_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:0070df2a8c7882ae021000c498ead96b19f1bd6819e46657d5898cb71e6ec506_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:4b578a8ef1579d7168b7f0a1b7cebe66213003f8225a86cfdd4c9f24a5e2d871_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:8d6371a5fe374e3bc5c19a930ea712d266fab13a722768204b128bc71e928c97_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:985b19d79b3e54fc8b99b9b0239b74dcf6d0102d3ff0cd5363ae4627069d2ee1_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:2a0a6ea6465a6d165f072ef782a1825cc16ecfb2f8c58d5ec58c1d40d02e5208_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:679b470190ff7a7fc04e283884be4f24d1b0c475d0730fb718f2f45c60551b61_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:9734d0dc0367884e128837b7d02038a3b4136c4865ed3dc90902801393e178b4_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:f5f35702e424cd4e9b768c59d44928844b2d09fbb98d368ae7b54b7ec0771d13_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:093834bac2e2f7f01968ef542b9bcbf5fbe530c9f0dd86521825797abb4a33a2_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:16cf5e33f297c027686d3ba9c6cbb01dba7a39299e2765fe4eaacc892b32f0d1_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:4715242f98234d2018f8317d9a57f63ff23b4d63be96491d55af2a2ef4572261_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:678c8d38900d994c4aa2e23669b7901747028690a4c5e4ba9aced4cbfe22b248_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:b39a2930e310d432a840798f03f7e55b8da42ff16ccda31790f85558d2be2537_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:1d01e27a3cdea6c99a985b877e29629d1c1fb00203f4a90c45db6df7a602e2cc_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:88b38ad10068e0574d2e5934849b98429c69305633b42aa4d19822ede2a6e10d_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:b020334c46f2d7276ba0c3aa8be7951254b197b2da310f0c22d2e16681a6a265_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:f2c222424cd66659ebea6787b6934c2d01d9eeb4f7db03ebfa16ab7b65aeb5b2_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:153f9e059139e6dbaeb2e5166d21bfeec59a59aa5cd8045e11dbfa091479b4bb_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:b2173caa314ae26d2a300f61cfa94031c34fe7676fd007418849212082db3636_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:cd9ada6b38c080eec45e1d053ec305dde2d574899019ffb01a28dbe1dd582912_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:f17eb032f7250aa4a3bb99e2754fa4cb0dbfc9fbbb8c787f70ad30b71b27b5a2_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1a57b53f8642ccb95884687efc251ad52e8ee3e718b55d0f4d21f800dfd3f5fa_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:6234cfecf4dd75b8c4ff1c527ad4eb306d966cfa0170ecdb8ea4bc69c2cdc495_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:779e75a94141db7f8223b9861ba2fa3ba8baf6fa470bb0ab109945d75e20121b_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:e593bebc4e753ac3c4cdd1be05711452dbda6e3b015b37926fa804851bdad6a8_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2450554"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Tekton Pipelines, specifically in the Tekton Pipelines git resolver. A tenant with permissions to create ResolutionRequests can exploit a path traversal vulnerability via the `pathInRepo` parameter. This allows the tenant to read arbitrary files from the resolver pod\u0027s filesystem, leading to information disclosure, including sensitive ServiceAccount tokens. The contents of these files are returned in a base64-encoded format.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Tekton Pipelines: github.com/tektoncd/pipeline: Tekton Pipelines: Information disclosure via path traversal in git resolver",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to have the permission to create ResolutionRequests (e.g., by creating TaskRuns or PipelineRuns that use the git resolver) within at least one specific namespace, limiting the exposure of this issue to authenticated users. Also, an attacker can read any file readable by the resolver pod process, including cluster secrets, allowing an escalation of privileges from namespace-scoped access to cluster-wide access. Due to these reasons, this vulnerability has been rated with an important severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:190edd3effb60c56c885fc964d3eb48076293e1e43d745c4615ed00ef7daa145_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:382be8775c61942123adac2acec9f48085ebf7fd2b286c20e36a33ea6462baa7_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:5e83175abaef1e3046bac94621a86e036317833c740cdd6d235f1133a1388dd3_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:7173a298b07cbde3cd9ff12ca25f26ccf79b9ff8cfcb35a001c9f8c0b0291436_s390x"
],
"known_not_affected": [
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5008dcb0428a0837b9abd827963e7008c8e16af8cfcbd432421286fca63fe714_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5856cba3fe26ab7f756ba93e06caa6e522336ff36ff4c515132a8d35c85a2f64_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:6ddf185f2714d45fab92c831bf32673da55c7a43dbcf1bd22090b203791e03b2_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:eb32b129ea6a10b4aada4313ff11b04c33b99877eea9a5e567245d361d69f140_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:165f6085028f3859f6ede9176d413274ee1a457b72cd9c437795146c20b0722c_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:7a39f26f51bcbb4ef395208db01e2b0ee8b1fe9b15b3701c9c35d8f636f790d9_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:a4d609ff22b610b625a74fffd22883d5debe93c2e0c6ae2bcbbfd8f5f6b2cf12_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:ec02f5f031fefd5a610b69a81be5350f96e54511e2d2c619e8b9fe8f193297b6_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:0070df2a8c7882ae021000c498ead96b19f1bd6819e46657d5898cb71e6ec506_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:4b578a8ef1579d7168b7f0a1b7cebe66213003f8225a86cfdd4c9f24a5e2d871_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:8d6371a5fe374e3bc5c19a930ea712d266fab13a722768204b128bc71e928c97_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:985b19d79b3e54fc8b99b9b0239b74dcf6d0102d3ff0cd5363ae4627069d2ee1_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:2a0a6ea6465a6d165f072ef782a1825cc16ecfb2f8c58d5ec58c1d40d02e5208_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:679b470190ff7a7fc04e283884be4f24d1b0c475d0730fb718f2f45c60551b61_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:9734d0dc0367884e128837b7d02038a3b4136c4865ed3dc90902801393e178b4_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:f5f35702e424cd4e9b768c59d44928844b2d09fbb98d368ae7b54b7ec0771d13_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:093834bac2e2f7f01968ef542b9bcbf5fbe530c9f0dd86521825797abb4a33a2_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:16cf5e33f297c027686d3ba9c6cbb01dba7a39299e2765fe4eaacc892b32f0d1_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:4715242f98234d2018f8317d9a57f63ff23b4d63be96491d55af2a2ef4572261_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:678c8d38900d994c4aa2e23669b7901747028690a4c5e4ba9aced4cbfe22b248_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:b39a2930e310d432a840798f03f7e55b8da42ff16ccda31790f85558d2be2537_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:1d01e27a3cdea6c99a985b877e29629d1c1fb00203f4a90c45db6df7a602e2cc_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:88b38ad10068e0574d2e5934849b98429c69305633b42aa4d19822ede2a6e10d_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:b020334c46f2d7276ba0c3aa8be7951254b197b2da310f0c22d2e16681a6a265_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:f2c222424cd66659ebea6787b6934c2d01d9eeb4f7db03ebfa16ab7b65aeb5b2_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:153f9e059139e6dbaeb2e5166d21bfeec59a59aa5cd8045e11dbfa091479b4bb_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:b2173caa314ae26d2a300f61cfa94031c34fe7676fd007418849212082db3636_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:cd9ada6b38c080eec45e1d053ec305dde2d574899019ffb01a28dbe1dd582912_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:f17eb032f7250aa4a3bb99e2754fa4cb0dbfc9fbbb8c787f70ad30b71b27b5a2_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1a57b53f8642ccb95884687efc251ad52e8ee3e718b55d0f4d21f800dfd3f5fa_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:6234cfecf4dd75b8c4ff1c527ad4eb306d966cfa0170ecdb8ea4bc69c2cdc495_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:779e75a94141db7f8223b9861ba2fa3ba8baf6fa470bb0ab109945d75e20121b_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:e593bebc4e753ac3c4cdd1be05711452dbda6e3b015b37926fa804851bdad6a8_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-33211"
},
{
"category": "external",
"summary": "RHBZ#2450554",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2450554"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-33211",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33211"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-33211",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33211"
},
{
"category": "external",
"summary": "https://github.com/tektoncd/pipeline/commit/10fa538f9a2b6d01c75138f1ed7ba3da0e34687c",
"url": "https://github.com/tektoncd/pipeline/commit/10fa538f9a2b6d01c75138f1ed7ba3da0e34687c"
},
{
"category": "external",
"summary": "https://github.com/tektoncd/pipeline/commit/318006c4e3a5",
"url": "https://github.com/tektoncd/pipeline/commit/318006c4e3a5"
},
{
"category": "external",
"summary": "https://github.com/tektoncd/pipeline/commit/3ca7bc6e6dd1d97f80b84f78370d91edaf023cbd",
"url": "https://github.com/tektoncd/pipeline/commit/3ca7bc6e6dd1d97f80b84f78370d91edaf023cbd"
},
{
"category": "external",
"summary": "https://github.com/tektoncd/pipeline/commit/961388fcf3374bc7656d28ab58ca84987e0a75ae",
"url": "https://github.com/tektoncd/pipeline/commit/961388fcf3374bc7656d28ab58ca84987e0a75ae"
},
{
"category": "external",
"summary": "https://github.com/tektoncd/pipeline/commit/b1fee65b88aa969069c14c120045e97c37d9ee5e",
"url": "https://github.com/tektoncd/pipeline/commit/b1fee65b88aa969069c14c120045e97c37d9ee5e"
},
{
"category": "external",
"summary": "https://github.com/tektoncd/pipeline/commit/cdb4e1e97a4f3170f9bc2cbfff83a6c8107bc3db",
"url": "https://github.com/tektoncd/pipeline/commit/cdb4e1e97a4f3170f9bc2cbfff83a6c8107bc3db"
},
{
"category": "external",
"summary": "https://github.com/tektoncd/pipeline/commit/ec7755031a183b345cf9e64bea0e0505c1b9cb78",
"url": "https://github.com/tektoncd/pipeline/commit/ec7755031a183b345cf9e64bea0e0505c1b9cb78"
},
{
"category": "external",
"summary": "https://github.com/tektoncd/pipeline/security/advisories/GHSA-j5q5-j9gm-2w5c",
"url": "https://github.com/tektoncd/pipeline/security/advisories/GHSA-j5q5-j9gm-2w5c"
}
],
"release_date": "2026-03-23T23:55:54.089000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-23T14:13:54+00:00",
"details": "It is recommended that existing users of Red Hat OpenShift Builds 1.7.1 upgrades to to 1.7.2",
"product_ids": [
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:190edd3effb60c56c885fc964d3eb48076293e1e43d745c4615ed00ef7daa145_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:382be8775c61942123adac2acec9f48085ebf7fd2b286c20e36a33ea6462baa7_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:5e83175abaef1e3046bac94621a86e036317833c740cdd6d235f1133a1388dd3_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:7173a298b07cbde3cd9ff12ca25f26ccf79b9ff8cfcb35a001c9f8c0b0291436_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:10158"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, restrict the creation of ResolutionRequests to trusted users and service accounts. Implement strict Role-Based Access Control (RBAC) policies to limit which tenants can create TaskRuns or PipelineRuns that utilize the Tekton Pipelines git resolver. This reduces the exposure by preventing unauthorized access to the resolver pod\u0027s filesystem.",
"product_ids": [
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5008dcb0428a0837b9abd827963e7008c8e16af8cfcbd432421286fca63fe714_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5856cba3fe26ab7f756ba93e06caa6e522336ff36ff4c515132a8d35c85a2f64_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:6ddf185f2714d45fab92c831bf32673da55c7a43dbcf1bd22090b203791e03b2_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:eb32b129ea6a10b4aada4313ff11b04c33b99877eea9a5e567245d361d69f140_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:165f6085028f3859f6ede9176d413274ee1a457b72cd9c437795146c20b0722c_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:7a39f26f51bcbb4ef395208db01e2b0ee8b1fe9b15b3701c9c35d8f636f790d9_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:a4d609ff22b610b625a74fffd22883d5debe93c2e0c6ae2bcbbfd8f5f6b2cf12_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:ec02f5f031fefd5a610b69a81be5350f96e54511e2d2c619e8b9fe8f193297b6_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:0070df2a8c7882ae021000c498ead96b19f1bd6819e46657d5898cb71e6ec506_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:4b578a8ef1579d7168b7f0a1b7cebe66213003f8225a86cfdd4c9f24a5e2d871_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:8d6371a5fe374e3bc5c19a930ea712d266fab13a722768204b128bc71e928c97_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:985b19d79b3e54fc8b99b9b0239b74dcf6d0102d3ff0cd5363ae4627069d2ee1_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:2a0a6ea6465a6d165f072ef782a1825cc16ecfb2f8c58d5ec58c1d40d02e5208_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:679b470190ff7a7fc04e283884be4f24d1b0c475d0730fb718f2f45c60551b61_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:9734d0dc0367884e128837b7d02038a3b4136c4865ed3dc90902801393e178b4_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:f5f35702e424cd4e9b768c59d44928844b2d09fbb98d368ae7b54b7ec0771d13_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:093834bac2e2f7f01968ef542b9bcbf5fbe530c9f0dd86521825797abb4a33a2_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:190edd3effb60c56c885fc964d3eb48076293e1e43d745c4615ed00ef7daa145_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:382be8775c61942123adac2acec9f48085ebf7fd2b286c20e36a33ea6462baa7_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:5e83175abaef1e3046bac94621a86e036317833c740cdd6d235f1133a1388dd3_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:7173a298b07cbde3cd9ff12ca25f26ccf79b9ff8cfcb35a001c9f8c0b0291436_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:16cf5e33f297c027686d3ba9c6cbb01dba7a39299e2765fe4eaacc892b32f0d1_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:4715242f98234d2018f8317d9a57f63ff23b4d63be96491d55af2a2ef4572261_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:678c8d38900d994c4aa2e23669b7901747028690a4c5e4ba9aced4cbfe22b248_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:b39a2930e310d432a840798f03f7e55b8da42ff16ccda31790f85558d2be2537_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:1d01e27a3cdea6c99a985b877e29629d1c1fb00203f4a90c45db6df7a602e2cc_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:88b38ad10068e0574d2e5934849b98429c69305633b42aa4d19822ede2a6e10d_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:b020334c46f2d7276ba0c3aa8be7951254b197b2da310f0c22d2e16681a6a265_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:f2c222424cd66659ebea6787b6934c2d01d9eeb4f7db03ebfa16ab7b65aeb5b2_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:153f9e059139e6dbaeb2e5166d21bfeec59a59aa5cd8045e11dbfa091479b4bb_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:b2173caa314ae26d2a300f61cfa94031c34fe7676fd007418849212082db3636_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:cd9ada6b38c080eec45e1d053ec305dde2d574899019ffb01a28dbe1dd582912_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:f17eb032f7250aa4a3bb99e2754fa4cb0dbfc9fbbb8c787f70ad30b71b27b5a2_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1a57b53f8642ccb95884687efc251ad52e8ee3e718b55d0f4d21f800dfd3f5fa_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:6234cfecf4dd75b8c4ff1c527ad4eb306d966cfa0170ecdb8ea4bc69c2cdc495_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:779e75a94141db7f8223b9861ba2fa3ba8baf6fa470bb0ab109945d75e20121b_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:e593bebc4e753ac3c4cdd1be05711452dbda6e3b015b37926fa804851bdad6a8_s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5008dcb0428a0837b9abd827963e7008c8e16af8cfcbd432421286fca63fe714_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5856cba3fe26ab7f756ba93e06caa6e522336ff36ff4c515132a8d35c85a2f64_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:6ddf185f2714d45fab92c831bf32673da55c7a43dbcf1bd22090b203791e03b2_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:eb32b129ea6a10b4aada4313ff11b04c33b99877eea9a5e567245d361d69f140_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:165f6085028f3859f6ede9176d413274ee1a457b72cd9c437795146c20b0722c_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:7a39f26f51bcbb4ef395208db01e2b0ee8b1fe9b15b3701c9c35d8f636f790d9_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:a4d609ff22b610b625a74fffd22883d5debe93c2e0c6ae2bcbbfd8f5f6b2cf12_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:ec02f5f031fefd5a610b69a81be5350f96e54511e2d2c619e8b9fe8f193297b6_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:0070df2a8c7882ae021000c498ead96b19f1bd6819e46657d5898cb71e6ec506_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:4b578a8ef1579d7168b7f0a1b7cebe66213003f8225a86cfdd4c9f24a5e2d871_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:8d6371a5fe374e3bc5c19a930ea712d266fab13a722768204b128bc71e928c97_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:985b19d79b3e54fc8b99b9b0239b74dcf6d0102d3ff0cd5363ae4627069d2ee1_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:2a0a6ea6465a6d165f072ef782a1825cc16ecfb2f8c58d5ec58c1d40d02e5208_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:679b470190ff7a7fc04e283884be4f24d1b0c475d0730fb718f2f45c60551b61_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:9734d0dc0367884e128837b7d02038a3b4136c4865ed3dc90902801393e178b4_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:f5f35702e424cd4e9b768c59d44928844b2d09fbb98d368ae7b54b7ec0771d13_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:093834bac2e2f7f01968ef542b9bcbf5fbe530c9f0dd86521825797abb4a33a2_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:190edd3effb60c56c885fc964d3eb48076293e1e43d745c4615ed00ef7daa145_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:382be8775c61942123adac2acec9f48085ebf7fd2b286c20e36a33ea6462baa7_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:5e83175abaef1e3046bac94621a86e036317833c740cdd6d235f1133a1388dd3_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:7173a298b07cbde3cd9ff12ca25f26ccf79b9ff8cfcb35a001c9f8c0b0291436_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:16cf5e33f297c027686d3ba9c6cbb01dba7a39299e2765fe4eaacc892b32f0d1_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:4715242f98234d2018f8317d9a57f63ff23b4d63be96491d55af2a2ef4572261_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:678c8d38900d994c4aa2e23669b7901747028690a4c5e4ba9aced4cbfe22b248_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:b39a2930e310d432a840798f03f7e55b8da42ff16ccda31790f85558d2be2537_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:1d01e27a3cdea6c99a985b877e29629d1c1fb00203f4a90c45db6df7a602e2cc_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:88b38ad10068e0574d2e5934849b98429c69305633b42aa4d19822ede2a6e10d_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:b020334c46f2d7276ba0c3aa8be7951254b197b2da310f0c22d2e16681a6a265_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:f2c222424cd66659ebea6787b6934c2d01d9eeb4f7db03ebfa16ab7b65aeb5b2_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:153f9e059139e6dbaeb2e5166d21bfeec59a59aa5cd8045e11dbfa091479b4bb_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:b2173caa314ae26d2a300f61cfa94031c34fe7676fd007418849212082db3636_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:cd9ada6b38c080eec45e1d053ec305dde2d574899019ffb01a28dbe1dd582912_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:f17eb032f7250aa4a3bb99e2754fa4cb0dbfc9fbbb8c787f70ad30b71b27b5a2_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1a57b53f8642ccb95884687efc251ad52e8ee3e718b55d0f4d21f800dfd3f5fa_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:6234cfecf4dd75b8c4ff1c527ad4eb306d966cfa0170ecdb8ea4bc69c2cdc495_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:779e75a94141db7f8223b9861ba2fa3ba8baf6fa470bb0ab109945d75e20121b_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:e593bebc4e753ac3c4cdd1be05711452dbda6e3b015b37926fa804851bdad6a8_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Tekton Pipelines: github.com/tektoncd/pipeline: Tekton Pipelines: Information disclosure via path traversal in git resolver"
},
{
"cve": "CVE-2026-33810",
"cwe": {
"id": "CWE-1289",
"name": "Improper Validation of Unsafe Equivalence in Input"
},
"discovery_date": "2026-04-08T02:01:09.100830+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5008dcb0428a0837b9abd827963e7008c8e16af8cfcbd432421286fca63fe714_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5856cba3fe26ab7f756ba93e06caa6e522336ff36ff4c515132a8d35c85a2f64_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:6ddf185f2714d45fab92c831bf32673da55c7a43dbcf1bd22090b203791e03b2_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:eb32b129ea6a10b4aada4313ff11b04c33b99877eea9a5e567245d361d69f140_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:165f6085028f3859f6ede9176d413274ee1a457b72cd9c437795146c20b0722c_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:7a39f26f51bcbb4ef395208db01e2b0ee8b1fe9b15b3701c9c35d8f636f790d9_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:a4d609ff22b610b625a74fffd22883d5debe93c2e0c6ae2bcbbfd8f5f6b2cf12_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:ec02f5f031fefd5a610b69a81be5350f96e54511e2d2c619e8b9fe8f193297b6_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:0070df2a8c7882ae021000c498ead96b19f1bd6819e46657d5898cb71e6ec506_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:4b578a8ef1579d7168b7f0a1b7cebe66213003f8225a86cfdd4c9f24a5e2d871_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:8d6371a5fe374e3bc5c19a930ea712d266fab13a722768204b128bc71e928c97_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:985b19d79b3e54fc8b99b9b0239b74dcf6d0102d3ff0cd5363ae4627069d2ee1_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:2a0a6ea6465a6d165f072ef782a1825cc16ecfb2f8c58d5ec58c1d40d02e5208_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:679b470190ff7a7fc04e283884be4f24d1b0c475d0730fb718f2f45c60551b61_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:9734d0dc0367884e128837b7d02038a3b4136c4865ed3dc90902801393e178b4_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:f5f35702e424cd4e9b768c59d44928844b2d09fbb98d368ae7b54b7ec0771d13_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:093834bac2e2f7f01968ef542b9bcbf5fbe530c9f0dd86521825797abb4a33a2_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:190edd3effb60c56c885fc964d3eb48076293e1e43d745c4615ed00ef7daa145_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:382be8775c61942123adac2acec9f48085ebf7fd2b286c20e36a33ea6462baa7_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:5e83175abaef1e3046bac94621a86e036317833c740cdd6d235f1133a1388dd3_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:7173a298b07cbde3cd9ff12ca25f26ccf79b9ff8cfcb35a001c9f8c0b0291436_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:16cf5e33f297c027686d3ba9c6cbb01dba7a39299e2765fe4eaacc892b32f0d1_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:4715242f98234d2018f8317d9a57f63ff23b4d63be96491d55af2a2ef4572261_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:678c8d38900d994c4aa2e23669b7901747028690a4c5e4ba9aced4cbfe22b248_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:b39a2930e310d432a840798f03f7e55b8da42ff16ccda31790f85558d2be2537_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:1d01e27a3cdea6c99a985b877e29629d1c1fb00203f4a90c45db6df7a602e2cc_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:88b38ad10068e0574d2e5934849b98429c69305633b42aa4d19822ede2a6e10d_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:b020334c46f2d7276ba0c3aa8be7951254b197b2da310f0c22d2e16681a6a265_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:f2c222424cd66659ebea6787b6934c2d01d9eeb4f7db03ebfa16ab7b65aeb5b2_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1a57b53f8642ccb95884687efc251ad52e8ee3e718b55d0f4d21f800dfd3f5fa_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:6234cfecf4dd75b8c4ff1c527ad4eb306d966cfa0170ecdb8ea4bc69c2cdc495_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:779e75a94141db7f8223b9861ba2fa3ba8baf6fa470bb0ab109945d75e20121b_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:e593bebc4e753ac3c4cdd1be05711452dbda6e3b015b37926fa804851bdad6a8_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2456335"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the `crypto/x509` package within Go (golang). When verifying a certificate chain, excluded DNS (Domain Name System) constraints are not correctly applied to wildcard DNS Subject Alternative Names (SANs) if the case of the SAN differs from the constraint. This oversight could allow an attacker to bypass certificate validation, potentially leading to the acceptance of a malicious certificate that should have been rejected. This issue specifically impacts the validation of trusted certificate chains.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Go crypto/x509: Certificate validation bypass due to incorrect DNS constraint application",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:153f9e059139e6dbaeb2e5166d21bfeec59a59aa5cd8045e11dbfa091479b4bb_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:b2173caa314ae26d2a300f61cfa94031c34fe7676fd007418849212082db3636_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:cd9ada6b38c080eec45e1d053ec305dde2d574899019ffb01a28dbe1dd582912_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:f17eb032f7250aa4a3bb99e2754fa4cb0dbfc9fbbb8c787f70ad30b71b27b5a2_ppc64le"
],
"known_not_affected": [
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5008dcb0428a0837b9abd827963e7008c8e16af8cfcbd432421286fca63fe714_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5856cba3fe26ab7f756ba93e06caa6e522336ff36ff4c515132a8d35c85a2f64_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:6ddf185f2714d45fab92c831bf32673da55c7a43dbcf1bd22090b203791e03b2_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:eb32b129ea6a10b4aada4313ff11b04c33b99877eea9a5e567245d361d69f140_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:165f6085028f3859f6ede9176d413274ee1a457b72cd9c437795146c20b0722c_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:7a39f26f51bcbb4ef395208db01e2b0ee8b1fe9b15b3701c9c35d8f636f790d9_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:a4d609ff22b610b625a74fffd22883d5debe93c2e0c6ae2bcbbfd8f5f6b2cf12_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:ec02f5f031fefd5a610b69a81be5350f96e54511e2d2c619e8b9fe8f193297b6_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:0070df2a8c7882ae021000c498ead96b19f1bd6819e46657d5898cb71e6ec506_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:4b578a8ef1579d7168b7f0a1b7cebe66213003f8225a86cfdd4c9f24a5e2d871_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:8d6371a5fe374e3bc5c19a930ea712d266fab13a722768204b128bc71e928c97_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:985b19d79b3e54fc8b99b9b0239b74dcf6d0102d3ff0cd5363ae4627069d2ee1_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:2a0a6ea6465a6d165f072ef782a1825cc16ecfb2f8c58d5ec58c1d40d02e5208_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:679b470190ff7a7fc04e283884be4f24d1b0c475d0730fb718f2f45c60551b61_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:9734d0dc0367884e128837b7d02038a3b4136c4865ed3dc90902801393e178b4_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:f5f35702e424cd4e9b768c59d44928844b2d09fbb98d368ae7b54b7ec0771d13_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:093834bac2e2f7f01968ef542b9bcbf5fbe530c9f0dd86521825797abb4a33a2_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:190edd3effb60c56c885fc964d3eb48076293e1e43d745c4615ed00ef7daa145_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:382be8775c61942123adac2acec9f48085ebf7fd2b286c20e36a33ea6462baa7_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:5e83175abaef1e3046bac94621a86e036317833c740cdd6d235f1133a1388dd3_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:7173a298b07cbde3cd9ff12ca25f26ccf79b9ff8cfcb35a001c9f8c0b0291436_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:16cf5e33f297c027686d3ba9c6cbb01dba7a39299e2765fe4eaacc892b32f0d1_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:4715242f98234d2018f8317d9a57f63ff23b4d63be96491d55af2a2ef4572261_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:678c8d38900d994c4aa2e23669b7901747028690a4c5e4ba9aced4cbfe22b248_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:b39a2930e310d432a840798f03f7e55b8da42ff16ccda31790f85558d2be2537_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:1d01e27a3cdea6c99a985b877e29629d1c1fb00203f4a90c45db6df7a602e2cc_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:88b38ad10068e0574d2e5934849b98429c69305633b42aa4d19822ede2a6e10d_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:b020334c46f2d7276ba0c3aa8be7951254b197b2da310f0c22d2e16681a6a265_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:f2c222424cd66659ebea6787b6934c2d01d9eeb4f7db03ebfa16ab7b65aeb5b2_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1a57b53f8642ccb95884687efc251ad52e8ee3e718b55d0f4d21f800dfd3f5fa_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:6234cfecf4dd75b8c4ff1c527ad4eb306d966cfa0170ecdb8ea4bc69c2cdc495_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:779e75a94141db7f8223b9861ba2fa3ba8baf6fa470bb0ab109945d75e20121b_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:e593bebc4e753ac3c4cdd1be05711452dbda6e3b015b37926fa804851bdad6a8_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-33810"
},
{
"category": "external",
"summary": "RHBZ#2456335",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2456335"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-33810",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33810"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-33810",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33810"
},
{
"category": "external",
"summary": "https://go.dev/cl/763763",
"url": "https://go.dev/cl/763763"
},
{
"category": "external",
"summary": "https://go.dev/issue/78332",
"url": "https://go.dev/issue/78332"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU",
"url": "https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4866",
"url": "https://pkg.go.dev/vuln/GO-2026-4866"
}
],
"release_date": "2026-04-08T01:06:56.546000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-23T14:13:54+00:00",
"details": "It is recommended that existing users of Red Hat OpenShift Builds 1.7.1 upgrades to to 1.7.2",
"product_ids": [
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:153f9e059139e6dbaeb2e5166d21bfeec59a59aa5cd8045e11dbfa091479b4bb_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:b2173caa314ae26d2a300f61cfa94031c34fe7676fd007418849212082db3636_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:cd9ada6b38c080eec45e1d053ec305dde2d574899019ffb01a28dbe1dd582912_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:f17eb032f7250aa4a3bb99e2754fa4cb0dbfc9fbbb8c787f70ad30b71b27b5a2_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:10158"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5008dcb0428a0837b9abd827963e7008c8e16af8cfcbd432421286fca63fe714_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:5856cba3fe26ab7f756ba93e06caa6e522336ff36ff4c515132a8d35c85a2f64_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:6ddf185f2714d45fab92c831bf32673da55c7a43dbcf1bd22090b203791e03b2_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:eb32b129ea6a10b4aada4313ff11b04c33b99877eea9a5e567245d361d69f140_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:165f6085028f3859f6ede9176d413274ee1a457b72cd9c437795146c20b0722c_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:7a39f26f51bcbb4ef395208db01e2b0ee8b1fe9b15b3701c9c35d8f636f790d9_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:a4d609ff22b610b625a74fffd22883d5debe93c2e0c6ae2bcbbfd8f5f6b2cf12_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:ec02f5f031fefd5a610b69a81be5350f96e54511e2d2c619e8b9fe8f193297b6_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:0070df2a8c7882ae021000c498ead96b19f1bd6819e46657d5898cb71e6ec506_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:4b578a8ef1579d7168b7f0a1b7cebe66213003f8225a86cfdd4c9f24a5e2d871_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:8d6371a5fe374e3bc5c19a930ea712d266fab13a722768204b128bc71e928c97_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:985b19d79b3e54fc8b99b9b0239b74dcf6d0102d3ff0cd5363ae4627069d2ee1_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:2a0a6ea6465a6d165f072ef782a1825cc16ecfb2f8c58d5ec58c1d40d02e5208_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:679b470190ff7a7fc04e283884be4f24d1b0c475d0730fb718f2f45c60551b61_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:9734d0dc0367884e128837b7d02038a3b4136c4865ed3dc90902801393e178b4_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:f5f35702e424cd4e9b768c59d44928844b2d09fbb98d368ae7b54b7ec0771d13_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:093834bac2e2f7f01968ef542b9bcbf5fbe530c9f0dd86521825797abb4a33a2_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:190edd3effb60c56c885fc964d3eb48076293e1e43d745c4615ed00ef7daa145_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:382be8775c61942123adac2acec9f48085ebf7fd2b286c20e36a33ea6462baa7_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:5e83175abaef1e3046bac94621a86e036317833c740cdd6d235f1133a1388dd3_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:7173a298b07cbde3cd9ff12ca25f26ccf79b9ff8cfcb35a001c9f8c0b0291436_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:16cf5e33f297c027686d3ba9c6cbb01dba7a39299e2765fe4eaacc892b32f0d1_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:4715242f98234d2018f8317d9a57f63ff23b4d63be96491d55af2a2ef4572261_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:678c8d38900d994c4aa2e23669b7901747028690a4c5e4ba9aced4cbfe22b248_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:b39a2930e310d432a840798f03f7e55b8da42ff16ccda31790f85558d2be2537_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:1d01e27a3cdea6c99a985b877e29629d1c1fb00203f4a90c45db6df7a602e2cc_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:88b38ad10068e0574d2e5934849b98429c69305633b42aa4d19822ede2a6e10d_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:b020334c46f2d7276ba0c3aa8be7951254b197b2da310f0c22d2e16681a6a265_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:f2c222424cd66659ebea6787b6934c2d01d9eeb4f7db03ebfa16ab7b65aeb5b2_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:153f9e059139e6dbaeb2e5166d21bfeec59a59aa5cd8045e11dbfa091479b4bb_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:b2173caa314ae26d2a300f61cfa94031c34fe7676fd007418849212082db3636_s390x",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:cd9ada6b38c080eec45e1d053ec305dde2d574899019ffb01a28dbe1dd582912_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:f17eb032f7250aa4a3bb99e2754fa4cb0dbfc9fbbb8c787f70ad30b71b27b5a2_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1a57b53f8642ccb95884687efc251ad52e8ee3e718b55d0f4d21f800dfd3f5fa_arm64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:6234cfecf4dd75b8c4ff1c527ad4eb306d966cfa0170ecdb8ea4bc69c2cdc495_amd64",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:779e75a94141db7f8223b9861ba2fa3ba8baf6fa470bb0ab109945d75e20121b_ppc64le",
"Red Hat OpenShift Builds 1.7.2:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:e593bebc4e753ac3c4cdd1be05711452dbda6e3b015b37926fa804851bdad6a8_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Go crypto/x509: Certificate validation bypass due to incorrect DNS constraint application"
}
]
}
RHSA-2026:10155
Vulnerability from csaf_redhat - Published: 2026-04-23 13:57 - Updated: 2026-05-04 08:25A flaw was found in gRPC-Go, the Go language implementation of gRPC. This vulnerability, an authorization bypass, is caused by improper input validation of the HTTP/2 `:path` pseudo-header. A remote attacker can exploit this by sending raw HTTP/2 frames with a malformed `:path` that omits the mandatory leading slash. This allows the attacker to bypass defined security policies, potentially leading to unauthorized access to services or information disclosure.
A flaw was found in Tekton Pipelines, specifically in the Tekton Pipelines git resolver. A tenant with permissions to create ResolutionRequests can exploit a path traversal vulnerability via the `pathInRepo` parameter. This allows the tenant to read arbitrary files from the resolver pod's filesystem, leading to information disclosure, including sensitive ServiceAccount tokens. The contents of these files are returned in a base64-encoded format.
A flaw was found in the `crypto/x509` package within Go (golang). When verifying a certificate chain, excluded DNS (Domain Name System) constraints are not correctly applied to wildcard DNS Subject Alternative Names (SANs) if the case of the SAN differs from the constraint. This oversight could allow an attacker to bypass certificate validation, potentially leading to the acceptance of a malicious certificate that should have been rejected. This issue specifically impacts the validation of trusted certificate chains.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Builds 1.6.5",
"title": "Topic"
},
{
"category": "general",
"text": "Releases of Red Hat OpenShift Builds 1.6.5",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:10155",
"url": "https://access.redhat.com/errata/RHSA-2026:10155"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-33186",
"url": "https://access.redhat.com/security/cve/CVE-2026-33186"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-33211",
"url": "https://access.redhat.com/security/cve/CVE-2026-33211"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-33810",
"url": "https://access.redhat.com/security/cve/CVE-2026-33810"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/builds_for_red_hat_openshift/1.6",
"url": "https://docs.redhat.com/en/documentation/builds_for_red_hat_openshift/1.6"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_10155.json"
}
],
"title": "Red Hat Security Advisory: Red Hat OpenShift Builds 1.6.5",
"tracking": {
"current_release_date": "2026-05-04T08:25:16+00:00",
"generator": {
"date": "2026-05-04T08:25:16+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.7"
}
},
"id": "RHSA-2026:10155",
"initial_release_date": "2026-04-23T13:57:56+00:00",
"revision_history": [
{
"date": "2026-04-23T13:57:56+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-04-23T13:58:03+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-05-04T08:25:16+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Builds 1.6.5",
"product": {
"name": "Red Hat OpenShift Builds 1.6.5",
"product_id": "Red Hat OpenShift Builds 1.6.5",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift_builds:1.6::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Builds"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:2c6b079cf3184539f06634afcb35784ac74110c04fec36dfa80c2b0789d9099d_amd64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:2c6b079cf3184539f06634afcb35784ac74110c04fec36dfa80c2b0789d9099d_amd64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:2c6b079cf3184539f06634afcb35784ac74110c04fec36dfa80c2b0789d9099d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-controller-rhel9@sha256%3A2c6b079cf3184539f06634afcb35784ac74110c04fec36dfa80c2b0789d9099d?arch=amd64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776849392"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:64d5bfb3e3a9861b3cefdb49c0f9b286aad11ccb31867092de08e48630694f82_amd64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:64d5bfb3e3a9861b3cefdb49c0f9b286aad11ccb31867092de08e48630694f82_amd64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:64d5bfb3e3a9861b3cefdb49c0f9b286aad11ccb31867092de08e48630694f82_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-git-cloner-rhel9@sha256%3A64d5bfb3e3a9861b3cefdb49c0f9b286aad11ccb31867092de08e48630694f82?arch=amd64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776847748"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:a22a2cca1f48ee743a15c68ca22d1d76943c25b2069e80a4bc1275c8157284db_amd64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:a22a2cca1f48ee743a15c68ca22d1d76943c25b2069e80a4bc1275c8157284db_amd64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:a22a2cca1f48ee743a15c68ca22d1d76943c25b2069e80a4bc1275c8157284db_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-image-bundler-rhel9@sha256%3Aa22a2cca1f48ee743a15c68ca22d1d76943c25b2069e80a4bc1275c8157284db?arch=amd64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776848853"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:549f2d54aaa66f9ab68e08f49e4f0cd95ffbbc93607ef7a112b74b177e57cfd0_amd64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:549f2d54aaa66f9ab68e08f49e4f0cd95ffbbc93607ef7a112b74b177e57cfd0_amd64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:549f2d54aaa66f9ab68e08f49e4f0cd95ffbbc93607ef7a112b74b177e57cfd0_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-image-processing-rhel9@sha256%3A549f2d54aaa66f9ab68e08f49e4f0cd95ffbbc93607ef7a112b74b177e57cfd0?arch=amd64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776846586"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:1c0d155195bfd251b40da10e153c8a738250f14253f337b198476740cb7bd81a_amd64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:1c0d155195bfd251b40da10e153c8a738250f14253f337b198476740cb7bd81a_amd64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:1c0d155195bfd251b40da10e153c8a738250f14253f337b198476740cb7bd81a_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-rhel9-operator@sha256%3A1c0d155195bfd251b40da10e153c8a738250f14253f337b198476740cb7bd81a?arch=amd64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776859898"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:60bfc1aeb95ff74fd2d8bd29700994594c92b93795b63f02fd0d7bb2d3d6fba7_amd64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:60bfc1aeb95ff74fd2d8bd29700994594c92b93795b63f02fd0d7bb2d3d6fba7_amd64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:60bfc1aeb95ff74fd2d8bd29700994594c92b93795b63f02fd0d7bb2d3d6fba7_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-operator-bundle@sha256%3A60bfc1aeb95ff74fd2d8bd29700994594c92b93795b63f02fd0d7bb2d3d6fba7?arch=amd64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776937737"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:f54ab8388a0f593c2426c240c7d50fd7f3f2263e1c88f7726dbbe2ebbed38896_amd64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:f54ab8388a0f593c2426c240c7d50fd7f3f2263e1c88f7726dbbe2ebbed38896_amd64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:f54ab8388a0f593c2426c240c7d50fd7f3f2263e1c88f7726dbbe2ebbed38896_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-shared-resource-rhel9@sha256%3Af54ab8388a0f593c2426c240c7d50fd7f3f2263e1c88f7726dbbe2ebbed38896?arch=amd64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776852121"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:0d629bbf41a55434b40545e12c5f0d95e357b0fd74303feec657918b90321642_amd64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:0d629bbf41a55434b40545e12c5f0d95e357b0fd74303feec657918b90321642_amd64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:0d629bbf41a55434b40545e12c5f0d95e357b0fd74303feec657918b90321642_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-shared-resource-webhook-rhel9@sha256%3A0d629bbf41a55434b40545e12c5f0d95e357b0fd74303feec657918b90321642?arch=amd64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776851845"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:71f49240685245565f35d7d4b6d7d55b442cb61bc7c0f4d25c5529ca9187ae9f_amd64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:71f49240685245565f35d7d4b6d7d55b442cb61bc7c0f4d25c5529ca9187ae9f_amd64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:71f49240685245565f35d7d4b6d7d55b442cb61bc7c0f4d25c5529ca9187ae9f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-waiters-rhel9@sha256%3A71f49240685245565f35d7d4b6d7d55b442cb61bc7c0f4d25c5529ca9187ae9f?arch=amd64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776847666"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:c6491240cf919793d2d0646e7cd505f7c45f18655c600593e06c98324bf0dc71_amd64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:c6491240cf919793d2d0646e7cd505f7c45f18655c600593e06c98324bf0dc71_amd64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:c6491240cf919793d2d0646e7cd505f7c45f18655c600593e06c98324bf0dc71_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-webhook-rhel9@sha256%3Ac6491240cf919793d2d0646e7cd505f7c45f18655c600593e06c98324bf0dc71?arch=amd64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776848251"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:092c9b4af55870d904beac952acf0fd914a2e784472888bb9f2c108548ff4906_arm64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:092c9b4af55870d904beac952acf0fd914a2e784472888bb9f2c108548ff4906_arm64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:092c9b4af55870d904beac952acf0fd914a2e784472888bb9f2c108548ff4906_arm64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-controller-rhel9@sha256%3A092c9b4af55870d904beac952acf0fd914a2e784472888bb9f2c108548ff4906?arch=arm64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776849392"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:31af187e314a843c4c02edd119d5edc2c260baca4d9a4ec2347f80f5511d6d3f_arm64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:31af187e314a843c4c02edd119d5edc2c260baca4d9a4ec2347f80f5511d6d3f_arm64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:31af187e314a843c4c02edd119d5edc2c260baca4d9a4ec2347f80f5511d6d3f_arm64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-git-cloner-rhel9@sha256%3A31af187e314a843c4c02edd119d5edc2c260baca4d9a4ec2347f80f5511d6d3f?arch=arm64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776847748"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:596cfba3fdac5cd9ee725f6b9e0bc640eaf7e933d019d9d57ea840592ec72f23_arm64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:596cfba3fdac5cd9ee725f6b9e0bc640eaf7e933d019d9d57ea840592ec72f23_arm64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:596cfba3fdac5cd9ee725f6b9e0bc640eaf7e933d019d9d57ea840592ec72f23_arm64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-image-bundler-rhel9@sha256%3A596cfba3fdac5cd9ee725f6b9e0bc640eaf7e933d019d9d57ea840592ec72f23?arch=arm64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776848853"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:c95f763b803f53276670cea4fdf289983e472361a00a6d7da0bb56b3e857a935_arm64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:c95f763b803f53276670cea4fdf289983e472361a00a6d7da0bb56b3e857a935_arm64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:c95f763b803f53276670cea4fdf289983e472361a00a6d7da0bb56b3e857a935_arm64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-image-processing-rhel9@sha256%3Ac95f763b803f53276670cea4fdf289983e472361a00a6d7da0bb56b3e857a935?arch=arm64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776846586"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:5d08c7ee6886747dc077faa7f1e4e696b5ad29cc4dcc8fd2c4f3d7a434f47f9b_arm64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:5d08c7ee6886747dc077faa7f1e4e696b5ad29cc4dcc8fd2c4f3d7a434f47f9b_arm64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:5d08c7ee6886747dc077faa7f1e4e696b5ad29cc4dcc8fd2c4f3d7a434f47f9b_arm64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-rhel9-operator@sha256%3A5d08c7ee6886747dc077faa7f1e4e696b5ad29cc4dcc8fd2c4f3d7a434f47f9b?arch=arm64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776859898"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:d6401dc97f1adeafcfb8a34e3c1fe8230cd2ca6bb7c4245ef875a4b3fa35b014_arm64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:d6401dc97f1adeafcfb8a34e3c1fe8230cd2ca6bb7c4245ef875a4b3fa35b014_arm64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:d6401dc97f1adeafcfb8a34e3c1fe8230cd2ca6bb7c4245ef875a4b3fa35b014_arm64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-shared-resource-rhel9@sha256%3Ad6401dc97f1adeafcfb8a34e3c1fe8230cd2ca6bb7c4245ef875a4b3fa35b014?arch=arm64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776852121"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:d69d7290c5e07301e9397df551e97d8d81795ba7c711d95f60bd178fc39f1434_arm64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:d69d7290c5e07301e9397df551e97d8d81795ba7c711d95f60bd178fc39f1434_arm64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:d69d7290c5e07301e9397df551e97d8d81795ba7c711d95f60bd178fc39f1434_arm64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-shared-resource-webhook-rhel9@sha256%3Ad69d7290c5e07301e9397df551e97d8d81795ba7c711d95f60bd178fc39f1434?arch=arm64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776851845"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:c44d2ad3d716e7c753ec538654d25c42d80539071f1d5f81df4a8fd5e76c7a58_arm64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:c44d2ad3d716e7c753ec538654d25c42d80539071f1d5f81df4a8fd5e76c7a58_arm64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:c44d2ad3d716e7c753ec538654d25c42d80539071f1d5f81df4a8fd5e76c7a58_arm64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-waiters-rhel9@sha256%3Ac44d2ad3d716e7c753ec538654d25c42d80539071f1d5f81df4a8fd5e76c7a58?arch=arm64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776847666"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:3b1112d42f42c721287e1da5e5a87b6832889ed532b1acae27caeb64f1bb44f9_arm64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:3b1112d42f42c721287e1da5e5a87b6832889ed532b1acae27caeb64f1bb44f9_arm64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:3b1112d42f42c721287e1da5e5a87b6832889ed532b1acae27caeb64f1bb44f9_arm64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-webhook-rhel9@sha256%3A3b1112d42f42c721287e1da5e5a87b6832889ed532b1acae27caeb64f1bb44f9?arch=arm64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776848251"
}
}
}
],
"category": "architecture",
"name": "arm64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:25a9ca58f1104d83e0e312baf241f3eb048220c22a0065eed70106d9991faea4_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:25a9ca58f1104d83e0e312baf241f3eb048220c22a0065eed70106d9991faea4_ppc64le",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:25a9ca58f1104d83e0e312baf241f3eb048220c22a0065eed70106d9991faea4_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-controller-rhel9@sha256%3A25a9ca58f1104d83e0e312baf241f3eb048220c22a0065eed70106d9991faea4?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776849392"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:355cfa27d099cce3743ffa8432d2070ae3f21a446b560f6c1c5146b7351d116a_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:355cfa27d099cce3743ffa8432d2070ae3f21a446b560f6c1c5146b7351d116a_ppc64le",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:355cfa27d099cce3743ffa8432d2070ae3f21a446b560f6c1c5146b7351d116a_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-git-cloner-rhel9@sha256%3A355cfa27d099cce3743ffa8432d2070ae3f21a446b560f6c1c5146b7351d116a?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776847748"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:3d20f5041cd11c838fc15148f60650ae0824b4c7816eb50152a28693443b0cd0_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:3d20f5041cd11c838fc15148f60650ae0824b4c7816eb50152a28693443b0cd0_ppc64le",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:3d20f5041cd11c838fc15148f60650ae0824b4c7816eb50152a28693443b0cd0_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-image-bundler-rhel9@sha256%3A3d20f5041cd11c838fc15148f60650ae0824b4c7816eb50152a28693443b0cd0?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776848853"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:5664f48403387a9e64370337d3ea5eb30ec27336f6e8f47a3a8a3ba0fe96741c_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:5664f48403387a9e64370337d3ea5eb30ec27336f6e8f47a3a8a3ba0fe96741c_ppc64le",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:5664f48403387a9e64370337d3ea5eb30ec27336f6e8f47a3a8a3ba0fe96741c_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-image-processing-rhel9@sha256%3A5664f48403387a9e64370337d3ea5eb30ec27336f6e8f47a3a8a3ba0fe96741c?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776846586"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:e1cdb58bf2783a9a50346e1690f51b09e175c8ebb737b11332658d85bcb645e9_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:e1cdb58bf2783a9a50346e1690f51b09e175c8ebb737b11332658d85bcb645e9_ppc64le",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:e1cdb58bf2783a9a50346e1690f51b09e175c8ebb737b11332658d85bcb645e9_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-rhel9-operator@sha256%3Ae1cdb58bf2783a9a50346e1690f51b09e175c8ebb737b11332658d85bcb645e9?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776859898"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:c5083edbd43692dc5ef5b0cf14417eea19412c0927ede39a87ade36515cf16f1_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:c5083edbd43692dc5ef5b0cf14417eea19412c0927ede39a87ade36515cf16f1_ppc64le",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:c5083edbd43692dc5ef5b0cf14417eea19412c0927ede39a87ade36515cf16f1_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-shared-resource-rhel9@sha256%3Ac5083edbd43692dc5ef5b0cf14417eea19412c0927ede39a87ade36515cf16f1?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776852121"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:e095cffba13badc4aab65f9920f8e618c9fe4411d6d53d8b160716a31fe2d6e7_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:e095cffba13badc4aab65f9920f8e618c9fe4411d6d53d8b160716a31fe2d6e7_ppc64le",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:e095cffba13badc4aab65f9920f8e618c9fe4411d6d53d8b160716a31fe2d6e7_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-shared-resource-webhook-rhel9@sha256%3Ae095cffba13badc4aab65f9920f8e618c9fe4411d6d53d8b160716a31fe2d6e7?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776851845"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:78775c452a2c5ddb3568b677c2790815fb2a2d6afacbfacccdaf68b79c8fe39c_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:78775c452a2c5ddb3568b677c2790815fb2a2d6afacbfacccdaf68b79c8fe39c_ppc64le",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:78775c452a2c5ddb3568b677c2790815fb2a2d6afacbfacccdaf68b79c8fe39c_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-waiters-rhel9@sha256%3A78775c452a2c5ddb3568b677c2790815fb2a2d6afacbfacccdaf68b79c8fe39c?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776847666"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:b3ac0453a1d16b2a9d1314991cd7642d637c5d9af3e884aabd88e4e9b73c59c6_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:b3ac0453a1d16b2a9d1314991cd7642d637c5d9af3e884aabd88e4e9b73c59c6_ppc64le",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:b3ac0453a1d16b2a9d1314991cd7642d637c5d9af3e884aabd88e4e9b73c59c6_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-webhook-rhel9@sha256%3Ab3ac0453a1d16b2a9d1314991cd7642d637c5d9af3e884aabd88e4e9b73c59c6?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776848251"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:7b579fdc1d1dca3f32c2172eddb899ef3f8ff39d7af5cbed854d48e1d9e27675_s390x",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:7b579fdc1d1dca3f32c2172eddb899ef3f8ff39d7af5cbed854d48e1d9e27675_s390x",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:7b579fdc1d1dca3f32c2172eddb899ef3f8ff39d7af5cbed854d48e1d9e27675_s390x",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-controller-rhel9@sha256%3A7b579fdc1d1dca3f32c2172eddb899ef3f8ff39d7af5cbed854d48e1d9e27675?arch=s390x\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776849392"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:2a33081f6d32826d53821e1aea686e1a6e8cb30fea8e601c00729c06511b98c6_s390x",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:2a33081f6d32826d53821e1aea686e1a6e8cb30fea8e601c00729c06511b98c6_s390x",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:2a33081f6d32826d53821e1aea686e1a6e8cb30fea8e601c00729c06511b98c6_s390x",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-git-cloner-rhel9@sha256%3A2a33081f6d32826d53821e1aea686e1a6e8cb30fea8e601c00729c06511b98c6?arch=s390x\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776847748"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:a9d691eec41e370daff6737ed9d0b8c018b5426ff195b77897fd579846858e39_s390x",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:a9d691eec41e370daff6737ed9d0b8c018b5426ff195b77897fd579846858e39_s390x",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:a9d691eec41e370daff6737ed9d0b8c018b5426ff195b77897fd579846858e39_s390x",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-image-bundler-rhel9@sha256%3Aa9d691eec41e370daff6737ed9d0b8c018b5426ff195b77897fd579846858e39?arch=s390x\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776848853"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:54890d05d56aeee46f051f42959500e00f2c748e9fdb2f1100226d8b4b976a47_s390x",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:54890d05d56aeee46f051f42959500e00f2c748e9fdb2f1100226d8b4b976a47_s390x",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:54890d05d56aeee46f051f42959500e00f2c748e9fdb2f1100226d8b4b976a47_s390x",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-image-processing-rhel9@sha256%3A54890d05d56aeee46f051f42959500e00f2c748e9fdb2f1100226d8b4b976a47?arch=s390x\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776846586"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:26fdde499994a4be0eb277bbbca899061384f20673672ef30ed301d792b3108d_s390x",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:26fdde499994a4be0eb277bbbca899061384f20673672ef30ed301d792b3108d_s390x",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:26fdde499994a4be0eb277bbbca899061384f20673672ef30ed301d792b3108d_s390x",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-rhel9-operator@sha256%3A26fdde499994a4be0eb277bbbca899061384f20673672ef30ed301d792b3108d?arch=s390x\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776859898"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:d56042518051b3e4dbef3da9f13d74fd8e8a6b9ad8520965052f1522247b70ef_s390x",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:d56042518051b3e4dbef3da9f13d74fd8e8a6b9ad8520965052f1522247b70ef_s390x",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:d56042518051b3e4dbef3da9f13d74fd8e8a6b9ad8520965052f1522247b70ef_s390x",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-shared-resource-rhel9@sha256%3Ad56042518051b3e4dbef3da9f13d74fd8e8a6b9ad8520965052f1522247b70ef?arch=s390x\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776852121"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:7d6aecb4a7e98dcabc77c3043e214bec9fa521af9c6a048ece876ba9f294dce8_s390x",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:7d6aecb4a7e98dcabc77c3043e214bec9fa521af9c6a048ece876ba9f294dce8_s390x",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:7d6aecb4a7e98dcabc77c3043e214bec9fa521af9c6a048ece876ba9f294dce8_s390x",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-shared-resource-webhook-rhel9@sha256%3A7d6aecb4a7e98dcabc77c3043e214bec9fa521af9c6a048ece876ba9f294dce8?arch=s390x\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776851845"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:f4752a62de9c94e0f84aaa6cddfeb4a5cbecab6c83147b72b6f05ddef23fe192_s390x",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:f4752a62de9c94e0f84aaa6cddfeb4a5cbecab6c83147b72b6f05ddef23fe192_s390x",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:f4752a62de9c94e0f84aaa6cddfeb4a5cbecab6c83147b72b6f05ddef23fe192_s390x",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-waiters-rhel9@sha256%3Af4752a62de9c94e0f84aaa6cddfeb4a5cbecab6c83147b72b6f05ddef23fe192?arch=s390x\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776847666"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:26f519f9f0e7e41f7f6b12bfd2f968bfb5196f05781493752e17a85d09b0b976_s390x",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:26f519f9f0e7e41f7f6b12bfd2f968bfb5196f05781493752e17a85d09b0b976_s390x",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:26f519f9f0e7e41f7f6b12bfd2f968bfb5196f05781493752e17a85d09b0b976_s390x",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-webhook-rhel9@sha256%3A26f519f9f0e7e41f7f6b12bfd2f968bfb5196f05781493752e17a85d09b0b976?arch=s390x\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1776848251"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:092c9b4af55870d904beac952acf0fd914a2e784472888bb9f2c108548ff4906_arm64 as a component of Red Hat OpenShift Builds 1.6.5",
"product_id": "Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:092c9b4af55870d904beac952acf0fd914a2e784472888bb9f2c108548ff4906_arm64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:092c9b4af55870d904beac952acf0fd914a2e784472888bb9f2c108548ff4906_arm64",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.6.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:25a9ca58f1104d83e0e312baf241f3eb048220c22a0065eed70106d9991faea4_ppc64le as a component of Red Hat OpenShift Builds 1.6.5",
"product_id": "Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:25a9ca58f1104d83e0e312baf241f3eb048220c22a0065eed70106d9991faea4_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:25a9ca58f1104d83e0e312baf241f3eb048220c22a0065eed70106d9991faea4_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.6.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:2c6b079cf3184539f06634afcb35784ac74110c04fec36dfa80c2b0789d9099d_amd64 as a component of Red Hat OpenShift Builds 1.6.5",
"product_id": "Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:2c6b079cf3184539f06634afcb35784ac74110c04fec36dfa80c2b0789d9099d_amd64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:2c6b079cf3184539f06634afcb35784ac74110c04fec36dfa80c2b0789d9099d_amd64",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.6.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:7b579fdc1d1dca3f32c2172eddb899ef3f8ff39d7af5cbed854d48e1d9e27675_s390x as a component of Red Hat OpenShift Builds 1.6.5",
"product_id": "Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:7b579fdc1d1dca3f32c2172eddb899ef3f8ff39d7af5cbed854d48e1d9e27675_s390x"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:7b579fdc1d1dca3f32c2172eddb899ef3f8ff39d7af5cbed854d48e1d9e27675_s390x",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.6.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:2a33081f6d32826d53821e1aea686e1a6e8cb30fea8e601c00729c06511b98c6_s390x as a component of Red Hat OpenShift Builds 1.6.5",
"product_id": "Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:2a33081f6d32826d53821e1aea686e1a6e8cb30fea8e601c00729c06511b98c6_s390x"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:2a33081f6d32826d53821e1aea686e1a6e8cb30fea8e601c00729c06511b98c6_s390x",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.6.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:31af187e314a843c4c02edd119d5edc2c260baca4d9a4ec2347f80f5511d6d3f_arm64 as a component of Red Hat OpenShift Builds 1.6.5",
"product_id": "Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:31af187e314a843c4c02edd119d5edc2c260baca4d9a4ec2347f80f5511d6d3f_arm64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:31af187e314a843c4c02edd119d5edc2c260baca4d9a4ec2347f80f5511d6d3f_arm64",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.6.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:355cfa27d099cce3743ffa8432d2070ae3f21a446b560f6c1c5146b7351d116a_ppc64le as a component of Red Hat OpenShift Builds 1.6.5",
"product_id": "Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:355cfa27d099cce3743ffa8432d2070ae3f21a446b560f6c1c5146b7351d116a_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:355cfa27d099cce3743ffa8432d2070ae3f21a446b560f6c1c5146b7351d116a_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.6.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:64d5bfb3e3a9861b3cefdb49c0f9b286aad11ccb31867092de08e48630694f82_amd64 as a component of Red Hat OpenShift Builds 1.6.5",
"product_id": "Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:64d5bfb3e3a9861b3cefdb49c0f9b286aad11ccb31867092de08e48630694f82_amd64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:64d5bfb3e3a9861b3cefdb49c0f9b286aad11ccb31867092de08e48630694f82_amd64",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.6.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:3d20f5041cd11c838fc15148f60650ae0824b4c7816eb50152a28693443b0cd0_ppc64le as a component of Red Hat OpenShift Builds 1.6.5",
"product_id": "Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:3d20f5041cd11c838fc15148f60650ae0824b4c7816eb50152a28693443b0cd0_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:3d20f5041cd11c838fc15148f60650ae0824b4c7816eb50152a28693443b0cd0_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.6.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:596cfba3fdac5cd9ee725f6b9e0bc640eaf7e933d019d9d57ea840592ec72f23_arm64 as a component of Red Hat OpenShift Builds 1.6.5",
"product_id": "Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:596cfba3fdac5cd9ee725f6b9e0bc640eaf7e933d019d9d57ea840592ec72f23_arm64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:596cfba3fdac5cd9ee725f6b9e0bc640eaf7e933d019d9d57ea840592ec72f23_arm64",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.6.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:a22a2cca1f48ee743a15c68ca22d1d76943c25b2069e80a4bc1275c8157284db_amd64 as a component of Red Hat OpenShift Builds 1.6.5",
"product_id": "Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:a22a2cca1f48ee743a15c68ca22d1d76943c25b2069e80a4bc1275c8157284db_amd64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:a22a2cca1f48ee743a15c68ca22d1d76943c25b2069e80a4bc1275c8157284db_amd64",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.6.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:a9d691eec41e370daff6737ed9d0b8c018b5426ff195b77897fd579846858e39_s390x as a component of Red Hat OpenShift Builds 1.6.5",
"product_id": "Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:a9d691eec41e370daff6737ed9d0b8c018b5426ff195b77897fd579846858e39_s390x"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:a9d691eec41e370daff6737ed9d0b8c018b5426ff195b77897fd579846858e39_s390x",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.6.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:54890d05d56aeee46f051f42959500e00f2c748e9fdb2f1100226d8b4b976a47_s390x as a component of Red Hat OpenShift Builds 1.6.5",
"product_id": "Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:54890d05d56aeee46f051f42959500e00f2c748e9fdb2f1100226d8b4b976a47_s390x"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:54890d05d56aeee46f051f42959500e00f2c748e9fdb2f1100226d8b4b976a47_s390x",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.6.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:549f2d54aaa66f9ab68e08f49e4f0cd95ffbbc93607ef7a112b74b177e57cfd0_amd64 as a component of Red Hat OpenShift Builds 1.6.5",
"product_id": "Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:549f2d54aaa66f9ab68e08f49e4f0cd95ffbbc93607ef7a112b74b177e57cfd0_amd64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:549f2d54aaa66f9ab68e08f49e4f0cd95ffbbc93607ef7a112b74b177e57cfd0_amd64",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.6.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:5664f48403387a9e64370337d3ea5eb30ec27336f6e8f47a3a8a3ba0fe96741c_ppc64le as a component of Red Hat OpenShift Builds 1.6.5",
"product_id": "Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:5664f48403387a9e64370337d3ea5eb30ec27336f6e8f47a3a8a3ba0fe96741c_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:5664f48403387a9e64370337d3ea5eb30ec27336f6e8f47a3a8a3ba0fe96741c_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.6.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:c95f763b803f53276670cea4fdf289983e472361a00a6d7da0bb56b3e857a935_arm64 as a component of Red Hat OpenShift Builds 1.6.5",
"product_id": "Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:c95f763b803f53276670cea4fdf289983e472361a00a6d7da0bb56b3e857a935_arm64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:c95f763b803f53276670cea4fdf289983e472361a00a6d7da0bb56b3e857a935_arm64",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.6.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:60bfc1aeb95ff74fd2d8bd29700994594c92b93795b63f02fd0d7bb2d3d6fba7_amd64 as a component of Red Hat OpenShift Builds 1.6.5",
"product_id": "Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:60bfc1aeb95ff74fd2d8bd29700994594c92b93795b63f02fd0d7bb2d3d6fba7_amd64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:60bfc1aeb95ff74fd2d8bd29700994594c92b93795b63f02fd0d7bb2d3d6fba7_amd64",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.6.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:1c0d155195bfd251b40da10e153c8a738250f14253f337b198476740cb7bd81a_amd64 as a component of Red Hat OpenShift Builds 1.6.5",
"product_id": "Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:1c0d155195bfd251b40da10e153c8a738250f14253f337b198476740cb7bd81a_amd64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:1c0d155195bfd251b40da10e153c8a738250f14253f337b198476740cb7bd81a_amd64",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.6.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:26fdde499994a4be0eb277bbbca899061384f20673672ef30ed301d792b3108d_s390x as a component of Red Hat OpenShift Builds 1.6.5",
"product_id": "Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:26fdde499994a4be0eb277bbbca899061384f20673672ef30ed301d792b3108d_s390x"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:26fdde499994a4be0eb277bbbca899061384f20673672ef30ed301d792b3108d_s390x",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.6.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:5d08c7ee6886747dc077faa7f1e4e696b5ad29cc4dcc8fd2c4f3d7a434f47f9b_arm64 as a component of Red Hat OpenShift Builds 1.6.5",
"product_id": "Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:5d08c7ee6886747dc077faa7f1e4e696b5ad29cc4dcc8fd2c4f3d7a434f47f9b_arm64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:5d08c7ee6886747dc077faa7f1e4e696b5ad29cc4dcc8fd2c4f3d7a434f47f9b_arm64",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.6.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:e1cdb58bf2783a9a50346e1690f51b09e175c8ebb737b11332658d85bcb645e9_ppc64le as a component of Red Hat OpenShift Builds 1.6.5",
"product_id": "Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:e1cdb58bf2783a9a50346e1690f51b09e175c8ebb737b11332658d85bcb645e9_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:e1cdb58bf2783a9a50346e1690f51b09e175c8ebb737b11332658d85bcb645e9_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.6.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:c5083edbd43692dc5ef5b0cf14417eea19412c0927ede39a87ade36515cf16f1_ppc64le as a component of Red Hat OpenShift Builds 1.6.5",
"product_id": "Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:c5083edbd43692dc5ef5b0cf14417eea19412c0927ede39a87ade36515cf16f1_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:c5083edbd43692dc5ef5b0cf14417eea19412c0927ede39a87ade36515cf16f1_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.6.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:d56042518051b3e4dbef3da9f13d74fd8e8a6b9ad8520965052f1522247b70ef_s390x as a component of Red Hat OpenShift Builds 1.6.5",
"product_id": "Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:d56042518051b3e4dbef3da9f13d74fd8e8a6b9ad8520965052f1522247b70ef_s390x"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:d56042518051b3e4dbef3da9f13d74fd8e8a6b9ad8520965052f1522247b70ef_s390x",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.6.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:d6401dc97f1adeafcfb8a34e3c1fe8230cd2ca6bb7c4245ef875a4b3fa35b014_arm64 as a component of Red Hat OpenShift Builds 1.6.5",
"product_id": "Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:d6401dc97f1adeafcfb8a34e3c1fe8230cd2ca6bb7c4245ef875a4b3fa35b014_arm64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:d6401dc97f1adeafcfb8a34e3c1fe8230cd2ca6bb7c4245ef875a4b3fa35b014_arm64",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.6.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:f54ab8388a0f593c2426c240c7d50fd7f3f2263e1c88f7726dbbe2ebbed38896_amd64 as a component of Red Hat OpenShift Builds 1.6.5",
"product_id": "Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:f54ab8388a0f593c2426c240c7d50fd7f3f2263e1c88f7726dbbe2ebbed38896_amd64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:f54ab8388a0f593c2426c240c7d50fd7f3f2263e1c88f7726dbbe2ebbed38896_amd64",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.6.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:0d629bbf41a55434b40545e12c5f0d95e357b0fd74303feec657918b90321642_amd64 as a component of Red Hat OpenShift Builds 1.6.5",
"product_id": "Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:0d629bbf41a55434b40545e12c5f0d95e357b0fd74303feec657918b90321642_amd64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:0d629bbf41a55434b40545e12c5f0d95e357b0fd74303feec657918b90321642_amd64",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.6.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:7d6aecb4a7e98dcabc77c3043e214bec9fa521af9c6a048ece876ba9f294dce8_s390x as a component of Red Hat OpenShift Builds 1.6.5",
"product_id": "Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:7d6aecb4a7e98dcabc77c3043e214bec9fa521af9c6a048ece876ba9f294dce8_s390x"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:7d6aecb4a7e98dcabc77c3043e214bec9fa521af9c6a048ece876ba9f294dce8_s390x",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.6.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:d69d7290c5e07301e9397df551e97d8d81795ba7c711d95f60bd178fc39f1434_arm64 as a component of Red Hat OpenShift Builds 1.6.5",
"product_id": "Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:d69d7290c5e07301e9397df551e97d8d81795ba7c711d95f60bd178fc39f1434_arm64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:d69d7290c5e07301e9397df551e97d8d81795ba7c711d95f60bd178fc39f1434_arm64",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.6.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:e095cffba13badc4aab65f9920f8e618c9fe4411d6d53d8b160716a31fe2d6e7_ppc64le as a component of Red Hat OpenShift Builds 1.6.5",
"product_id": "Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:e095cffba13badc4aab65f9920f8e618c9fe4411d6d53d8b160716a31fe2d6e7_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:e095cffba13badc4aab65f9920f8e618c9fe4411d6d53d8b160716a31fe2d6e7_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.6.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:71f49240685245565f35d7d4b6d7d55b442cb61bc7c0f4d25c5529ca9187ae9f_amd64 as a component of Red Hat OpenShift Builds 1.6.5",
"product_id": "Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:71f49240685245565f35d7d4b6d7d55b442cb61bc7c0f4d25c5529ca9187ae9f_amd64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:71f49240685245565f35d7d4b6d7d55b442cb61bc7c0f4d25c5529ca9187ae9f_amd64",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.6.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:78775c452a2c5ddb3568b677c2790815fb2a2d6afacbfacccdaf68b79c8fe39c_ppc64le as a component of Red Hat OpenShift Builds 1.6.5",
"product_id": "Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:78775c452a2c5ddb3568b677c2790815fb2a2d6afacbfacccdaf68b79c8fe39c_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:78775c452a2c5ddb3568b677c2790815fb2a2d6afacbfacccdaf68b79c8fe39c_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.6.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:c44d2ad3d716e7c753ec538654d25c42d80539071f1d5f81df4a8fd5e76c7a58_arm64 as a component of Red Hat OpenShift Builds 1.6.5",
"product_id": "Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:c44d2ad3d716e7c753ec538654d25c42d80539071f1d5f81df4a8fd5e76c7a58_arm64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:c44d2ad3d716e7c753ec538654d25c42d80539071f1d5f81df4a8fd5e76c7a58_arm64",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.6.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:f4752a62de9c94e0f84aaa6cddfeb4a5cbecab6c83147b72b6f05ddef23fe192_s390x as a component of Red Hat OpenShift Builds 1.6.5",
"product_id": "Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:f4752a62de9c94e0f84aaa6cddfeb4a5cbecab6c83147b72b6f05ddef23fe192_s390x"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:f4752a62de9c94e0f84aaa6cddfeb4a5cbecab6c83147b72b6f05ddef23fe192_s390x",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.6.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:26f519f9f0e7e41f7f6b12bfd2f968bfb5196f05781493752e17a85d09b0b976_s390x as a component of Red Hat OpenShift Builds 1.6.5",
"product_id": "Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:26f519f9f0e7e41f7f6b12bfd2f968bfb5196f05781493752e17a85d09b0b976_s390x"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:26f519f9f0e7e41f7f6b12bfd2f968bfb5196f05781493752e17a85d09b0b976_s390x",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.6.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:3b1112d42f42c721287e1da5e5a87b6832889ed532b1acae27caeb64f1bb44f9_arm64 as a component of Red Hat OpenShift Builds 1.6.5",
"product_id": "Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:3b1112d42f42c721287e1da5e5a87b6832889ed532b1acae27caeb64f1bb44f9_arm64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:3b1112d42f42c721287e1da5e5a87b6832889ed532b1acae27caeb64f1bb44f9_arm64",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.6.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:b3ac0453a1d16b2a9d1314991cd7642d637c5d9af3e884aabd88e4e9b73c59c6_ppc64le as a component of Red Hat OpenShift Builds 1.6.5",
"product_id": "Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:b3ac0453a1d16b2a9d1314991cd7642d637c5d9af3e884aabd88e4e9b73c59c6_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:b3ac0453a1d16b2a9d1314991cd7642d637c5d9af3e884aabd88e4e9b73c59c6_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.6.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:c6491240cf919793d2d0646e7cd505f7c45f18655c600593e06c98324bf0dc71_amd64 as a component of Red Hat OpenShift Builds 1.6.5",
"product_id": "Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:c6491240cf919793d2d0646e7cd505f7c45f18655c600593e06c98324bf0dc71_amd64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:c6491240cf919793d2d0646e7cd505f7c45f18655c600593e06c98324bf0dc71_amd64",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.6.5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-33186",
"cwe": {
"id": "CWE-551",
"name": "Incorrect Behavior Order: Authorization Before Parsing and Canonicalization"
},
"discovery_date": "2026-03-20T23:02:27.802640+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:092c9b4af55870d904beac952acf0fd914a2e784472888bb9f2c108548ff4906_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:25a9ca58f1104d83e0e312baf241f3eb048220c22a0065eed70106d9991faea4_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:2c6b079cf3184539f06634afcb35784ac74110c04fec36dfa80c2b0789d9099d_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:7b579fdc1d1dca3f32c2172eddb899ef3f8ff39d7af5cbed854d48e1d9e27675_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:2a33081f6d32826d53821e1aea686e1a6e8cb30fea8e601c00729c06511b98c6_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:31af187e314a843c4c02edd119d5edc2c260baca4d9a4ec2347f80f5511d6d3f_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:355cfa27d099cce3743ffa8432d2070ae3f21a446b560f6c1c5146b7351d116a_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:64d5bfb3e3a9861b3cefdb49c0f9b286aad11ccb31867092de08e48630694f82_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:3d20f5041cd11c838fc15148f60650ae0824b4c7816eb50152a28693443b0cd0_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:596cfba3fdac5cd9ee725f6b9e0bc640eaf7e933d019d9d57ea840592ec72f23_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:a22a2cca1f48ee743a15c68ca22d1d76943c25b2069e80a4bc1275c8157284db_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:a9d691eec41e370daff6737ed9d0b8c018b5426ff195b77897fd579846858e39_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:54890d05d56aeee46f051f42959500e00f2c748e9fdb2f1100226d8b4b976a47_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:549f2d54aaa66f9ab68e08f49e4f0cd95ffbbc93607ef7a112b74b177e57cfd0_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:5664f48403387a9e64370337d3ea5eb30ec27336f6e8f47a3a8a3ba0fe96741c_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:c95f763b803f53276670cea4fdf289983e472361a00a6d7da0bb56b3e857a935_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:60bfc1aeb95ff74fd2d8bd29700994594c92b93795b63f02fd0d7bb2d3d6fba7_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:71f49240685245565f35d7d4b6d7d55b442cb61bc7c0f4d25c5529ca9187ae9f_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:78775c452a2c5ddb3568b677c2790815fb2a2d6afacbfacccdaf68b79c8fe39c_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:c44d2ad3d716e7c753ec538654d25c42d80539071f1d5f81df4a8fd5e76c7a58_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:f4752a62de9c94e0f84aaa6cddfeb4a5cbecab6c83147b72b6f05ddef23fe192_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:26f519f9f0e7e41f7f6b12bfd2f968bfb5196f05781493752e17a85d09b0b976_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:3b1112d42f42c721287e1da5e5a87b6832889ed532b1acae27caeb64f1bb44f9_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:b3ac0453a1d16b2a9d1314991cd7642d637c5d9af3e884aabd88e4e9b73c59c6_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:c6491240cf919793d2d0646e7cd505f7c45f18655c600593e06c98324bf0dc71_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2449833"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in gRPC-Go, the Go language implementation of gRPC. This vulnerability, an authorization bypass, is caused by improper input validation of the HTTP/2 `:path` pseudo-header. A remote attacker can exploit this by sending raw HTTP/2 frames with a malformed `:path` that omits the mandatory leading slash. This allows the attacker to bypass defined security policies, potentially leading to unauthorized access to services or information disclosure.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "google.golang.org/grpc/grpc-go: google.golang.org/grpc/authz: gRPC-Go: Authorization bypass due to improper HTTP/2 path validation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:1c0d155195bfd251b40da10e153c8a738250f14253f337b198476740cb7bd81a_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:26fdde499994a4be0eb277bbbca899061384f20673672ef30ed301d792b3108d_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:5d08c7ee6886747dc077faa7f1e4e696b5ad29cc4dcc8fd2c4f3d7a434f47f9b_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:e1cdb58bf2783a9a50346e1690f51b09e175c8ebb737b11332658d85bcb645e9_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:c5083edbd43692dc5ef5b0cf14417eea19412c0927ede39a87ade36515cf16f1_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:d56042518051b3e4dbef3da9f13d74fd8e8a6b9ad8520965052f1522247b70ef_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:d6401dc97f1adeafcfb8a34e3c1fe8230cd2ca6bb7c4245ef875a4b3fa35b014_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:f54ab8388a0f593c2426c240c7d50fd7f3f2263e1c88f7726dbbe2ebbed38896_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:0d629bbf41a55434b40545e12c5f0d95e357b0fd74303feec657918b90321642_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:7d6aecb4a7e98dcabc77c3043e214bec9fa521af9c6a048ece876ba9f294dce8_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:d69d7290c5e07301e9397df551e97d8d81795ba7c711d95f60bd178fc39f1434_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:e095cffba13badc4aab65f9920f8e618c9fe4411d6d53d8b160716a31fe2d6e7_ppc64le"
],
"known_not_affected": [
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:092c9b4af55870d904beac952acf0fd914a2e784472888bb9f2c108548ff4906_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:25a9ca58f1104d83e0e312baf241f3eb048220c22a0065eed70106d9991faea4_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:2c6b079cf3184539f06634afcb35784ac74110c04fec36dfa80c2b0789d9099d_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:7b579fdc1d1dca3f32c2172eddb899ef3f8ff39d7af5cbed854d48e1d9e27675_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:2a33081f6d32826d53821e1aea686e1a6e8cb30fea8e601c00729c06511b98c6_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:31af187e314a843c4c02edd119d5edc2c260baca4d9a4ec2347f80f5511d6d3f_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:355cfa27d099cce3743ffa8432d2070ae3f21a446b560f6c1c5146b7351d116a_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:64d5bfb3e3a9861b3cefdb49c0f9b286aad11ccb31867092de08e48630694f82_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:3d20f5041cd11c838fc15148f60650ae0824b4c7816eb50152a28693443b0cd0_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:596cfba3fdac5cd9ee725f6b9e0bc640eaf7e933d019d9d57ea840592ec72f23_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:a22a2cca1f48ee743a15c68ca22d1d76943c25b2069e80a4bc1275c8157284db_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:a9d691eec41e370daff6737ed9d0b8c018b5426ff195b77897fd579846858e39_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:54890d05d56aeee46f051f42959500e00f2c748e9fdb2f1100226d8b4b976a47_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:549f2d54aaa66f9ab68e08f49e4f0cd95ffbbc93607ef7a112b74b177e57cfd0_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:5664f48403387a9e64370337d3ea5eb30ec27336f6e8f47a3a8a3ba0fe96741c_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:c95f763b803f53276670cea4fdf289983e472361a00a6d7da0bb56b3e857a935_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:60bfc1aeb95ff74fd2d8bd29700994594c92b93795b63f02fd0d7bb2d3d6fba7_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:71f49240685245565f35d7d4b6d7d55b442cb61bc7c0f4d25c5529ca9187ae9f_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:78775c452a2c5ddb3568b677c2790815fb2a2d6afacbfacccdaf68b79c8fe39c_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:c44d2ad3d716e7c753ec538654d25c42d80539071f1d5f81df4a8fd5e76c7a58_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:f4752a62de9c94e0f84aaa6cddfeb4a5cbecab6c83147b72b6f05ddef23fe192_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:26f519f9f0e7e41f7f6b12bfd2f968bfb5196f05781493752e17a85d09b0b976_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:3b1112d42f42c721287e1da5e5a87b6832889ed532b1acae27caeb64f1bb44f9_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:b3ac0453a1d16b2a9d1314991cd7642d637c5d9af3e884aabd88e4e9b73c59c6_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:c6491240cf919793d2d0646e7cd505f7c45f18655c600593e06c98324bf0dc71_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-33186"
},
{
"category": "external",
"summary": "RHBZ#2449833",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2449833"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-33186",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33186"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186"
},
{
"category": "external",
"summary": "https://github.com/grpc/grpc-go/security/advisories/GHSA-p77j-4mvh-x3m3",
"url": "https://github.com/grpc/grpc-go/security/advisories/GHSA-p77j-4mvh-x3m3"
}
],
"release_date": "2026-03-20T22:23:32.147000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-23T13:57:56+00:00",
"details": "It is recommended that existing users of Red Hat OpenShift Builds 1.6.4 upgrades to to 1.6.5",
"product_ids": [
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:1c0d155195bfd251b40da10e153c8a738250f14253f337b198476740cb7bd81a_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:26fdde499994a4be0eb277bbbca899061384f20673672ef30ed301d792b3108d_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:5d08c7ee6886747dc077faa7f1e4e696b5ad29cc4dcc8fd2c4f3d7a434f47f9b_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:e1cdb58bf2783a9a50346e1690f51b09e175c8ebb737b11332658d85bcb645e9_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:c5083edbd43692dc5ef5b0cf14417eea19412c0927ede39a87ade36515cf16f1_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:d56042518051b3e4dbef3da9f13d74fd8e8a6b9ad8520965052f1522247b70ef_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:d6401dc97f1adeafcfb8a34e3c1fe8230cd2ca6bb7c4245ef875a4b3fa35b014_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:f54ab8388a0f593c2426c240c7d50fd7f3f2263e1c88f7726dbbe2ebbed38896_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:0d629bbf41a55434b40545e12c5f0d95e357b0fd74303feec657918b90321642_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:7d6aecb4a7e98dcabc77c3043e214bec9fa521af9c6a048ece876ba9f294dce8_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:d69d7290c5e07301e9397df551e97d8d81795ba7c711d95f60bd178fc39f1434_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:e095cffba13badc4aab65f9920f8e618c9fe4411d6d53d8b160716a31fe2d6e7_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:10155"
},
{
"category": "workaround",
"details": "To mitigate this issue, implement infrastructure-level normalization to ensure all incoming HTTP/2 `:path` headers are properly formatted with a leading slash before reaching the gRPC-Go server. This can be achieved by configuring a reverse proxy or API gateway to validate and normalize the `:path` header. Ensure that any such intermediary is properly configured and restarted to apply the changes, which may temporarily impact service availability.",
"product_ids": [
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:092c9b4af55870d904beac952acf0fd914a2e784472888bb9f2c108548ff4906_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:25a9ca58f1104d83e0e312baf241f3eb048220c22a0065eed70106d9991faea4_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:2c6b079cf3184539f06634afcb35784ac74110c04fec36dfa80c2b0789d9099d_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:7b579fdc1d1dca3f32c2172eddb899ef3f8ff39d7af5cbed854d48e1d9e27675_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:2a33081f6d32826d53821e1aea686e1a6e8cb30fea8e601c00729c06511b98c6_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:31af187e314a843c4c02edd119d5edc2c260baca4d9a4ec2347f80f5511d6d3f_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:355cfa27d099cce3743ffa8432d2070ae3f21a446b560f6c1c5146b7351d116a_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:64d5bfb3e3a9861b3cefdb49c0f9b286aad11ccb31867092de08e48630694f82_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:3d20f5041cd11c838fc15148f60650ae0824b4c7816eb50152a28693443b0cd0_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:596cfba3fdac5cd9ee725f6b9e0bc640eaf7e933d019d9d57ea840592ec72f23_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:a22a2cca1f48ee743a15c68ca22d1d76943c25b2069e80a4bc1275c8157284db_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:a9d691eec41e370daff6737ed9d0b8c018b5426ff195b77897fd579846858e39_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:54890d05d56aeee46f051f42959500e00f2c748e9fdb2f1100226d8b4b976a47_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:549f2d54aaa66f9ab68e08f49e4f0cd95ffbbc93607ef7a112b74b177e57cfd0_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:5664f48403387a9e64370337d3ea5eb30ec27336f6e8f47a3a8a3ba0fe96741c_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:c95f763b803f53276670cea4fdf289983e472361a00a6d7da0bb56b3e857a935_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:60bfc1aeb95ff74fd2d8bd29700994594c92b93795b63f02fd0d7bb2d3d6fba7_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:1c0d155195bfd251b40da10e153c8a738250f14253f337b198476740cb7bd81a_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:26fdde499994a4be0eb277bbbca899061384f20673672ef30ed301d792b3108d_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:5d08c7ee6886747dc077faa7f1e4e696b5ad29cc4dcc8fd2c4f3d7a434f47f9b_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:e1cdb58bf2783a9a50346e1690f51b09e175c8ebb737b11332658d85bcb645e9_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:c5083edbd43692dc5ef5b0cf14417eea19412c0927ede39a87ade36515cf16f1_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:d56042518051b3e4dbef3da9f13d74fd8e8a6b9ad8520965052f1522247b70ef_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:d6401dc97f1adeafcfb8a34e3c1fe8230cd2ca6bb7c4245ef875a4b3fa35b014_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:f54ab8388a0f593c2426c240c7d50fd7f3f2263e1c88f7726dbbe2ebbed38896_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:0d629bbf41a55434b40545e12c5f0d95e357b0fd74303feec657918b90321642_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:7d6aecb4a7e98dcabc77c3043e214bec9fa521af9c6a048ece876ba9f294dce8_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:d69d7290c5e07301e9397df551e97d8d81795ba7c711d95f60bd178fc39f1434_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:e095cffba13badc4aab65f9920f8e618c9fe4411d6d53d8b160716a31fe2d6e7_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:71f49240685245565f35d7d4b6d7d55b442cb61bc7c0f4d25c5529ca9187ae9f_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:78775c452a2c5ddb3568b677c2790815fb2a2d6afacbfacccdaf68b79c8fe39c_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:c44d2ad3d716e7c753ec538654d25c42d80539071f1d5f81df4a8fd5e76c7a58_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:f4752a62de9c94e0f84aaa6cddfeb4a5cbecab6c83147b72b6f05ddef23fe192_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:26f519f9f0e7e41f7f6b12bfd2f968bfb5196f05781493752e17a85d09b0b976_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:3b1112d42f42c721287e1da5e5a87b6832889ed532b1acae27caeb64f1bb44f9_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:b3ac0453a1d16b2a9d1314991cd7642d637c5d9af3e884aabd88e4e9b73c59c6_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:c6491240cf919793d2d0646e7cd505f7c45f18655c600593e06c98324bf0dc71_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:092c9b4af55870d904beac952acf0fd914a2e784472888bb9f2c108548ff4906_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:25a9ca58f1104d83e0e312baf241f3eb048220c22a0065eed70106d9991faea4_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:2c6b079cf3184539f06634afcb35784ac74110c04fec36dfa80c2b0789d9099d_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:7b579fdc1d1dca3f32c2172eddb899ef3f8ff39d7af5cbed854d48e1d9e27675_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:2a33081f6d32826d53821e1aea686e1a6e8cb30fea8e601c00729c06511b98c6_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:31af187e314a843c4c02edd119d5edc2c260baca4d9a4ec2347f80f5511d6d3f_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:355cfa27d099cce3743ffa8432d2070ae3f21a446b560f6c1c5146b7351d116a_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:64d5bfb3e3a9861b3cefdb49c0f9b286aad11ccb31867092de08e48630694f82_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:3d20f5041cd11c838fc15148f60650ae0824b4c7816eb50152a28693443b0cd0_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:596cfba3fdac5cd9ee725f6b9e0bc640eaf7e933d019d9d57ea840592ec72f23_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:a22a2cca1f48ee743a15c68ca22d1d76943c25b2069e80a4bc1275c8157284db_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:a9d691eec41e370daff6737ed9d0b8c018b5426ff195b77897fd579846858e39_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:54890d05d56aeee46f051f42959500e00f2c748e9fdb2f1100226d8b4b976a47_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:549f2d54aaa66f9ab68e08f49e4f0cd95ffbbc93607ef7a112b74b177e57cfd0_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:5664f48403387a9e64370337d3ea5eb30ec27336f6e8f47a3a8a3ba0fe96741c_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:c95f763b803f53276670cea4fdf289983e472361a00a6d7da0bb56b3e857a935_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:60bfc1aeb95ff74fd2d8bd29700994594c92b93795b63f02fd0d7bb2d3d6fba7_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:1c0d155195bfd251b40da10e153c8a738250f14253f337b198476740cb7bd81a_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:26fdde499994a4be0eb277bbbca899061384f20673672ef30ed301d792b3108d_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:5d08c7ee6886747dc077faa7f1e4e696b5ad29cc4dcc8fd2c4f3d7a434f47f9b_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:e1cdb58bf2783a9a50346e1690f51b09e175c8ebb737b11332658d85bcb645e9_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:c5083edbd43692dc5ef5b0cf14417eea19412c0927ede39a87ade36515cf16f1_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:d56042518051b3e4dbef3da9f13d74fd8e8a6b9ad8520965052f1522247b70ef_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:d6401dc97f1adeafcfb8a34e3c1fe8230cd2ca6bb7c4245ef875a4b3fa35b014_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:f54ab8388a0f593c2426c240c7d50fd7f3f2263e1c88f7726dbbe2ebbed38896_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:0d629bbf41a55434b40545e12c5f0d95e357b0fd74303feec657918b90321642_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:7d6aecb4a7e98dcabc77c3043e214bec9fa521af9c6a048ece876ba9f294dce8_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:d69d7290c5e07301e9397df551e97d8d81795ba7c711d95f60bd178fc39f1434_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:e095cffba13badc4aab65f9920f8e618c9fe4411d6d53d8b160716a31fe2d6e7_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:71f49240685245565f35d7d4b6d7d55b442cb61bc7c0f4d25c5529ca9187ae9f_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:78775c452a2c5ddb3568b677c2790815fb2a2d6afacbfacccdaf68b79c8fe39c_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:c44d2ad3d716e7c753ec538654d25c42d80539071f1d5f81df4a8fd5e76c7a58_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:f4752a62de9c94e0f84aaa6cddfeb4a5cbecab6c83147b72b6f05ddef23fe192_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:26f519f9f0e7e41f7f6b12bfd2f968bfb5196f05781493752e17a85d09b0b976_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:3b1112d42f42c721287e1da5e5a87b6832889ed532b1acae27caeb64f1bb44f9_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:b3ac0453a1d16b2a9d1314991cd7642d637c5d9af3e884aabd88e4e9b73c59c6_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:c6491240cf919793d2d0646e7cd505f7c45f18655c600593e06c98324bf0dc71_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "google.golang.org/grpc/grpc-go: google.golang.org/grpc/authz: gRPC-Go: Authorization bypass due to improper HTTP/2 path validation"
},
{
"cve": "CVE-2026-33211",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2026-03-24T00:02:20.093480+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:092c9b4af55870d904beac952acf0fd914a2e784472888bb9f2c108548ff4906_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:25a9ca58f1104d83e0e312baf241f3eb048220c22a0065eed70106d9991faea4_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:2c6b079cf3184539f06634afcb35784ac74110c04fec36dfa80c2b0789d9099d_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:7b579fdc1d1dca3f32c2172eddb899ef3f8ff39d7af5cbed854d48e1d9e27675_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:2a33081f6d32826d53821e1aea686e1a6e8cb30fea8e601c00729c06511b98c6_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:31af187e314a843c4c02edd119d5edc2c260baca4d9a4ec2347f80f5511d6d3f_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:355cfa27d099cce3743ffa8432d2070ae3f21a446b560f6c1c5146b7351d116a_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:64d5bfb3e3a9861b3cefdb49c0f9b286aad11ccb31867092de08e48630694f82_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:3d20f5041cd11c838fc15148f60650ae0824b4c7816eb50152a28693443b0cd0_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:596cfba3fdac5cd9ee725f6b9e0bc640eaf7e933d019d9d57ea840592ec72f23_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:a22a2cca1f48ee743a15c68ca22d1d76943c25b2069e80a4bc1275c8157284db_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:a9d691eec41e370daff6737ed9d0b8c018b5426ff195b77897fd579846858e39_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:54890d05d56aeee46f051f42959500e00f2c748e9fdb2f1100226d8b4b976a47_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:549f2d54aaa66f9ab68e08f49e4f0cd95ffbbc93607ef7a112b74b177e57cfd0_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:5664f48403387a9e64370337d3ea5eb30ec27336f6e8f47a3a8a3ba0fe96741c_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:c95f763b803f53276670cea4fdf289983e472361a00a6d7da0bb56b3e857a935_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:60bfc1aeb95ff74fd2d8bd29700994594c92b93795b63f02fd0d7bb2d3d6fba7_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:c5083edbd43692dc5ef5b0cf14417eea19412c0927ede39a87ade36515cf16f1_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:d56042518051b3e4dbef3da9f13d74fd8e8a6b9ad8520965052f1522247b70ef_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:d6401dc97f1adeafcfb8a34e3c1fe8230cd2ca6bb7c4245ef875a4b3fa35b014_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:f54ab8388a0f593c2426c240c7d50fd7f3f2263e1c88f7726dbbe2ebbed38896_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:0d629bbf41a55434b40545e12c5f0d95e357b0fd74303feec657918b90321642_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:7d6aecb4a7e98dcabc77c3043e214bec9fa521af9c6a048ece876ba9f294dce8_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:d69d7290c5e07301e9397df551e97d8d81795ba7c711d95f60bd178fc39f1434_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:e095cffba13badc4aab65f9920f8e618c9fe4411d6d53d8b160716a31fe2d6e7_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:71f49240685245565f35d7d4b6d7d55b442cb61bc7c0f4d25c5529ca9187ae9f_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:78775c452a2c5ddb3568b677c2790815fb2a2d6afacbfacccdaf68b79c8fe39c_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:c44d2ad3d716e7c753ec538654d25c42d80539071f1d5f81df4a8fd5e76c7a58_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:f4752a62de9c94e0f84aaa6cddfeb4a5cbecab6c83147b72b6f05ddef23fe192_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:26f519f9f0e7e41f7f6b12bfd2f968bfb5196f05781493752e17a85d09b0b976_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:3b1112d42f42c721287e1da5e5a87b6832889ed532b1acae27caeb64f1bb44f9_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:b3ac0453a1d16b2a9d1314991cd7642d637c5d9af3e884aabd88e4e9b73c59c6_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:c6491240cf919793d2d0646e7cd505f7c45f18655c600593e06c98324bf0dc71_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2450554"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Tekton Pipelines, specifically in the Tekton Pipelines git resolver. A tenant with permissions to create ResolutionRequests can exploit a path traversal vulnerability via the `pathInRepo` parameter. This allows the tenant to read arbitrary files from the resolver pod\u0027s filesystem, leading to information disclosure, including sensitive ServiceAccount tokens. The contents of these files are returned in a base64-encoded format.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Tekton Pipelines: github.com/tektoncd/pipeline: Tekton Pipelines: Information disclosure via path traversal in git resolver",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to have the permission to create ResolutionRequests (e.g., by creating TaskRuns or PipelineRuns that use the git resolver) within at least one specific namespace, limiting the exposure of this issue to authenticated users. Also, an attacker can read any file readable by the resolver pod process, including cluster secrets, allowing an escalation of privileges from namespace-scoped access to cluster-wide access. Due to these reasons, this vulnerability has been rated with an important severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:1c0d155195bfd251b40da10e153c8a738250f14253f337b198476740cb7bd81a_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:26fdde499994a4be0eb277bbbca899061384f20673672ef30ed301d792b3108d_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:5d08c7ee6886747dc077faa7f1e4e696b5ad29cc4dcc8fd2c4f3d7a434f47f9b_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:e1cdb58bf2783a9a50346e1690f51b09e175c8ebb737b11332658d85bcb645e9_ppc64le"
],
"known_not_affected": [
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:092c9b4af55870d904beac952acf0fd914a2e784472888bb9f2c108548ff4906_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:25a9ca58f1104d83e0e312baf241f3eb048220c22a0065eed70106d9991faea4_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:2c6b079cf3184539f06634afcb35784ac74110c04fec36dfa80c2b0789d9099d_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:7b579fdc1d1dca3f32c2172eddb899ef3f8ff39d7af5cbed854d48e1d9e27675_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:2a33081f6d32826d53821e1aea686e1a6e8cb30fea8e601c00729c06511b98c6_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:31af187e314a843c4c02edd119d5edc2c260baca4d9a4ec2347f80f5511d6d3f_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:355cfa27d099cce3743ffa8432d2070ae3f21a446b560f6c1c5146b7351d116a_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:64d5bfb3e3a9861b3cefdb49c0f9b286aad11ccb31867092de08e48630694f82_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:3d20f5041cd11c838fc15148f60650ae0824b4c7816eb50152a28693443b0cd0_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:596cfba3fdac5cd9ee725f6b9e0bc640eaf7e933d019d9d57ea840592ec72f23_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:a22a2cca1f48ee743a15c68ca22d1d76943c25b2069e80a4bc1275c8157284db_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:a9d691eec41e370daff6737ed9d0b8c018b5426ff195b77897fd579846858e39_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:54890d05d56aeee46f051f42959500e00f2c748e9fdb2f1100226d8b4b976a47_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:549f2d54aaa66f9ab68e08f49e4f0cd95ffbbc93607ef7a112b74b177e57cfd0_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:5664f48403387a9e64370337d3ea5eb30ec27336f6e8f47a3a8a3ba0fe96741c_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:c95f763b803f53276670cea4fdf289983e472361a00a6d7da0bb56b3e857a935_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:60bfc1aeb95ff74fd2d8bd29700994594c92b93795b63f02fd0d7bb2d3d6fba7_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:c5083edbd43692dc5ef5b0cf14417eea19412c0927ede39a87ade36515cf16f1_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:d56042518051b3e4dbef3da9f13d74fd8e8a6b9ad8520965052f1522247b70ef_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:d6401dc97f1adeafcfb8a34e3c1fe8230cd2ca6bb7c4245ef875a4b3fa35b014_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:f54ab8388a0f593c2426c240c7d50fd7f3f2263e1c88f7726dbbe2ebbed38896_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:0d629bbf41a55434b40545e12c5f0d95e357b0fd74303feec657918b90321642_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:7d6aecb4a7e98dcabc77c3043e214bec9fa521af9c6a048ece876ba9f294dce8_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:d69d7290c5e07301e9397df551e97d8d81795ba7c711d95f60bd178fc39f1434_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:e095cffba13badc4aab65f9920f8e618c9fe4411d6d53d8b160716a31fe2d6e7_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:71f49240685245565f35d7d4b6d7d55b442cb61bc7c0f4d25c5529ca9187ae9f_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:78775c452a2c5ddb3568b677c2790815fb2a2d6afacbfacccdaf68b79c8fe39c_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:c44d2ad3d716e7c753ec538654d25c42d80539071f1d5f81df4a8fd5e76c7a58_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:f4752a62de9c94e0f84aaa6cddfeb4a5cbecab6c83147b72b6f05ddef23fe192_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:26f519f9f0e7e41f7f6b12bfd2f968bfb5196f05781493752e17a85d09b0b976_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:3b1112d42f42c721287e1da5e5a87b6832889ed532b1acae27caeb64f1bb44f9_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:b3ac0453a1d16b2a9d1314991cd7642d637c5d9af3e884aabd88e4e9b73c59c6_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:c6491240cf919793d2d0646e7cd505f7c45f18655c600593e06c98324bf0dc71_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-33211"
},
{
"category": "external",
"summary": "RHBZ#2450554",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2450554"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-33211",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33211"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-33211",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33211"
},
{
"category": "external",
"summary": "https://github.com/tektoncd/pipeline/commit/10fa538f9a2b6d01c75138f1ed7ba3da0e34687c",
"url": "https://github.com/tektoncd/pipeline/commit/10fa538f9a2b6d01c75138f1ed7ba3da0e34687c"
},
{
"category": "external",
"summary": "https://github.com/tektoncd/pipeline/commit/318006c4e3a5",
"url": "https://github.com/tektoncd/pipeline/commit/318006c4e3a5"
},
{
"category": "external",
"summary": "https://github.com/tektoncd/pipeline/commit/3ca7bc6e6dd1d97f80b84f78370d91edaf023cbd",
"url": "https://github.com/tektoncd/pipeline/commit/3ca7bc6e6dd1d97f80b84f78370d91edaf023cbd"
},
{
"category": "external",
"summary": "https://github.com/tektoncd/pipeline/commit/961388fcf3374bc7656d28ab58ca84987e0a75ae",
"url": "https://github.com/tektoncd/pipeline/commit/961388fcf3374bc7656d28ab58ca84987e0a75ae"
},
{
"category": "external",
"summary": "https://github.com/tektoncd/pipeline/commit/b1fee65b88aa969069c14c120045e97c37d9ee5e",
"url": "https://github.com/tektoncd/pipeline/commit/b1fee65b88aa969069c14c120045e97c37d9ee5e"
},
{
"category": "external",
"summary": "https://github.com/tektoncd/pipeline/commit/cdb4e1e97a4f3170f9bc2cbfff83a6c8107bc3db",
"url": "https://github.com/tektoncd/pipeline/commit/cdb4e1e97a4f3170f9bc2cbfff83a6c8107bc3db"
},
{
"category": "external",
"summary": "https://github.com/tektoncd/pipeline/commit/ec7755031a183b345cf9e64bea0e0505c1b9cb78",
"url": "https://github.com/tektoncd/pipeline/commit/ec7755031a183b345cf9e64bea0e0505c1b9cb78"
},
{
"category": "external",
"summary": "https://github.com/tektoncd/pipeline/security/advisories/GHSA-j5q5-j9gm-2w5c",
"url": "https://github.com/tektoncd/pipeline/security/advisories/GHSA-j5q5-j9gm-2w5c"
}
],
"release_date": "2026-03-23T23:55:54.089000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-23T13:57:56+00:00",
"details": "It is recommended that existing users of Red Hat OpenShift Builds 1.6.4 upgrades to to 1.6.5",
"product_ids": [
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:1c0d155195bfd251b40da10e153c8a738250f14253f337b198476740cb7bd81a_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:26fdde499994a4be0eb277bbbca899061384f20673672ef30ed301d792b3108d_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:5d08c7ee6886747dc077faa7f1e4e696b5ad29cc4dcc8fd2c4f3d7a434f47f9b_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:e1cdb58bf2783a9a50346e1690f51b09e175c8ebb737b11332658d85bcb645e9_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:10155"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, restrict the creation of ResolutionRequests to trusted users and service accounts. Implement strict Role-Based Access Control (RBAC) policies to limit which tenants can create TaskRuns or PipelineRuns that utilize the Tekton Pipelines git resolver. This reduces the exposure by preventing unauthorized access to the resolver pod\u0027s filesystem.",
"product_ids": [
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:092c9b4af55870d904beac952acf0fd914a2e784472888bb9f2c108548ff4906_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:25a9ca58f1104d83e0e312baf241f3eb048220c22a0065eed70106d9991faea4_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:2c6b079cf3184539f06634afcb35784ac74110c04fec36dfa80c2b0789d9099d_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:7b579fdc1d1dca3f32c2172eddb899ef3f8ff39d7af5cbed854d48e1d9e27675_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:2a33081f6d32826d53821e1aea686e1a6e8cb30fea8e601c00729c06511b98c6_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:31af187e314a843c4c02edd119d5edc2c260baca4d9a4ec2347f80f5511d6d3f_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:355cfa27d099cce3743ffa8432d2070ae3f21a446b560f6c1c5146b7351d116a_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:64d5bfb3e3a9861b3cefdb49c0f9b286aad11ccb31867092de08e48630694f82_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:3d20f5041cd11c838fc15148f60650ae0824b4c7816eb50152a28693443b0cd0_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:596cfba3fdac5cd9ee725f6b9e0bc640eaf7e933d019d9d57ea840592ec72f23_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:a22a2cca1f48ee743a15c68ca22d1d76943c25b2069e80a4bc1275c8157284db_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:a9d691eec41e370daff6737ed9d0b8c018b5426ff195b77897fd579846858e39_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:54890d05d56aeee46f051f42959500e00f2c748e9fdb2f1100226d8b4b976a47_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:549f2d54aaa66f9ab68e08f49e4f0cd95ffbbc93607ef7a112b74b177e57cfd0_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:5664f48403387a9e64370337d3ea5eb30ec27336f6e8f47a3a8a3ba0fe96741c_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:c95f763b803f53276670cea4fdf289983e472361a00a6d7da0bb56b3e857a935_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:60bfc1aeb95ff74fd2d8bd29700994594c92b93795b63f02fd0d7bb2d3d6fba7_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:1c0d155195bfd251b40da10e153c8a738250f14253f337b198476740cb7bd81a_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:26fdde499994a4be0eb277bbbca899061384f20673672ef30ed301d792b3108d_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:5d08c7ee6886747dc077faa7f1e4e696b5ad29cc4dcc8fd2c4f3d7a434f47f9b_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:e1cdb58bf2783a9a50346e1690f51b09e175c8ebb737b11332658d85bcb645e9_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:c5083edbd43692dc5ef5b0cf14417eea19412c0927ede39a87ade36515cf16f1_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:d56042518051b3e4dbef3da9f13d74fd8e8a6b9ad8520965052f1522247b70ef_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:d6401dc97f1adeafcfb8a34e3c1fe8230cd2ca6bb7c4245ef875a4b3fa35b014_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:f54ab8388a0f593c2426c240c7d50fd7f3f2263e1c88f7726dbbe2ebbed38896_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:0d629bbf41a55434b40545e12c5f0d95e357b0fd74303feec657918b90321642_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:7d6aecb4a7e98dcabc77c3043e214bec9fa521af9c6a048ece876ba9f294dce8_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:d69d7290c5e07301e9397df551e97d8d81795ba7c711d95f60bd178fc39f1434_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:e095cffba13badc4aab65f9920f8e618c9fe4411d6d53d8b160716a31fe2d6e7_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:71f49240685245565f35d7d4b6d7d55b442cb61bc7c0f4d25c5529ca9187ae9f_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:78775c452a2c5ddb3568b677c2790815fb2a2d6afacbfacccdaf68b79c8fe39c_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:c44d2ad3d716e7c753ec538654d25c42d80539071f1d5f81df4a8fd5e76c7a58_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:f4752a62de9c94e0f84aaa6cddfeb4a5cbecab6c83147b72b6f05ddef23fe192_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:26f519f9f0e7e41f7f6b12bfd2f968bfb5196f05781493752e17a85d09b0b976_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:3b1112d42f42c721287e1da5e5a87b6832889ed532b1acae27caeb64f1bb44f9_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:b3ac0453a1d16b2a9d1314991cd7642d637c5d9af3e884aabd88e4e9b73c59c6_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:c6491240cf919793d2d0646e7cd505f7c45f18655c600593e06c98324bf0dc71_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:092c9b4af55870d904beac952acf0fd914a2e784472888bb9f2c108548ff4906_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:25a9ca58f1104d83e0e312baf241f3eb048220c22a0065eed70106d9991faea4_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:2c6b079cf3184539f06634afcb35784ac74110c04fec36dfa80c2b0789d9099d_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:7b579fdc1d1dca3f32c2172eddb899ef3f8ff39d7af5cbed854d48e1d9e27675_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:2a33081f6d32826d53821e1aea686e1a6e8cb30fea8e601c00729c06511b98c6_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:31af187e314a843c4c02edd119d5edc2c260baca4d9a4ec2347f80f5511d6d3f_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:355cfa27d099cce3743ffa8432d2070ae3f21a446b560f6c1c5146b7351d116a_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:64d5bfb3e3a9861b3cefdb49c0f9b286aad11ccb31867092de08e48630694f82_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:3d20f5041cd11c838fc15148f60650ae0824b4c7816eb50152a28693443b0cd0_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:596cfba3fdac5cd9ee725f6b9e0bc640eaf7e933d019d9d57ea840592ec72f23_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:a22a2cca1f48ee743a15c68ca22d1d76943c25b2069e80a4bc1275c8157284db_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:a9d691eec41e370daff6737ed9d0b8c018b5426ff195b77897fd579846858e39_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:54890d05d56aeee46f051f42959500e00f2c748e9fdb2f1100226d8b4b976a47_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:549f2d54aaa66f9ab68e08f49e4f0cd95ffbbc93607ef7a112b74b177e57cfd0_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:5664f48403387a9e64370337d3ea5eb30ec27336f6e8f47a3a8a3ba0fe96741c_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:c95f763b803f53276670cea4fdf289983e472361a00a6d7da0bb56b3e857a935_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:60bfc1aeb95ff74fd2d8bd29700994594c92b93795b63f02fd0d7bb2d3d6fba7_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:1c0d155195bfd251b40da10e153c8a738250f14253f337b198476740cb7bd81a_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:26fdde499994a4be0eb277bbbca899061384f20673672ef30ed301d792b3108d_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:5d08c7ee6886747dc077faa7f1e4e696b5ad29cc4dcc8fd2c4f3d7a434f47f9b_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:e1cdb58bf2783a9a50346e1690f51b09e175c8ebb737b11332658d85bcb645e9_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:c5083edbd43692dc5ef5b0cf14417eea19412c0927ede39a87ade36515cf16f1_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:d56042518051b3e4dbef3da9f13d74fd8e8a6b9ad8520965052f1522247b70ef_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:d6401dc97f1adeafcfb8a34e3c1fe8230cd2ca6bb7c4245ef875a4b3fa35b014_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:f54ab8388a0f593c2426c240c7d50fd7f3f2263e1c88f7726dbbe2ebbed38896_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:0d629bbf41a55434b40545e12c5f0d95e357b0fd74303feec657918b90321642_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:7d6aecb4a7e98dcabc77c3043e214bec9fa521af9c6a048ece876ba9f294dce8_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:d69d7290c5e07301e9397df551e97d8d81795ba7c711d95f60bd178fc39f1434_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:e095cffba13badc4aab65f9920f8e618c9fe4411d6d53d8b160716a31fe2d6e7_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:71f49240685245565f35d7d4b6d7d55b442cb61bc7c0f4d25c5529ca9187ae9f_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:78775c452a2c5ddb3568b677c2790815fb2a2d6afacbfacccdaf68b79c8fe39c_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:c44d2ad3d716e7c753ec538654d25c42d80539071f1d5f81df4a8fd5e76c7a58_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:f4752a62de9c94e0f84aaa6cddfeb4a5cbecab6c83147b72b6f05ddef23fe192_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:26f519f9f0e7e41f7f6b12bfd2f968bfb5196f05781493752e17a85d09b0b976_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:3b1112d42f42c721287e1da5e5a87b6832889ed532b1acae27caeb64f1bb44f9_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:b3ac0453a1d16b2a9d1314991cd7642d637c5d9af3e884aabd88e4e9b73c59c6_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:c6491240cf919793d2d0646e7cd505f7c45f18655c600593e06c98324bf0dc71_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Tekton Pipelines: github.com/tektoncd/pipeline: Tekton Pipelines: Information disclosure via path traversal in git resolver"
},
{
"cve": "CVE-2026-33810",
"cwe": {
"id": "CWE-1289",
"name": "Improper Validation of Unsafe Equivalence in Input"
},
"discovery_date": "2026-04-08T02:01:09.100830+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:092c9b4af55870d904beac952acf0fd914a2e784472888bb9f2c108548ff4906_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:25a9ca58f1104d83e0e312baf241f3eb048220c22a0065eed70106d9991faea4_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:2c6b079cf3184539f06634afcb35784ac74110c04fec36dfa80c2b0789d9099d_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:7b579fdc1d1dca3f32c2172eddb899ef3f8ff39d7af5cbed854d48e1d9e27675_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:2a33081f6d32826d53821e1aea686e1a6e8cb30fea8e601c00729c06511b98c6_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:31af187e314a843c4c02edd119d5edc2c260baca4d9a4ec2347f80f5511d6d3f_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:355cfa27d099cce3743ffa8432d2070ae3f21a446b560f6c1c5146b7351d116a_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:64d5bfb3e3a9861b3cefdb49c0f9b286aad11ccb31867092de08e48630694f82_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:3d20f5041cd11c838fc15148f60650ae0824b4c7816eb50152a28693443b0cd0_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:596cfba3fdac5cd9ee725f6b9e0bc640eaf7e933d019d9d57ea840592ec72f23_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:a22a2cca1f48ee743a15c68ca22d1d76943c25b2069e80a4bc1275c8157284db_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:a9d691eec41e370daff6737ed9d0b8c018b5426ff195b77897fd579846858e39_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:54890d05d56aeee46f051f42959500e00f2c748e9fdb2f1100226d8b4b976a47_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:549f2d54aaa66f9ab68e08f49e4f0cd95ffbbc93607ef7a112b74b177e57cfd0_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:5664f48403387a9e64370337d3ea5eb30ec27336f6e8f47a3a8a3ba0fe96741c_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:c95f763b803f53276670cea4fdf289983e472361a00a6d7da0bb56b3e857a935_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:60bfc1aeb95ff74fd2d8bd29700994594c92b93795b63f02fd0d7bb2d3d6fba7_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:1c0d155195bfd251b40da10e153c8a738250f14253f337b198476740cb7bd81a_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:26fdde499994a4be0eb277bbbca899061384f20673672ef30ed301d792b3108d_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:5d08c7ee6886747dc077faa7f1e4e696b5ad29cc4dcc8fd2c4f3d7a434f47f9b_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:e1cdb58bf2783a9a50346e1690f51b09e175c8ebb737b11332658d85bcb645e9_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:c5083edbd43692dc5ef5b0cf14417eea19412c0927ede39a87ade36515cf16f1_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:d56042518051b3e4dbef3da9f13d74fd8e8a6b9ad8520965052f1522247b70ef_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:d6401dc97f1adeafcfb8a34e3c1fe8230cd2ca6bb7c4245ef875a4b3fa35b014_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:f54ab8388a0f593c2426c240c7d50fd7f3f2263e1c88f7726dbbe2ebbed38896_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:0d629bbf41a55434b40545e12c5f0d95e357b0fd74303feec657918b90321642_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:7d6aecb4a7e98dcabc77c3043e214bec9fa521af9c6a048ece876ba9f294dce8_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:d69d7290c5e07301e9397df551e97d8d81795ba7c711d95f60bd178fc39f1434_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:e095cffba13badc4aab65f9920f8e618c9fe4411d6d53d8b160716a31fe2d6e7_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:26f519f9f0e7e41f7f6b12bfd2f968bfb5196f05781493752e17a85d09b0b976_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:3b1112d42f42c721287e1da5e5a87b6832889ed532b1acae27caeb64f1bb44f9_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:b3ac0453a1d16b2a9d1314991cd7642d637c5d9af3e884aabd88e4e9b73c59c6_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:c6491240cf919793d2d0646e7cd505f7c45f18655c600593e06c98324bf0dc71_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2456335"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the `crypto/x509` package within Go (golang). When verifying a certificate chain, excluded DNS (Domain Name System) constraints are not correctly applied to wildcard DNS Subject Alternative Names (SANs) if the case of the SAN differs from the constraint. This oversight could allow an attacker to bypass certificate validation, potentially leading to the acceptance of a malicious certificate that should have been rejected. This issue specifically impacts the validation of trusted certificate chains.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Go crypto/x509: Certificate validation bypass due to incorrect DNS constraint application",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:71f49240685245565f35d7d4b6d7d55b442cb61bc7c0f4d25c5529ca9187ae9f_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:78775c452a2c5ddb3568b677c2790815fb2a2d6afacbfacccdaf68b79c8fe39c_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:c44d2ad3d716e7c753ec538654d25c42d80539071f1d5f81df4a8fd5e76c7a58_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:f4752a62de9c94e0f84aaa6cddfeb4a5cbecab6c83147b72b6f05ddef23fe192_s390x"
],
"known_not_affected": [
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:092c9b4af55870d904beac952acf0fd914a2e784472888bb9f2c108548ff4906_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:25a9ca58f1104d83e0e312baf241f3eb048220c22a0065eed70106d9991faea4_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:2c6b079cf3184539f06634afcb35784ac74110c04fec36dfa80c2b0789d9099d_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:7b579fdc1d1dca3f32c2172eddb899ef3f8ff39d7af5cbed854d48e1d9e27675_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:2a33081f6d32826d53821e1aea686e1a6e8cb30fea8e601c00729c06511b98c6_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:31af187e314a843c4c02edd119d5edc2c260baca4d9a4ec2347f80f5511d6d3f_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:355cfa27d099cce3743ffa8432d2070ae3f21a446b560f6c1c5146b7351d116a_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:64d5bfb3e3a9861b3cefdb49c0f9b286aad11ccb31867092de08e48630694f82_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:3d20f5041cd11c838fc15148f60650ae0824b4c7816eb50152a28693443b0cd0_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:596cfba3fdac5cd9ee725f6b9e0bc640eaf7e933d019d9d57ea840592ec72f23_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:a22a2cca1f48ee743a15c68ca22d1d76943c25b2069e80a4bc1275c8157284db_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:a9d691eec41e370daff6737ed9d0b8c018b5426ff195b77897fd579846858e39_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:54890d05d56aeee46f051f42959500e00f2c748e9fdb2f1100226d8b4b976a47_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:549f2d54aaa66f9ab68e08f49e4f0cd95ffbbc93607ef7a112b74b177e57cfd0_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:5664f48403387a9e64370337d3ea5eb30ec27336f6e8f47a3a8a3ba0fe96741c_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:c95f763b803f53276670cea4fdf289983e472361a00a6d7da0bb56b3e857a935_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:60bfc1aeb95ff74fd2d8bd29700994594c92b93795b63f02fd0d7bb2d3d6fba7_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:1c0d155195bfd251b40da10e153c8a738250f14253f337b198476740cb7bd81a_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:26fdde499994a4be0eb277bbbca899061384f20673672ef30ed301d792b3108d_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:5d08c7ee6886747dc077faa7f1e4e696b5ad29cc4dcc8fd2c4f3d7a434f47f9b_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:e1cdb58bf2783a9a50346e1690f51b09e175c8ebb737b11332658d85bcb645e9_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:c5083edbd43692dc5ef5b0cf14417eea19412c0927ede39a87ade36515cf16f1_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:d56042518051b3e4dbef3da9f13d74fd8e8a6b9ad8520965052f1522247b70ef_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:d6401dc97f1adeafcfb8a34e3c1fe8230cd2ca6bb7c4245ef875a4b3fa35b014_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:f54ab8388a0f593c2426c240c7d50fd7f3f2263e1c88f7726dbbe2ebbed38896_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:0d629bbf41a55434b40545e12c5f0d95e357b0fd74303feec657918b90321642_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:7d6aecb4a7e98dcabc77c3043e214bec9fa521af9c6a048ece876ba9f294dce8_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:d69d7290c5e07301e9397df551e97d8d81795ba7c711d95f60bd178fc39f1434_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:e095cffba13badc4aab65f9920f8e618c9fe4411d6d53d8b160716a31fe2d6e7_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:26f519f9f0e7e41f7f6b12bfd2f968bfb5196f05781493752e17a85d09b0b976_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:3b1112d42f42c721287e1da5e5a87b6832889ed532b1acae27caeb64f1bb44f9_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:b3ac0453a1d16b2a9d1314991cd7642d637c5d9af3e884aabd88e4e9b73c59c6_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:c6491240cf919793d2d0646e7cd505f7c45f18655c600593e06c98324bf0dc71_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-33810"
},
{
"category": "external",
"summary": "RHBZ#2456335",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2456335"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-33810",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33810"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-33810",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33810"
},
{
"category": "external",
"summary": "https://go.dev/cl/763763",
"url": "https://go.dev/cl/763763"
},
{
"category": "external",
"summary": "https://go.dev/issue/78332",
"url": "https://go.dev/issue/78332"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU",
"url": "https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4866",
"url": "https://pkg.go.dev/vuln/GO-2026-4866"
}
],
"release_date": "2026-04-08T01:06:56.546000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-23T13:57:56+00:00",
"details": "It is recommended that existing users of Red Hat OpenShift Builds 1.6.4 upgrades to to 1.6.5",
"product_ids": [
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:71f49240685245565f35d7d4b6d7d55b442cb61bc7c0f4d25c5529ca9187ae9f_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:78775c452a2c5ddb3568b677c2790815fb2a2d6afacbfacccdaf68b79c8fe39c_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:c44d2ad3d716e7c753ec538654d25c42d80539071f1d5f81df4a8fd5e76c7a58_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:f4752a62de9c94e0f84aaa6cddfeb4a5cbecab6c83147b72b6f05ddef23fe192_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:10155"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:092c9b4af55870d904beac952acf0fd914a2e784472888bb9f2c108548ff4906_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:25a9ca58f1104d83e0e312baf241f3eb048220c22a0065eed70106d9991faea4_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:2c6b079cf3184539f06634afcb35784ac74110c04fec36dfa80c2b0789d9099d_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:7b579fdc1d1dca3f32c2172eddb899ef3f8ff39d7af5cbed854d48e1d9e27675_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:2a33081f6d32826d53821e1aea686e1a6e8cb30fea8e601c00729c06511b98c6_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:31af187e314a843c4c02edd119d5edc2c260baca4d9a4ec2347f80f5511d6d3f_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:355cfa27d099cce3743ffa8432d2070ae3f21a446b560f6c1c5146b7351d116a_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:64d5bfb3e3a9861b3cefdb49c0f9b286aad11ccb31867092de08e48630694f82_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:3d20f5041cd11c838fc15148f60650ae0824b4c7816eb50152a28693443b0cd0_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:596cfba3fdac5cd9ee725f6b9e0bc640eaf7e933d019d9d57ea840592ec72f23_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:a22a2cca1f48ee743a15c68ca22d1d76943c25b2069e80a4bc1275c8157284db_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:a9d691eec41e370daff6737ed9d0b8c018b5426ff195b77897fd579846858e39_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:54890d05d56aeee46f051f42959500e00f2c748e9fdb2f1100226d8b4b976a47_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:549f2d54aaa66f9ab68e08f49e4f0cd95ffbbc93607ef7a112b74b177e57cfd0_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:5664f48403387a9e64370337d3ea5eb30ec27336f6e8f47a3a8a3ba0fe96741c_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:c95f763b803f53276670cea4fdf289983e472361a00a6d7da0bb56b3e857a935_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:60bfc1aeb95ff74fd2d8bd29700994594c92b93795b63f02fd0d7bb2d3d6fba7_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:1c0d155195bfd251b40da10e153c8a738250f14253f337b198476740cb7bd81a_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:26fdde499994a4be0eb277bbbca899061384f20673672ef30ed301d792b3108d_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:5d08c7ee6886747dc077faa7f1e4e696b5ad29cc4dcc8fd2c4f3d7a434f47f9b_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:e1cdb58bf2783a9a50346e1690f51b09e175c8ebb737b11332658d85bcb645e9_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:c5083edbd43692dc5ef5b0cf14417eea19412c0927ede39a87ade36515cf16f1_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:d56042518051b3e4dbef3da9f13d74fd8e8a6b9ad8520965052f1522247b70ef_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:d6401dc97f1adeafcfb8a34e3c1fe8230cd2ca6bb7c4245ef875a4b3fa35b014_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:f54ab8388a0f593c2426c240c7d50fd7f3f2263e1c88f7726dbbe2ebbed38896_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:0d629bbf41a55434b40545e12c5f0d95e357b0fd74303feec657918b90321642_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:7d6aecb4a7e98dcabc77c3043e214bec9fa521af9c6a048ece876ba9f294dce8_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:d69d7290c5e07301e9397df551e97d8d81795ba7c711d95f60bd178fc39f1434_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:e095cffba13badc4aab65f9920f8e618c9fe4411d6d53d8b160716a31fe2d6e7_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:71f49240685245565f35d7d4b6d7d55b442cb61bc7c0f4d25c5529ca9187ae9f_amd64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:78775c452a2c5ddb3568b677c2790815fb2a2d6afacbfacccdaf68b79c8fe39c_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:c44d2ad3d716e7c753ec538654d25c42d80539071f1d5f81df4a8fd5e76c7a58_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:f4752a62de9c94e0f84aaa6cddfeb4a5cbecab6c83147b72b6f05ddef23fe192_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:26f519f9f0e7e41f7f6b12bfd2f968bfb5196f05781493752e17a85d09b0b976_s390x",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:3b1112d42f42c721287e1da5e5a87b6832889ed532b1acae27caeb64f1bb44f9_arm64",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:b3ac0453a1d16b2a9d1314991cd7642d637c5d9af3e884aabd88e4e9b73c59c6_ppc64le",
"Red Hat OpenShift Builds 1.6.5:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:c6491240cf919793d2d0646e7cd505f7c45f18655c600593e06c98324bf0dc71_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Go crypto/x509: Certificate validation bypass due to incorrect DNS constraint application"
}
]
}
cleanstart-2026-jz43336
Vulnerability from cleanstart
Multiple security vulnerabilities affect the percona-xtradb-cluster-operator package. During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions. See references for individual vulnerability details.
| URL | Type | ||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "percona-xtradb-cluster-operator"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.19.0-r0"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the percona-xtradb-cluster-operator package. During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-JZ43336",
"modified": "2026-04-15T09:24:00Z",
"published": "2026-04-16T00:45:49.932786Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-JZ43336.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32280"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32281"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32282"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32283"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32289"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33810"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-f6x5-jh6r-wrfv"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-j5w8-q4qc-rx2x"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32280"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32281"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32282"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32283"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32289"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33810"
}
],
"related": [],
"schema_version": "1.7.3",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
],
"summary": "During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions",
"upstream": [
"CVE-2026-32280",
"CVE-2026-32281",
"CVE-2026-32282",
"CVE-2026-32283",
"CVE-2026-32289",
"CVE-2026-33810",
"ghsa-f6x5-jh6r-wrfv",
"ghsa-j5w8-q4qc-rx2x"
]
}
cleanstart-2026-nx54250
Vulnerability from cleanstart
Multiple security vulnerabilities affect the gitness package. During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions. See references for individual vulnerability details.
| URL | Type | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "gitness"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "3.3.0-r1"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the gitness package. During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-NX54250",
"modified": "2026-04-09T09:59:33Z",
"published": "2026-04-10T01:03:29.003448Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-NX54250.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-22868"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-30153"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61726"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61728"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61729"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61730"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-68119"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32280"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32281"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32282"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32283"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32289"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33186"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33540"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33810"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-35172"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-4vq8-7jfc-9cvp"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-f6x5-jh6r-wrfv"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-j5w8-q4qc-rx2x"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-vrw8-fxc6-2r93"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-22868"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-30153"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61730"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68119"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32280"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32281"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32282"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32283"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32289"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33540"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33810"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-35172"
}
],
"related": [],
"schema_version": "1.7.3",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
],
"summary": "During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions",
"upstream": [
"CVE-2025-22868",
"CVE-2025-30153",
"CVE-2025-61726",
"CVE-2025-61728",
"CVE-2025-61729",
"CVE-2025-61730",
"CVE-2025-68119",
"CVE-2026-32280",
"CVE-2026-32281",
"CVE-2026-32282",
"CVE-2026-32283",
"CVE-2026-32289",
"CVE-2026-33186",
"CVE-2026-33540",
"CVE-2026-33810",
"CVE-2026-35172",
"ghsa-4vq8-7jfc-9cvp",
"ghsa-f6x5-jh6r-wrfv",
"ghsa-j5w8-q4qc-rx2x",
"ghsa-vrw8-fxc6-2r93"
]
}
cleanstart-2026-gy48351
Vulnerability from cleanstart
Multiple security vulnerabilities affect the opentofu-fips package. Within HostnameError. See references for individual vulnerability details.
| URL | Type | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "opentofu-fips"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.9.4-r0"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the opentofu-fips package. Within HostnameError. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-GY48351",
"modified": "2026-04-29T09:10:13Z",
"published": "2026-04-30T00:53:26.601522Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-GY48351.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2020-8912"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2024-10005"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2024-10006"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-47913"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-47914"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-58181"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61726"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61727"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61728"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61729"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61730"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61732"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-68119"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-68121"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-24515"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-25210"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32280"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32281"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32282"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32283"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32289"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33186"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33810"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-34986"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-39882"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-39883"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-2464-8j7c-4cjm"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-2x5j-vhc8-9cwm"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-6v2p-p543-phr9"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-78h2-9frx-2jm8"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-c6gw-w398-hv78"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-fv92-fjc5-jj9h"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-hcg3-q754-cr77"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-hfvc-g4fc-pqhx"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-jc7w-c686-c4v9"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-mh63-6h87-95cp"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-p77j-4mvh-x3m3"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-q9hv-hpm4-hj6x"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-qxp5-gwg8-xv66"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-vvgc-356p-c3xw"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-w8rr-5gcm-pp58"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-wjrx-6529-hcj3"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-xmrv-pmrh-hhx2"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8912"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-10005"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-10006"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47913"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47914"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58181"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61727"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61730"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61732"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68119"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-24515"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25210"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32280"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32281"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32282"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32283"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32289"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33810"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34986"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-39882"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-39883"
}
],
"related": [],
"schema_version": "1.7.3",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
],
"summary": "Within HostnameError",
"upstream": [
"CVE-2020-8912",
"CVE-2024-10005",
"CVE-2024-10006",
"CVE-2025-47913",
"CVE-2025-47914",
"CVE-2025-58181",
"CVE-2025-61726",
"CVE-2025-61727",
"CVE-2025-61728",
"CVE-2025-61729",
"CVE-2025-61730",
"CVE-2025-61732",
"CVE-2025-68119",
"CVE-2025-68121",
"CVE-2026-24051",
"CVE-2026-24515",
"CVE-2026-25210",
"CVE-2026-25679",
"CVE-2026-27139",
"CVE-2026-27142",
"CVE-2026-32280",
"CVE-2026-32281",
"CVE-2026-32282",
"CVE-2026-32283",
"CVE-2026-32289",
"CVE-2026-33186",
"CVE-2026-33810",
"CVE-2026-34986",
"CVE-2026-39882",
"CVE-2026-39883",
"ghsa-2464-8j7c-4cjm",
"ghsa-2x5j-vhc8-9cwm",
"ghsa-6v2p-p543-phr9",
"ghsa-78h2-9frx-2jm8",
"ghsa-c6gw-w398-hv78",
"ghsa-fv92-fjc5-jj9h",
"ghsa-hcg3-q754-cr77",
"ghsa-hfvc-g4fc-pqhx",
"ghsa-jc7w-c686-c4v9",
"ghsa-mh63-6h87-95cp",
"ghsa-p77j-4mvh-x3m3",
"ghsa-q9hv-hpm4-hj6x",
"ghsa-qxp5-gwg8-xv66",
"ghsa-vvgc-356p-c3xw",
"ghsa-w8rr-5gcm-pp58",
"ghsa-wjrx-6529-hcj3",
"ghsa-xmrv-pmrh-hhx2"
]
}
cleanstart-2026-mi12470
Vulnerability from cleanstart
Multiple security vulnerabilities affect the opentofu-fips package. Within HostnameError. See references for individual vulnerability details.
| URL | Type | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "opentofu-fips"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.9.4-r5"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the opentofu-fips package. Within HostnameError. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-MI12470",
"modified": "2026-04-29T09:05:33Z",
"published": "2026-04-30T00:49:56.616377Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-MI12470.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-47913"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-47914"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-58181"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61727"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61729"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32280"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32281"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32282"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32283"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32289"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33186"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33810"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-34986"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-39882"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-39883"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-2464-8j7c-4cjm"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-2x5j-vhc8-9cwm"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-6v2p-p543-phr9"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-78h2-9frx-2jm8"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-9h8m-3fm2-qjrq"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-c6gw-w398-hv78"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-fv92-fjc5-jj9h"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-hcg3-q754-cr77"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-hfvc-g4fc-pqhx"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-jc7w-c686-c4v9"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-mh63-6h87-95cp"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-qxp5-gwg8-xv66"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-vvgc-356p-c3xw"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-w8rr-5gcm-pp58"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-wjrx-6529-hcj3"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-xmrv-pmrh-hhx2"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47913"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47914"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58181"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61727"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32280"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32281"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32282"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32283"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32289"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33810"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34986"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-39882"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-39883"
}
],
"related": [],
"schema_version": "1.7.3",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
],
"summary": "Within HostnameError",
"upstream": [
"CVE-2025-47913",
"CVE-2025-47914",
"CVE-2025-58181",
"CVE-2025-61727",
"CVE-2025-61729",
"CVE-2026-24051",
"CVE-2026-25679",
"CVE-2026-27139",
"CVE-2026-27142",
"CVE-2026-32280",
"CVE-2026-32281",
"CVE-2026-32282",
"CVE-2026-32283",
"CVE-2026-32289",
"CVE-2026-33186",
"CVE-2026-33810",
"CVE-2026-34986",
"CVE-2026-39882",
"CVE-2026-39883",
"ghsa-2464-8j7c-4cjm",
"ghsa-2x5j-vhc8-9cwm",
"ghsa-6v2p-p543-phr9",
"ghsa-78h2-9frx-2jm8",
"ghsa-9h8m-3fm2-qjrq",
"ghsa-c6gw-w398-hv78",
"ghsa-fv92-fjc5-jj9h",
"ghsa-hcg3-q754-cr77",
"ghsa-hfvc-g4fc-pqhx",
"ghsa-jc7w-c686-c4v9",
"ghsa-mh63-6h87-95cp",
"ghsa-qxp5-gwg8-xv66",
"ghsa-vvgc-356p-c3xw",
"ghsa-w8rr-5gcm-pp58",
"ghsa-wjrx-6529-hcj3",
"ghsa-xmrv-pmrh-hhx2"
]
}
cleanstart-2026-kt28044
Vulnerability from cleanstart
Multiple security vulnerabilities affect the terragrunt-fips package. During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions. See references for individual vulnerability details.
| URL | Type | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "terragrunt-fips"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.97.2-r6"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the terragrunt-fips package. During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-KT28044",
"modified": "2026-04-29T07:43:21Z",
"published": "2026-04-30T01:03:26.906365Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-KT28044.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-47913"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-47914"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-58181"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61727"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61729"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-1229"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-26958"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32280"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32281"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32282"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32283"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32289"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33186"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33810"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-34986"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-39882"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-4660"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-3xc5-wrhm-f963"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-6g7g-w4f8-9c9x"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-92mm-2pjq-r785"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-9h8m-3fm2-qjrq"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-fw7p-63qq-7hpr"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-p77j-4mvh-x3m3"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-q9hv-hpm4-hj6x"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-w8rr-5gcm-pp58"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-xmrv-pmrh-hhx2"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47913"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47914"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58181"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61727"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1229"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-26958"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32280"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32281"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32282"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32283"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32289"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33810"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34986"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-39882"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4660"
}
],
"related": [],
"schema_version": "1.7.3",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
],
"summary": "During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions",
"upstream": [
"CVE-2025-47913",
"CVE-2025-47914",
"CVE-2025-58181",
"CVE-2025-61727",
"CVE-2025-61729",
"CVE-2026-1229",
"CVE-2026-24051",
"CVE-2026-25679",
"CVE-2026-26958",
"CVE-2026-27139",
"CVE-2026-27142",
"CVE-2026-32280",
"CVE-2026-32281",
"CVE-2026-32282",
"CVE-2026-32283",
"CVE-2026-32289",
"CVE-2026-33186",
"CVE-2026-33810",
"CVE-2026-34986",
"CVE-2026-39882",
"CVE-2026-4660",
"ghsa-3xc5-wrhm-f963",
"ghsa-6g7g-w4f8-9c9x",
"ghsa-92mm-2pjq-r785",
"ghsa-9h8m-3fm2-qjrq",
"ghsa-fw7p-63qq-7hpr",
"ghsa-p77j-4mvh-x3m3",
"ghsa-q9hv-hpm4-hj6x",
"ghsa-w8rr-5gcm-pp58",
"ghsa-xmrv-pmrh-hhx2"
]
}
cleanstart-2026-kc83705
Vulnerability from cleanstart
Multiple security vulnerabilities affect the tempo package. During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions. See references for individual vulnerability details.
| URL | Type | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "tempo"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.9.0-r0"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the tempo package. During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-KC83705",
"modified": "2026-04-14T09:04:57Z",
"published": "2026-04-15T00:53:10.163760Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-KC83705.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-11065"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-22868"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61726"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61727"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61728"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61729"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61730"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-68119"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-28377"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32280"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32281"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32282"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32283"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32287"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32289"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33186"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33810"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-34986"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-2464-8j7c-4cjm"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-78h2-9frx-2jm8"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-cfpf-hrx2-8rv6"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-f6x5-jh6r-wrfv"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-fv92-fjc5-jj9h"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-j5w8-q4qc-rx2x"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-p77j-4mvh-x3m3"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-11065"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-22868"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61727"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61730"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68119"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-28377"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32280"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32281"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32282"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32283"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32287"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32289"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33810"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34986"
}
],
"related": [],
"schema_version": "1.7.3",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
],
"summary": "During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions",
"upstream": [
"CVE-2025-11065",
"CVE-2025-22868",
"CVE-2025-61726",
"CVE-2025-61727",
"CVE-2025-61728",
"CVE-2025-61729",
"CVE-2025-61730",
"CVE-2025-68119",
"CVE-2026-24051",
"CVE-2026-28377",
"CVE-2026-32280",
"CVE-2026-32281",
"CVE-2026-32282",
"CVE-2026-32283",
"CVE-2026-32287",
"CVE-2026-32289",
"CVE-2026-33186",
"CVE-2026-33810",
"CVE-2026-34986",
"ghsa-2464-8j7c-4cjm",
"ghsa-78h2-9frx-2jm8",
"ghsa-cfpf-hrx2-8rv6",
"ghsa-f6x5-jh6r-wrfv",
"ghsa-fv92-fjc5-jj9h",
"ghsa-j5w8-q4qc-rx2x",
"ghsa-p77j-4mvh-x3m3"
]
}
cleanstart-2026-cr55131
Vulnerability from cleanstart
Multiple security vulnerabilities affect the kyverno-policy-reporter-kyverno-plugin-fips package. During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions. See references for individual vulnerability details.
| URL | Type | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "kyverno-policy-reporter-kyverno-plugin-fips"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.6.4-r4"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the kyverno-policy-reporter-kyverno-plugin-fips package. During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-CR55131",
"modified": "2026-04-15T04:54:42Z",
"published": "2026-04-16T01:01:17.387205Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-CR55131.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61726"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61728"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61730"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-68121"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32280"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32281"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32282"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32283"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32289"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33810"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61730"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32280"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32281"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32282"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32283"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32289"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33810"
}
],
"related": [],
"schema_version": "1.7.3",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
],
"summary": "During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions",
"upstream": [
"CVE-2025-61726",
"CVE-2025-61728",
"CVE-2025-61730",
"CVE-2025-68121",
"CVE-2026-25679",
"CVE-2026-27139",
"CVE-2026-27142",
"CVE-2026-32280",
"CVE-2026-32281",
"CVE-2026-32282",
"CVE-2026-32283",
"CVE-2026-32289",
"CVE-2026-33810"
]
}
cleanstart-2026-cn84623
Vulnerability from cleanstart
Multiple security vulnerabilities affect the opentofu-fips package. Within HostnameError. See references for individual vulnerability details.
| URL | Type | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "opentofu-fips"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.9.4-r0"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the opentofu-fips package. Within HostnameError. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-CN84623",
"modified": "2026-04-29T09:12:44Z",
"published": "2026-04-30T00:53:26.653377Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-CN84623.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2020-8912"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2024-10005"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2024-10006"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-47913"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-47914"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-58181"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61726"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61727"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61728"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61729"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61730"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61732"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-68119"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-68121"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-24515"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-25210"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32280"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32281"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32282"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32283"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32289"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33186"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33810"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-34986"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-39882"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-39883"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-2464-8j7c-4cjm"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-2x5j-vhc8-9cwm"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-6v2p-p543-phr9"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-78h2-9frx-2jm8"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-c6gw-w398-hv78"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-fv92-fjc5-jj9h"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-hcg3-q754-cr77"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-hfvc-g4fc-pqhx"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-jc7w-c686-c4v9"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-mh63-6h87-95cp"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-p77j-4mvh-x3m3"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-q9hv-hpm4-hj6x"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-qxp5-gwg8-xv66"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-vvgc-356p-c3xw"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-w8rr-5gcm-pp58"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-wjrx-6529-hcj3"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-xmrv-pmrh-hhx2"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8912"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-10005"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-10006"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47913"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47914"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58181"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61727"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61730"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61732"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68119"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-24515"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25210"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32280"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32281"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32282"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32283"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32289"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33810"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34986"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-39882"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-39883"
}
],
"related": [],
"schema_version": "1.7.3",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
],
"summary": "Within HostnameError",
"upstream": [
"CVE-2020-8912",
"CVE-2024-10005",
"CVE-2024-10006",
"CVE-2025-47913",
"CVE-2025-47914",
"CVE-2025-58181",
"CVE-2025-61726",
"CVE-2025-61727",
"CVE-2025-61728",
"CVE-2025-61729",
"CVE-2025-61730",
"CVE-2025-61732",
"CVE-2025-68119",
"CVE-2025-68121",
"CVE-2026-24051",
"CVE-2026-24515",
"CVE-2026-25210",
"CVE-2026-25679",
"CVE-2026-27139",
"CVE-2026-27142",
"CVE-2026-32280",
"CVE-2026-32281",
"CVE-2026-32282",
"CVE-2026-32283",
"CVE-2026-32289",
"CVE-2026-33186",
"CVE-2026-33810",
"CVE-2026-34986",
"CVE-2026-39882",
"CVE-2026-39883",
"ghsa-2464-8j7c-4cjm",
"ghsa-2x5j-vhc8-9cwm",
"ghsa-6v2p-p543-phr9",
"ghsa-78h2-9frx-2jm8",
"ghsa-c6gw-w398-hv78",
"ghsa-fv92-fjc5-jj9h",
"ghsa-hcg3-q754-cr77",
"ghsa-hfvc-g4fc-pqhx",
"ghsa-jc7w-c686-c4v9",
"ghsa-mh63-6h87-95cp",
"ghsa-p77j-4mvh-x3m3",
"ghsa-q9hv-hpm4-hj6x",
"ghsa-qxp5-gwg8-xv66",
"ghsa-vvgc-356p-c3xw",
"ghsa-w8rr-5gcm-pp58",
"ghsa-wjrx-6529-hcj3",
"ghsa-xmrv-pmrh-hhx2"
]
}
cleanstart-2026-ac01087
Vulnerability from cleanstart
Multiple security vulnerabilities affect the gitness package. During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions. See references for individual vulnerability details.
| URL | Type | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "gitness"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "3.3.0-r1"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the gitness package. During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-AC01087",
"modified": "2026-04-09T09:55:12Z",
"published": "2026-04-10T01:03:59.042951Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-AC01087.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-22868"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-30153"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61726"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61728"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61729"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61730"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-68119"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32280"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32281"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32282"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32283"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32289"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33186"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33540"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33810"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-35172"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-4vq8-7jfc-9cvp"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-f6x5-jh6r-wrfv"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-j5w8-q4qc-rx2x"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-vrw8-fxc6-2r93"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-22868"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-30153"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61730"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68119"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32280"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32281"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32282"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32283"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32289"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33540"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33810"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-35172"
}
],
"related": [],
"schema_version": "1.7.3",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
],
"summary": "During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions",
"upstream": [
"CVE-2025-22868",
"CVE-2025-30153",
"CVE-2025-61726",
"CVE-2025-61728",
"CVE-2025-61729",
"CVE-2025-61730",
"CVE-2025-68119",
"CVE-2026-32280",
"CVE-2026-32281",
"CVE-2026-32282",
"CVE-2026-32283",
"CVE-2026-32289",
"CVE-2026-33186",
"CVE-2026-33540",
"CVE-2026-33810",
"CVE-2026-35172",
"ghsa-4vq8-7jfc-9cvp",
"ghsa-f6x5-jh6r-wrfv",
"ghsa-j5w8-q4qc-rx2x",
"ghsa-vrw8-fxc6-2r93"
]
}
cleanstart-2026-hq88036
Vulnerability from cleanstart
Multiple security vulnerabilities affect the terragrunt-fips package. During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions. See references for individual vulnerability details.
| URL | Type | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "terragrunt-fips"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.96.1-r4"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the terragrunt-fips package. During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-HQ88036",
"modified": "2026-04-29T07:41:49Z",
"published": "2026-04-30T01:00:58.604637Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-HQ88036.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-47913"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-47914"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-58181"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61727"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61729"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-1229"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-26958"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32280"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32281"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32282"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32283"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32285"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32289"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33186"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33810"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-34986"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-39882"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-4660"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-3xc5-wrhm-f963"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-6g7g-w4f8-9c9x"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-78h2-9frx-2jm8"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-92mm-2pjq-r785"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-9h8m-3fm2-qjrq"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-fw7p-63qq-7hpr"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-q9hv-hpm4-hj6x"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-w8rr-5gcm-pp58"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-xmrv-pmrh-hhx2"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47913"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47914"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58181"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61727"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1229"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-26958"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32280"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32281"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32282"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32283"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32285"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32289"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33810"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34986"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-39882"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4660"
}
],
"related": [],
"schema_version": "1.7.3",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
],
"summary": "During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions",
"upstream": [
"CVE-2025-47913",
"CVE-2025-47914",
"CVE-2025-58181",
"CVE-2025-61727",
"CVE-2025-61729",
"CVE-2026-1229",
"CVE-2026-24051",
"CVE-2026-25679",
"CVE-2026-26958",
"CVE-2026-27139",
"CVE-2026-27142",
"CVE-2026-32280",
"CVE-2026-32281",
"CVE-2026-32282",
"CVE-2026-32283",
"CVE-2026-32285",
"CVE-2026-32289",
"CVE-2026-33186",
"CVE-2026-33810",
"CVE-2026-34986",
"CVE-2026-39882",
"CVE-2026-4660",
"ghsa-3xc5-wrhm-f963",
"ghsa-6g7g-w4f8-9c9x",
"ghsa-78h2-9frx-2jm8",
"ghsa-92mm-2pjq-r785",
"ghsa-9h8m-3fm2-qjrq",
"ghsa-fw7p-63qq-7hpr",
"ghsa-q9hv-hpm4-hj6x",
"ghsa-w8rr-5gcm-pp58",
"ghsa-xmrv-pmrh-hhx2"
]
}
cleanstart-2026-dm93480
Vulnerability from cleanstart
Multiple security vulnerabilities affect the lvm-driver package. During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions. See references for individual vulnerability details.
| URL | Type | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "lvm-driver"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.7.0-r1"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the lvm-driver package. During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-DM93480",
"modified": "2026-04-09T09:11:04Z",
"published": "2026-04-10T01:06:00.088585Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-DM93480.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-22868"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-47911"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-58190"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32280"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32281"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32282"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32283"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32289"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33186"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33540"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33810"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-35172"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-22868"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47911"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58190"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32280"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32281"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32282"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32283"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32289"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33540"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33810"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-35172"
}
],
"related": [],
"schema_version": "1.7.3",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
],
"summary": "During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions",
"upstream": [
"CVE-2025-22868",
"CVE-2025-47911",
"CVE-2025-58190",
"CVE-2026-32280",
"CVE-2026-32281",
"CVE-2026-32282",
"CVE-2026-32283",
"CVE-2026-32289",
"CVE-2026-33186",
"CVE-2026-33540",
"CVE-2026-33810",
"CVE-2026-35172"
]
}
cleanstart-2026-fh63386
Vulnerability from cleanstart
Multiple security vulnerabilities affect the sealed-secrets package. When verifying a certificate chain containing excluded DNS constraints, these constraints are not correctly applied to wildcard DNS SANs which use a different case than the constraint. See references for individual vulnerability details.
| URL | Type | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "sealed-secrets"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.35.0-r1"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the sealed-secrets package. When verifying a certificate chain containing excluded DNS constraints, these constraints are not correctly applied to wildcard DNS SANs which use a different case than the constraint. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-FH63386",
"modified": "2026-04-13T10:06:48Z",
"published": "2026-04-14T00:44:12.807187Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-FH63386.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32280"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32281"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32282"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32283"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32289"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33810"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32280"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32281"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32282"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32283"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32289"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33810"
}
],
"related": [],
"schema_version": "1.7.3",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
],
"summary": "When verifying a certificate chain containing excluded DNS constraints, these constraints are not correctly applied to wildcard DNS SANs which use a different case than the constraint",
"upstream": [
"CVE-2026-25679",
"CVE-2026-27139",
"CVE-2026-27142",
"CVE-2026-32280",
"CVE-2026-32281",
"CVE-2026-32282",
"CVE-2026-32283",
"CVE-2026-32289",
"CVE-2026-33810"
]
}
cleanstart-2026-fb07695
Vulnerability from cleanstart
Multiple security vulnerabilities affect the velero-fips package. When verifying a certificate chain containing excluded DNS constraints, these constraints are not correctly applied to wildcard DNS SANs which use a different case than the constraint. See references for individual vulnerability details.
| URL | Type | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "velero-fips"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.17.2-r5"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the velero-fips package. When verifying a certificate chain containing excluded DNS constraints, these constraints are not correctly applied to wildcard DNS SANs which use a different case than the constraint. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-FB07695",
"modified": "2026-04-14T11:38:13Z",
"published": "2026-04-15T00:45:38.848496Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-FB07695.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61726"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61728"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61729"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61730"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-68119"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-68121"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32280"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32281"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32282"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32283"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32289"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33186"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33810"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-34986"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-39883"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-f6x5-jh6r-wrfv"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-j5w8-q4qc-rx2x"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-xmrv-pmrh-hhx2"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61730"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68119"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32280"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32281"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32282"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32283"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32289"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33810"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34986"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-39883"
}
],
"related": [],
"schema_version": "1.7.3",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
],
"summary": "When verifying a certificate chain containing excluded DNS constraints, these constraints are not correctly applied to wildcard DNS SANs which use a different case than the constraint",
"upstream": [
"CVE-2025-61726",
"CVE-2025-61728",
"CVE-2025-61729",
"CVE-2025-61730",
"CVE-2025-68119",
"CVE-2025-68121",
"CVE-2026-24051",
"CVE-2026-25679",
"CVE-2026-27139",
"CVE-2026-27142",
"CVE-2026-32280",
"CVE-2026-32281",
"CVE-2026-32282",
"CVE-2026-32283",
"CVE-2026-32289",
"CVE-2026-33186",
"CVE-2026-33810",
"CVE-2026-34986",
"CVE-2026-39883",
"ghsa-f6x5-jh6r-wrfv",
"ghsa-j5w8-q4qc-rx2x",
"ghsa-xmrv-pmrh-hhx2"
]
}
cleanstart-2026-do31246
Vulnerability from cleanstart
Multiple security vulnerabilities affect the terragrunt-fips package. During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions. See references for individual vulnerability details.
| URL | Type | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "terragrunt-fips"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.95.1-r4"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the terragrunt-fips package. During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-DO31246",
"modified": "2026-04-29T07:38:43Z",
"published": "2026-04-30T01:04:59.604515Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-DO31246.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-47913"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-47914"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-58181"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61726"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61727"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61728"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61729"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61730"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61732"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-68119"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-68121"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32280"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32281"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32282"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32283"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32285"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32289"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33186"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33810"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-39882"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-4660"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-3xc5-wrhm-f963"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-6g7g-w4f8-9c9x"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-92mm-2pjq-r785"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-9h8m-3fm2-qjrq"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-fw7p-63qq-7hpr"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-q9hv-hpm4-hj6x"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-w8rr-5gcm-pp58"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47913"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47914"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58181"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61727"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61730"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61732"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68119"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32280"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32281"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32282"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32283"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32285"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32289"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33810"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-39882"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4660"
}
],
"related": [],
"schema_version": "1.7.3",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
],
"summary": "During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions",
"upstream": [
"CVE-2025-47913",
"CVE-2025-47914",
"CVE-2025-58181",
"CVE-2025-61726",
"CVE-2025-61727",
"CVE-2025-61728",
"CVE-2025-61729",
"CVE-2025-61730",
"CVE-2025-61732",
"CVE-2025-68119",
"CVE-2025-68121",
"CVE-2026-25679",
"CVE-2026-27139",
"CVE-2026-27142",
"CVE-2026-32280",
"CVE-2026-32281",
"CVE-2026-32282",
"CVE-2026-32283",
"CVE-2026-32285",
"CVE-2026-32289",
"CVE-2026-33186",
"CVE-2026-33810",
"CVE-2026-39882",
"CVE-2026-4660",
"ghsa-3xc5-wrhm-f963",
"ghsa-6g7g-w4f8-9c9x",
"ghsa-92mm-2pjq-r785",
"ghsa-9h8m-3fm2-qjrq",
"ghsa-fw7p-63qq-7hpr",
"ghsa-q9hv-hpm4-hj6x",
"ghsa-w8rr-5gcm-pp58"
]
}
cleanstart-2026-dr81473
Vulnerability from cleanstart
Multiple security vulnerabilities affect the harbor-scanner-trivy-fips package. HashiCorp’s go-getter library up to v1. See references for individual vulnerability details.
| URL | Type | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "harbor-scanner-trivy-fips"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.35.1-r1"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the harbor-scanner-trivy-fips package. HashiCorp\u2019s go-getter library up to v1. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-DR81473",
"modified": "2026-04-15T06:15:46Z",
"published": "2026-04-16T00:55:21.838513Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-DR81473.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-15558"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-29923"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-54410"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32280"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32281"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32282"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32283"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32289"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33810"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-39883"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-4660"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-xmrv-pmrh-hhx2"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-15558"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-29923"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-54410"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32280"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32281"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32282"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32283"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32289"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33810"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-39883"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4660"
}
],
"related": [],
"schema_version": "1.7.3",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
],
"summary": "HashiCorp\u2019s go-getter library up to v1",
"upstream": [
"CVE-2025-15558",
"CVE-2025-29923",
"CVE-2025-54410",
"CVE-2026-32280",
"CVE-2026-32281",
"CVE-2026-32282",
"CVE-2026-32283",
"CVE-2026-32289",
"CVE-2026-33810",
"CVE-2026-39883",
"CVE-2026-4660",
"ghsa-xmrv-pmrh-hhx2"
]
}
cleanstart-2026-lk73694
Vulnerability from cleanstart
Multiple security vulnerabilities affect the sealed-secrets package. During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions. See references for individual vulnerability details.
| URL | Type | ||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "sealed-secrets"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.36.1-r0"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the sealed-secrets package. During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-LK73694",
"modified": "2026-04-13T05:21:32Z",
"published": "2026-04-14T00:43:42.897096Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-LK73694.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32280"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32281"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32282"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32283"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32289"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33810"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32280"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32281"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32282"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32283"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32289"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33810"
}
],
"related": [],
"schema_version": "1.7.3",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
],
"summary": "During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions",
"upstream": [
"CVE-2026-32280",
"CVE-2026-32281",
"CVE-2026-32282",
"CVE-2026-32283",
"CVE-2026-32289",
"CVE-2026-33810"
]
}
cleanstart-2026-bb70412
Vulnerability from cleanstart
Multiple security vulnerabilities affect the percona-xtradb-cluster-operator-fips package. During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions. See references for individual vulnerability details.
| URL | Type | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "percona-xtradb-cluster-operator-fips"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.18.0-r4"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the percona-xtradb-cluster-operator-fips package. During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-BB70412",
"modified": "2026-04-21T09:28:36Z",
"published": "2026-04-22T00:41:59.291167Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-BB70412.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61726"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61728"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61730"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61732"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-68119"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-68121"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-25518"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-26958"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32280"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32281"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32282"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32283"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32289"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33810"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-f6x5-jh6r-wrfv"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-j5w8-q4qc-rx2x"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-pc3f-x583-g7j2"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61730"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61732"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68119"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25518"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-26958"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32280"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32281"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32282"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32283"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32289"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33810"
}
],
"related": [],
"schema_version": "1.7.3",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
],
"summary": "During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions",
"upstream": [
"CVE-2025-61726",
"CVE-2025-61728",
"CVE-2025-61730",
"CVE-2025-61732",
"CVE-2025-68119",
"CVE-2025-68121",
"CVE-2026-25518",
"CVE-2026-25679",
"CVE-2026-26958",
"CVE-2026-27139",
"CVE-2026-27142",
"CVE-2026-32280",
"CVE-2026-32281",
"CVE-2026-32282",
"CVE-2026-32283",
"CVE-2026-32289",
"CVE-2026-33810",
"ghsa-f6x5-jh6r-wrfv",
"ghsa-j5w8-q4qc-rx2x",
"ghsa-pc3f-x583-g7j2"
]
}
SUSE-SU-2026:1320-1
Vulnerability from csaf_suse - Published: 2026-04-14 12:39 - Updated: 2026-04-14 12:39| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for go1.26",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for go1.26 fixes the following issues:\n\n- Update to go1.26.2 (bsc#1255111).\n- CVE-2026-27140: cmd/go: trust layer bypass when using cgo and SWIG (bsc#1261653).\n- CVE-2026-27143: cmd/compile: possible memory corruption after bound check elimination (bsc#1261654).\n- CVE-2026-27144: cmd/compile: no-op interface conversion bypasses overlap checking (bsc#1261655).\n- CVE-2026-32280: crypto/x509: unexpected work during chain building (bsc#1261656).\n- CVE-2026-32281: crypto/x509: inefficient policy validation (bsc#1261657).\n- CVE-2026-32282: os: Root.Chmod can follow symlinks out of the root on Linux (bsc#1261658).\n- CVE-2026-32283: crypto/tls: multiple key update handshake messages can cause connection to deadlock (bsc#1261659).\n- CVE-2026-32288: archive/tar: unbounded allocation when parsing old format GNU sparse map (bsc#1261660).\n- CVE-2026-32289: html/template: JS template literal context incorrectly tracked (bsc#1261661).\n- CVE-2026-33810: crypto/x509: excluded DNS constraints not properly applied to wildcard domains (bsc#1261662).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2026-1320,SUSE-SLE-Module-Development-Tools-15-SP7-2026-1320,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-1320,SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-1320,SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-1320,SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-1320,SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-1320,SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-1320,SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-1320,SUSE-SLE-Product-SLES_SAP-15-SP4-2026-1320,SUSE-SLE-Product-SLES_SAP-15-SP5-2026-1320,SUSE-SLE-Product-SLES_SAP-15-SP6-2026-1320",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_1320-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:1320-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20261320-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:1320-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2026-April/045527.html"
},
{
"category": "self",
"summary": "SUSE Bug 1255111",
"url": "https://bugzilla.suse.com/1255111"
},
{
"category": "self",
"summary": "SUSE Bug 1261653",
"url": "https://bugzilla.suse.com/1261653"
},
{
"category": "self",
"summary": "SUSE Bug 1261654",
"url": "https://bugzilla.suse.com/1261654"
},
{
"category": "self",
"summary": "SUSE Bug 1261655",
"url": "https://bugzilla.suse.com/1261655"
},
{
"category": "self",
"summary": "SUSE Bug 1261656",
"url": "https://bugzilla.suse.com/1261656"
},
{
"category": "self",
"summary": "SUSE Bug 1261657",
"url": "https://bugzilla.suse.com/1261657"
},
{
"category": "self",
"summary": "SUSE Bug 1261658",
"url": "https://bugzilla.suse.com/1261658"
},
{
"category": "self",
"summary": "SUSE Bug 1261659",
"url": "https://bugzilla.suse.com/1261659"
},
{
"category": "self",
"summary": "SUSE Bug 1261660",
"url": "https://bugzilla.suse.com/1261660"
},
{
"category": "self",
"summary": "SUSE Bug 1261661",
"url": "https://bugzilla.suse.com/1261661"
},
{
"category": "self",
"summary": "SUSE Bug 1261662",
"url": "https://bugzilla.suse.com/1261662"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-27140 page",
"url": "https://www.suse.com/security/cve/CVE-2026-27140/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-27143 page",
"url": "https://www.suse.com/security/cve/CVE-2026-27143/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-27144 page",
"url": "https://www.suse.com/security/cve/CVE-2026-27144/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-32280 page",
"url": "https://www.suse.com/security/cve/CVE-2026-32280/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-32281 page",
"url": "https://www.suse.com/security/cve/CVE-2026-32281/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-32282 page",
"url": "https://www.suse.com/security/cve/CVE-2026-32282/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-32283 page",
"url": "https://www.suse.com/security/cve/CVE-2026-32283/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-32288 page",
"url": "https://www.suse.com/security/cve/CVE-2026-32288/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-32289 page",
"url": "https://www.suse.com/security/cve/CVE-2026-32289/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-33810 page",
"url": "https://www.suse.com/security/cve/CVE-2026-33810/"
}
],
"title": "Security update for go1.26",
"tracking": {
"current_release_date": "2026-04-14T12:39:43Z",
"generator": {
"date": "2026-04-14T12:39:43Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:1320-1",
"initial_release_date": "2026-04-14T12:39:43Z",
"revision_history": [
{
"date": "2026-04-14T12:39:43Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "go1.26-1.26.2-150000.1.9.1.aarch64",
"product": {
"name": "go1.26-1.26.2-150000.1.9.1.aarch64",
"product_id": "go1.26-1.26.2-150000.1.9.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"product": {
"name": "go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"product_id": "go1.26-doc-1.26.2-150000.1.9.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.26-race-1.26.2-150000.1.9.1.aarch64",
"product": {
"name": "go1.26-race-1.26.2-150000.1.9.1.aarch64",
"product_id": "go1.26-race-1.26.2-150000.1.9.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.26-1.26.2-150000.1.9.1.i586",
"product": {
"name": "go1.26-1.26.2-150000.1.9.1.i586",
"product_id": "go1.26-1.26.2-150000.1.9.1.i586"
}
},
{
"category": "product_version",
"name": "go1.26-doc-1.26.2-150000.1.9.1.i586",
"product": {
"name": "go1.26-doc-1.26.2-150000.1.9.1.i586",
"product_id": "go1.26-doc-1.26.2-150000.1.9.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.26-1.26.2-150000.1.9.1.ppc64le",
"product": {
"name": "go1.26-1.26.2-150000.1.9.1.ppc64le",
"product_id": "go1.26-1.26.2-150000.1.9.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"product": {
"name": "go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"product_id": "go1.26-doc-1.26.2-150000.1.9.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"product": {
"name": "go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"product_id": "go1.26-race-1.26.2-150000.1.9.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.26-1.26.2-150000.1.9.1.s390x",
"product": {
"name": "go1.26-1.26.2-150000.1.9.1.s390x",
"product_id": "go1.26-1.26.2-150000.1.9.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.26-doc-1.26.2-150000.1.9.1.s390x",
"product": {
"name": "go1.26-doc-1.26.2-150000.1.9.1.s390x",
"product_id": "go1.26-doc-1.26.2-150000.1.9.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.26-race-1.26.2-150000.1.9.1.s390x",
"product": {
"name": "go1.26-race-1.26.2-150000.1.9.1.s390x",
"product_id": "go1.26-race-1.26.2-150000.1.9.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.26-1.26.2-150000.1.9.1.x86_64",
"product": {
"name": "go1.26-1.26.2-150000.1.9.1.x86_64",
"product_id": "go1.26-1.26.2-150000.1.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"product": {
"name": "go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"product_id": "go1.26-doc-1.26.2-150000.1.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.26-race-1.26.2-150000.1.9.1.x86_64",
"product": {
"name": "go1.26-race-1.26.2-150000.1.9.1.x86_64",
"product_id": "go1.26-race-1.26.2-150000.1.9.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-development-tools:15:sp7"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP6-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp6"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp6"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.2-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.aarch64"
},
"product_reference": "go1.26-1.26.2-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.2-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.ppc64le"
},
"product_reference": "go1.26-1.26.2-150000.1.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.2-150000.1.9.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.s390x"
},
"product_reference": "go1.26-1.26.2-150000.1.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.2-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.x86_64"
},
"product_reference": "go1.26-1.26.2-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.2-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.aarch64"
},
"product_reference": "go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.2-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.ppc64le"
},
"product_reference": "go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.2-150000.1.9.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.s390x"
},
"product_reference": "go1.26-doc-1.26.2-150000.1.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.2-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.x86_64"
},
"product_reference": "go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.2-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.aarch64"
},
"product_reference": "go1.26-race-1.26.2-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.2-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.ppc64le"
},
"product_reference": "go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.2-150000.1.9.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.s390x"
},
"product_reference": "go1.26-race-1.26.2-150000.1.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.2-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.x86_64"
},
"product_reference": "go1.26-race-1.26.2-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.2-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64"
},
"product_reference": "go1.26-1.26.2-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.2-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64"
},
"product_reference": "go1.26-1.26.2-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.2-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64"
},
"product_reference": "go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.2-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64"
},
"product_reference": "go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.2-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64"
},
"product_reference": "go1.26-race-1.26.2-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.2-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64"
},
"product_reference": "go1.26-race-1.26.2-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.2-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64"
},
"product_reference": "go1.26-1.26.2-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.2-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64"
},
"product_reference": "go1.26-1.26.2-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.2-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64"
},
"product_reference": "go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.2-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64"
},
"product_reference": "go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.2-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64"
},
"product_reference": "go1.26-race-1.26.2-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.2-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64"
},
"product_reference": "go1.26-race-1.26.2-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.2-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64"
},
"product_reference": "go1.26-1.26.2-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.2-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64"
},
"product_reference": "go1.26-1.26.2-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.2-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64"
},
"product_reference": "go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.2-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64"
},
"product_reference": "go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.2-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64"
},
"product_reference": "go1.26-race-1.26.2-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.2-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64"
},
"product_reference": "go1.26-race-1.26.2-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.2-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64"
},
"product_reference": "go1.26-1.26.2-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.2-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64"
},
"product_reference": "go1.26-1.26.2-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.2-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64"
},
"product_reference": "go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.2-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64"
},
"product_reference": "go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.2-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64"
},
"product_reference": "go1.26-race-1.26.2-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.2-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64"
},
"product_reference": "go1.26-race-1.26.2-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.2-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64"
},
"product_reference": "go1.26-1.26.2-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.2-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le"
},
"product_reference": "go1.26-1.26.2-150000.1.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.2-150000.1.9.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.s390x"
},
"product_reference": "go1.26-1.26.2-150000.1.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.2-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64"
},
"product_reference": "go1.26-1.26.2-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.2-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64"
},
"product_reference": "go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.2-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le"
},
"product_reference": "go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.2-150000.1.9.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x"
},
"product_reference": "go1.26-doc-1.26.2-150000.1.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.2-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64"
},
"product_reference": "go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.2-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64"
},
"product_reference": "go1.26-race-1.26.2-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.2-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le"
},
"product_reference": "go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.2-150000.1.9.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x"
},
"product_reference": "go1.26-race-1.26.2-150000.1.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.2-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64"
},
"product_reference": "go1.26-race-1.26.2-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.2-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64"
},
"product_reference": "go1.26-1.26.2-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.2-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le"
},
"product_reference": "go1.26-1.26.2-150000.1.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.2-150000.1.9.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.s390x"
},
"product_reference": "go1.26-1.26.2-150000.1.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.2-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64"
},
"product_reference": "go1.26-1.26.2-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.2-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64"
},
"product_reference": "go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.2-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le"
},
"product_reference": "go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.2-150000.1.9.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x"
},
"product_reference": "go1.26-doc-1.26.2-150000.1.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.2-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64"
},
"product_reference": "go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.2-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64"
},
"product_reference": "go1.26-race-1.26.2-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.2-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le"
},
"product_reference": "go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.2-150000.1.9.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x"
},
"product_reference": "go1.26-race-1.26.2-150000.1.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.2-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64"
},
"product_reference": "go1.26-race-1.26.2-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.2-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64"
},
"product_reference": "go1.26-1.26.2-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.2-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le"
},
"product_reference": "go1.26-1.26.2-150000.1.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.2-150000.1.9.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.s390x"
},
"product_reference": "go1.26-1.26.2-150000.1.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.2-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64"
},
"product_reference": "go1.26-1.26.2-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.2-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64"
},
"product_reference": "go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.2-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le"
},
"product_reference": "go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.2-150000.1.9.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x"
},
"product_reference": "go1.26-doc-1.26.2-150000.1.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.2-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64"
},
"product_reference": "go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.2-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64"
},
"product_reference": "go1.26-race-1.26.2-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.2-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le"
},
"product_reference": "go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.2-150000.1.9.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x"
},
"product_reference": "go1.26-race-1.26.2-150000.1.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.2-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64"
},
"product_reference": "go1.26-race-1.26.2-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.2-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.ppc64le"
},
"product_reference": "go1.26-1.26.2-150000.1.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.2-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.x86_64"
},
"product_reference": "go1.26-1.26.2-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.2-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.ppc64le"
},
"product_reference": "go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.2-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.x86_64"
},
"product_reference": "go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.2-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.ppc64le"
},
"product_reference": "go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.2-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.x86_64"
},
"product_reference": "go1.26-race-1.26.2-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.2-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.ppc64le"
},
"product_reference": "go1.26-1.26.2-150000.1.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.2-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.x86_64"
},
"product_reference": "go1.26-1.26.2-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.2-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.ppc64le"
},
"product_reference": "go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.2-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.x86_64"
},
"product_reference": "go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.2-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.ppc64le"
},
"product_reference": "go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.2-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.x86_64"
},
"product_reference": "go1.26-race-1.26.2-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.2-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.ppc64le"
},
"product_reference": "go1.26-1.26.2-150000.1.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.2-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.x86_64"
},
"product_reference": "go1.26-1.26.2-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.2-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.ppc64le"
},
"product_reference": "go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.2-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.x86_64"
},
"product_reference": "go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.2-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.ppc64le"
},
"product_reference": "go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.2-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.x86_64"
},
"product_reference": "go1.26-race-1.26.2-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-27140",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-27140"
}
],
"notes": [
{
"category": "general",
"text": "SWIG file names containing \u0027cgo\u0027 and well-crafted payloads could lead to code smuggling and arbitrary code execution at build time due to trust layer bypass.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-27140",
"url": "https://www.suse.com/security/cve/CVE-2026-27140"
},
{
"category": "external",
"summary": "SUSE Bug 1261653 for CVE-2026-27140",
"url": "https://bugzilla.suse.com/1261653"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-14T12:39:43Z",
"details": "important"
}
],
"title": "CVE-2026-27140"
},
{
"cve": "CVE-2026-27143",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-27143"
}
],
"notes": [
{
"category": "general",
"text": "Arithmetic over induction variables in loops were not correctly checked for underflow or overflow. As a result, the compiler would allow for invalid indexing to occur at runtime, potentially leading to memory corruption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-27143",
"url": "https://www.suse.com/security/cve/CVE-2026-27143"
},
{
"category": "external",
"summary": "SUSE Bug 1261654 for CVE-2026-27143",
"url": "https://bugzilla.suse.com/1261654"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-14T12:39:43Z",
"details": "important"
}
],
"title": "CVE-2026-27143"
},
{
"cve": "CVE-2026-27144",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-27144"
}
],
"notes": [
{
"category": "general",
"text": "The compiler is meant to unwrap pointers which are the operands of a memory move; a no-op interface conversion prevented the compiler from making the correct determination about non-overlapping moves, potentially leading to memory corruption at runtime.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-27144",
"url": "https://www.suse.com/security/cve/CVE-2026-27144"
},
{
"category": "external",
"summary": "SUSE Bug 1261655 for CVE-2026-27144",
"url": "https://bugzilla.suse.com/1261655"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-14T12:39:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-27144"
},
{
"cve": "CVE-2026-32280",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-32280"
}
],
"notes": [
{
"category": "general",
"text": "During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions.Intermediates, which can lead to a denial of service. This affects both direct users of crypto/x509 and users of crypto/tls.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-32280",
"url": "https://www.suse.com/security/cve/CVE-2026-32280"
},
{
"category": "external",
"summary": "SUSE Bug 1261656 for CVE-2026-32280",
"url": "https://bugzilla.suse.com/1261656"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-14T12:39:43Z",
"details": "important"
}
],
"title": "CVE-2026-32280"
},
{
"cve": "CVE-2026-32281",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-32281"
}
],
"notes": [
{
"category": "general",
"text": "Validating certificate chains which use policies is unexpectedly inefficient when certificates in the chain contain a very large number of policy mappings, possibly causing denial of service. This only affects validation of otherwise trusted certificate chains, issued by a root CA in the VerifyOptions.Roots CertPool, or in the system certificate pool.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-32281",
"url": "https://www.suse.com/security/cve/CVE-2026-32281"
},
{
"category": "external",
"summary": "SUSE Bug 1261657 for CVE-2026-32281",
"url": "https://bugzilla.suse.com/1261657"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-14T12:39:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-32281"
},
{
"cve": "CVE-2026-32282",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-32282"
}
],
"notes": [
{
"category": "general",
"text": "On Linux, if the target of Root.Chmod is replaced with a symlink while the chmod operation is in progress, Chmod can operate on the target of the symlink, even when the target lies outside the root. The Linux fchmodat syscall silently ignores the AT_SYMLINK_NOFOLLOW flag, which Root.Chmod uses to avoid symlink traversal. Root.Chmod checks its target before acting and returns an error if the target is a symlink lying outside the root, so the impact is limited to cases where the target is replaced with a symlink between the check and operation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-32282",
"url": "https://www.suse.com/security/cve/CVE-2026-32282"
},
{
"category": "external",
"summary": "SUSE Bug 1261658 for CVE-2026-32282",
"url": "https://bugzilla.suse.com/1261658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-14T12:39:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-32282"
},
{
"cve": "CVE-2026-32283",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-32283"
}
],
"notes": [
{
"category": "general",
"text": "If one side of the TLS connection sends multiple key update messages post-handshake in a single record, the connection can deadlock, causing uncontrolled consumption of resources. This can lead to a denial of service. This only affects TLS 1.3.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-32283",
"url": "https://www.suse.com/security/cve/CVE-2026-32283"
},
{
"category": "external",
"summary": "SUSE Bug 1261659 for CVE-2026-32283",
"url": "https://bugzilla.suse.com/1261659"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-14T12:39:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-32283"
},
{
"cve": "CVE-2026-32288",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-32288"
}
],
"notes": [
{
"category": "general",
"text": "tar.Reader can allocate an unbounded amount of memory when reading a maliciously-crafted archive containing a large number of sparse regions encoded in the \"old GNU sparse map\" format.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-32288",
"url": "https://www.suse.com/security/cve/CVE-2026-32288"
},
{
"category": "external",
"summary": "SUSE Bug 1261660 for CVE-2026-32288",
"url": "https://bugzilla.suse.com/1261660"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-14T12:39:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-32288"
},
{
"cve": "CVE-2026-32289",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-32289"
}
],
"notes": [
{
"category": "general",
"text": "Context was not properly tracked across template branches for JS template literals, leading to possibly incorrect escaping of content when branches were used. Additionally template actions within JS template literals did not properly track the brace depth, leading to incorrect escaping being applied. These issues could cause actions within JS template literals to be incorrectly or improperly escaped, leading to XSS vulnerabilities.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-32289",
"url": "https://www.suse.com/security/cve/CVE-2026-32289"
},
{
"category": "external",
"summary": "SUSE Bug 1261661 for CVE-2026-32289",
"url": "https://bugzilla.suse.com/1261661"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-14T12:39:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-32289"
},
{
"cve": "CVE-2026-33810",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-33810"
}
],
"notes": [
{
"category": "general",
"text": "When verifying a certificate chain containing excluded DNS constraints, these constraints are not correctly applied to wildcard DNS SANs which use a different case than the constraint. This only affects validation of otherwise trusted certificate chains, issued by a root CA in the VerifyOptions.Roots CertPool, or in the system certificate pool.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-33810",
"url": "https://www.suse.com/security/cve/CVE-2026-33810"
},
{
"category": "external",
"summary": "SUSE Bug 1261662 for CVE-2026-33810",
"url": "https://bugzilla.suse.com/1261662"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-14T12:39:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-33810"
}
]
}
SUSE-SU-2026:1580-1
Vulnerability from csaf_suse - Published: 2026-04-23 16:38 - Updated: 2026-04-23 16:38| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for go1.26-openssl",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for go1.26-openssl fixes the following issues:\n\n- Update to go1.26.2 (bsc#1255111).\n- CVE-2026-27140: cmd/go: trust layer bypass when using cgo and SWIG (bsc#1261653).\n- CVE-2026-27143: cmd/compile: possible memory corruption after bound check elimination (bsc#1261654).\n- CVE-2026-27144: cmd/compile: no-op interface conversion bypasses overlap checking (bsc#1261655).\n- CVE-2026-32280: crypto/x509: unexpected work during chain building (bsc#1261656).\n- CVE-2026-32281: crypto/x509: inefficient policy validation (bsc#1261657).\n- CVE-2026-32282: os: Root.Chmod can follow symlinks out of the root on Linux (bsc#1261658).\n- CVE-2026-32283: crypto/tls: multiple key update handshake messages can cause connection to deadlock (bsc#1261659).\n- CVE-2026-32288: archive/tar: unbounded allocation when parsing old format GNU sparse map (bsc#1261660).\n- CVE-2026-32289: html/template: JS template literal context incorrectly tracked (bsc#1261661).\n- CVE-2026-33810: crypto/x509: excluded DNS constraints not properly applied to wildcard domains (bsc#1261662).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2026-1580,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-1580,SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-1580,SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-1580,SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-1580,SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-1580,SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-1580,SUSE-SLE-Product-SLES_SAP-15-SP4-2026-1580,SUSE-SLE-Product-SLES_SAP-15-SP5-2026-1580",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_1580-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:1580-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20261580-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:1580-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2026-April/045927.html"
},
{
"category": "self",
"summary": "SUSE Bug 1255111",
"url": "https://bugzilla.suse.com/1255111"
},
{
"category": "self",
"summary": "SUSE Bug 1261653",
"url": "https://bugzilla.suse.com/1261653"
},
{
"category": "self",
"summary": "SUSE Bug 1261654",
"url": "https://bugzilla.suse.com/1261654"
},
{
"category": "self",
"summary": "SUSE Bug 1261655",
"url": "https://bugzilla.suse.com/1261655"
},
{
"category": "self",
"summary": "SUSE Bug 1261656",
"url": "https://bugzilla.suse.com/1261656"
},
{
"category": "self",
"summary": "SUSE Bug 1261657",
"url": "https://bugzilla.suse.com/1261657"
},
{
"category": "self",
"summary": "SUSE Bug 1261658",
"url": "https://bugzilla.suse.com/1261658"
},
{
"category": "self",
"summary": "SUSE Bug 1261659",
"url": "https://bugzilla.suse.com/1261659"
},
{
"category": "self",
"summary": "SUSE Bug 1261660",
"url": "https://bugzilla.suse.com/1261660"
},
{
"category": "self",
"summary": "SUSE Bug 1261661",
"url": "https://bugzilla.suse.com/1261661"
},
{
"category": "self",
"summary": "SUSE Bug 1261662",
"url": "https://bugzilla.suse.com/1261662"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-27140 page",
"url": "https://www.suse.com/security/cve/CVE-2026-27140/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-27143 page",
"url": "https://www.suse.com/security/cve/CVE-2026-27143/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-27144 page",
"url": "https://www.suse.com/security/cve/CVE-2026-27144/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-32280 page",
"url": "https://www.suse.com/security/cve/CVE-2026-32280/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-32281 page",
"url": "https://www.suse.com/security/cve/CVE-2026-32281/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-32282 page",
"url": "https://www.suse.com/security/cve/CVE-2026-32282/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-32283 page",
"url": "https://www.suse.com/security/cve/CVE-2026-32283/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-32288 page",
"url": "https://www.suse.com/security/cve/CVE-2026-32288/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-32289 page",
"url": "https://www.suse.com/security/cve/CVE-2026-32289/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-33810 page",
"url": "https://www.suse.com/security/cve/CVE-2026-33810/"
}
],
"title": "Security update for go1.26-openssl",
"tracking": {
"current_release_date": "2026-04-23T16:38:35Z",
"generator": {
"date": "2026-04-23T16:38:35Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:1580-1",
"initial_release_date": "2026-04-23T16:38:35Z",
"revision_history": [
{
"date": "2026-04-23T16:38:35Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"product": {
"name": "go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"product_id": "go1.26-openssl-1.26.2-150000.1.6.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"product": {
"name": "go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"product_id": "go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"product": {
"name": "go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"product_id": "go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.26-openssl-1.26.2-150000.1.6.1.i586",
"product": {
"name": "go1.26-openssl-1.26.2-150000.1.6.1.i586",
"product_id": "go1.26-openssl-1.26.2-150000.1.6.1.i586"
}
},
{
"category": "product_version",
"name": "go1.26-openssl-doc-1.26.2-150000.1.6.1.i586",
"product": {
"name": "go1.26-openssl-doc-1.26.2-150000.1.6.1.i586",
"product_id": "go1.26-openssl-doc-1.26.2-150000.1.6.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"product": {
"name": "go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"product_id": "go1.26-openssl-1.26.2-150000.1.6.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"product": {
"name": "go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"product_id": "go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"product": {
"name": "go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"product_id": "go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"product": {
"name": "go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"product_id": "go1.26-openssl-1.26.2-150000.1.6.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"product": {
"name": "go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"product_id": "go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"product": {
"name": "go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"product_id": "go1.26-openssl-race-1.26.2-150000.1.6.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"product": {
"name": "go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"product_id": "go1.26-openssl-1.26.2-150000.1.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"product": {
"name": "go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"product_id": "go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"product": {
"name": "go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"product_id": "go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-1.26.2-150000.1.6.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64"
},
"product_reference": "go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-1.26.2-150000.1.6.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64"
},
"product_reference": "go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64"
},
"product_reference": "go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64"
},
"product_reference": "go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64"
},
"product_reference": "go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64"
},
"product_reference": "go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-1.26.2-150000.1.6.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64"
},
"product_reference": "go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-1.26.2-150000.1.6.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64"
},
"product_reference": "go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64"
},
"product_reference": "go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64"
},
"product_reference": "go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64"
},
"product_reference": "go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64"
},
"product_reference": "go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-1.26.2-150000.1.6.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64"
},
"product_reference": "go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-1.26.2-150000.1.6.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64"
},
"product_reference": "go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64"
},
"product_reference": "go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64"
},
"product_reference": "go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64"
},
"product_reference": "go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64"
},
"product_reference": "go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-1.26.2-150000.1.6.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64"
},
"product_reference": "go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-1.26.2-150000.1.6.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64"
},
"product_reference": "go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64"
},
"product_reference": "go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64"
},
"product_reference": "go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64"
},
"product_reference": "go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64"
},
"product_reference": "go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-1.26.2-150000.1.6.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64"
},
"product_reference": "go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-1.26.2-150000.1.6.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le"
},
"product_reference": "go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-1.26.2-150000.1.6.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x"
},
"product_reference": "go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-1.26.2-150000.1.6.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64"
},
"product_reference": "go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64"
},
"product_reference": "go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le"
},
"product_reference": "go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x"
},
"product_reference": "go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64"
},
"product_reference": "go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64"
},
"product_reference": "go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le"
},
"product_reference": "go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-race-1.26.2-150000.1.6.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x"
},
"product_reference": "go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64"
},
"product_reference": "go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-1.26.2-150000.1.6.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64"
},
"product_reference": "go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-1.26.2-150000.1.6.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le"
},
"product_reference": "go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-1.26.2-150000.1.6.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x"
},
"product_reference": "go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-1.26.2-150000.1.6.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64"
},
"product_reference": "go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64"
},
"product_reference": "go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le"
},
"product_reference": "go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x"
},
"product_reference": "go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64"
},
"product_reference": "go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64"
},
"product_reference": "go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le"
},
"product_reference": "go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-race-1.26.2-150000.1.6.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x"
},
"product_reference": "go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64"
},
"product_reference": "go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-1.26.2-150000.1.6.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le"
},
"product_reference": "go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-1.26.2-150000.1.6.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.x86_64"
},
"product_reference": "go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le"
},
"product_reference": "go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64"
},
"product_reference": "go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le"
},
"product_reference": "go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64"
},
"product_reference": "go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-1.26.2-150000.1.6.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le"
},
"product_reference": "go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-1.26.2-150000.1.6.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.x86_64"
},
"product_reference": "go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le"
},
"product_reference": "go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64"
},
"product_reference": "go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le"
},
"product_reference": "go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64"
},
"product_reference": "go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-27140",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-27140"
}
],
"notes": [
{
"category": "general",
"text": "SWIG file names containing \u0027cgo\u0027 and well-crafted payloads could lead to code smuggling and arbitrary code execution at build time due to trust layer bypass.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-27140",
"url": "https://www.suse.com/security/cve/CVE-2026-27140"
},
{
"category": "external",
"summary": "SUSE Bug 1261653 for CVE-2026-27140",
"url": "https://bugzilla.suse.com/1261653"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-23T16:38:35Z",
"details": "important"
}
],
"title": "CVE-2026-27140"
},
{
"cve": "CVE-2026-27143",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-27143"
}
],
"notes": [
{
"category": "general",
"text": "Arithmetic over induction variables in loops were not correctly checked for underflow or overflow. As a result, the compiler would allow for invalid indexing to occur at runtime, potentially leading to memory corruption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-27143",
"url": "https://www.suse.com/security/cve/CVE-2026-27143"
},
{
"category": "external",
"summary": "SUSE Bug 1261654 for CVE-2026-27143",
"url": "https://bugzilla.suse.com/1261654"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-23T16:38:35Z",
"details": "important"
}
],
"title": "CVE-2026-27143"
},
{
"cve": "CVE-2026-27144",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-27144"
}
],
"notes": [
{
"category": "general",
"text": "The compiler is meant to unwrap pointers which are the operands of a memory move; a no-op interface conversion prevented the compiler from making the correct determination about non-overlapping moves, potentially leading to memory corruption at runtime.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-27144",
"url": "https://www.suse.com/security/cve/CVE-2026-27144"
},
{
"category": "external",
"summary": "SUSE Bug 1261655 for CVE-2026-27144",
"url": "https://bugzilla.suse.com/1261655"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-23T16:38:35Z",
"details": "moderate"
}
],
"title": "CVE-2026-27144"
},
{
"cve": "CVE-2026-32280",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-32280"
}
],
"notes": [
{
"category": "general",
"text": "During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions.Intermediates, which can lead to a denial of service. This affects both direct users of crypto/x509 and users of crypto/tls.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-32280",
"url": "https://www.suse.com/security/cve/CVE-2026-32280"
},
{
"category": "external",
"summary": "SUSE Bug 1261656 for CVE-2026-32280",
"url": "https://bugzilla.suse.com/1261656"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-23T16:38:35Z",
"details": "important"
}
],
"title": "CVE-2026-32280"
},
{
"cve": "CVE-2026-32281",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-32281"
}
],
"notes": [
{
"category": "general",
"text": "Validating certificate chains which use policies is unexpectedly inefficient when certificates in the chain contain a very large number of policy mappings, possibly causing denial of service. This only affects validation of otherwise trusted certificate chains, issued by a root CA in the VerifyOptions.Roots CertPool, or in the system certificate pool.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-32281",
"url": "https://www.suse.com/security/cve/CVE-2026-32281"
},
{
"category": "external",
"summary": "SUSE Bug 1261657 for CVE-2026-32281",
"url": "https://bugzilla.suse.com/1261657"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-23T16:38:35Z",
"details": "moderate"
}
],
"title": "CVE-2026-32281"
},
{
"cve": "CVE-2026-32282",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-32282"
}
],
"notes": [
{
"category": "general",
"text": "On Linux, if the target of Root.Chmod is replaced with a symlink while the chmod operation is in progress, Chmod can operate on the target of the symlink, even when the target lies outside the root. The Linux fchmodat syscall silently ignores the AT_SYMLINK_NOFOLLOW flag, which Root.Chmod uses to avoid symlink traversal. Root.Chmod checks its target before acting and returns an error if the target is a symlink lying outside the root, so the impact is limited to cases where the target is replaced with a symlink between the check and operation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-32282",
"url": "https://www.suse.com/security/cve/CVE-2026-32282"
},
{
"category": "external",
"summary": "SUSE Bug 1261658 for CVE-2026-32282",
"url": "https://bugzilla.suse.com/1261658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-23T16:38:35Z",
"details": "moderate"
}
],
"title": "CVE-2026-32282"
},
{
"cve": "CVE-2026-32283",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-32283"
}
],
"notes": [
{
"category": "general",
"text": "If one side of the TLS connection sends multiple key update messages post-handshake in a single record, the connection can deadlock, causing uncontrolled consumption of resources. This can lead to a denial of service. This only affects TLS 1.3.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-32283",
"url": "https://www.suse.com/security/cve/CVE-2026-32283"
},
{
"category": "external",
"summary": "SUSE Bug 1261659 for CVE-2026-32283",
"url": "https://bugzilla.suse.com/1261659"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-23T16:38:35Z",
"details": "moderate"
}
],
"title": "CVE-2026-32283"
},
{
"cve": "CVE-2026-32288",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-32288"
}
],
"notes": [
{
"category": "general",
"text": "tar.Reader can allocate an unbounded amount of memory when reading a maliciously-crafted archive containing a large number of sparse regions encoded in the \"old GNU sparse map\" format.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-32288",
"url": "https://www.suse.com/security/cve/CVE-2026-32288"
},
{
"category": "external",
"summary": "SUSE Bug 1261660 for CVE-2026-32288",
"url": "https://bugzilla.suse.com/1261660"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-23T16:38:35Z",
"details": "moderate"
}
],
"title": "CVE-2026-32288"
},
{
"cve": "CVE-2026-32289",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-32289"
}
],
"notes": [
{
"category": "general",
"text": "Context was not properly tracked across template branches for JS template literals, leading to possibly incorrect escaping of content when branches were used. Additionally template actions within JS template literals did not properly track the brace depth, leading to incorrect escaping being applied. These issues could cause actions within JS template literals to be incorrectly or improperly escaped, leading to XSS vulnerabilities.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-32289",
"url": "https://www.suse.com/security/cve/CVE-2026-32289"
},
{
"category": "external",
"summary": "SUSE Bug 1261661 for CVE-2026-32289",
"url": "https://bugzilla.suse.com/1261661"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-23T16:38:35Z",
"details": "moderate"
}
],
"title": "CVE-2026-32289"
},
{
"cve": "CVE-2026-33810",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-33810"
}
],
"notes": [
{
"category": "general",
"text": "When verifying a certificate chain containing excluded DNS constraints, these constraints are not correctly applied to wildcard DNS SANs which use a different case than the constraint. This only affects validation of otherwise trusted certificate chains, issued by a root CA in the VerifyOptions.Roots CertPool, or in the system certificate pool.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-33810",
"url": "https://www.suse.com/security/cve/CVE-2026-33810"
},
{
"category": "external",
"summary": "SUSE Bug 1261662 for CVE-2026-33810",
"url": "https://bugzilla.suse.com/1261662"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-23T16:38:35Z",
"details": "moderate"
}
],
"title": "CVE-2026-33810"
}
]
}
SUSE-SU-2026:21356-1
Vulnerability from csaf_suse - Published: 2026-04-20 14:00 - Updated: 2026-04-20 14:00| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for go1.26",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for go1.26 fixes the following issues:\n\n- Update to version go1.26.2 (bsc#1255111).\n- CVE-2026-27140: cmd/go: trust layer bypass when using cgo and SWIG (bsc#1261653).\n- CVE-2026-27143: cmd/compile: possible memory corruption after bound check elimination (bsc#1261654).\n- CVE-2026-27144: cmd/compile: no-op interface conversion bypasses overlap checking (bsc#1261655).\n- CVE-2026-32280: crypto/x509: unexpected work during chain building (bsc#1261656).\n- CVE-2026-32281: crypto/x509: inefficient policy validation (bsc#1261657).\n- CVE-2026-32282: os: Root.Chmod can follow symlinks out of the root on Linux (bsc#1261658).\n- CVE-2026-32283: crypto/tls: multiple key update handshake messages can cause connection to deadlock (bsc#1261659).\n- CVE-2026-32288: archive/tar: unbounded allocation when parsing old format GNU sparse map (bsc#1261660).\n- CVE-2026-32289: html/template: JS template literal context incorrectly tracked (bsc#1261661).\n- CVE-2026-33810: crypto/x509: excluded DNS constraints not properly applied to wildcard domains (bsc#1261662).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLES-16.0-595",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_21356-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:21356-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202621356-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:21356-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2026-April/046085.html"
},
{
"category": "self",
"summary": "SUSE Bug 1255111",
"url": "https://bugzilla.suse.com/1255111"
},
{
"category": "self",
"summary": "SUSE Bug 1261653",
"url": "https://bugzilla.suse.com/1261653"
},
{
"category": "self",
"summary": "SUSE Bug 1261654",
"url": "https://bugzilla.suse.com/1261654"
},
{
"category": "self",
"summary": "SUSE Bug 1261655",
"url": "https://bugzilla.suse.com/1261655"
},
{
"category": "self",
"summary": "SUSE Bug 1261656",
"url": "https://bugzilla.suse.com/1261656"
},
{
"category": "self",
"summary": "SUSE Bug 1261657",
"url": "https://bugzilla.suse.com/1261657"
},
{
"category": "self",
"summary": "SUSE Bug 1261658",
"url": "https://bugzilla.suse.com/1261658"
},
{
"category": "self",
"summary": "SUSE Bug 1261659",
"url": "https://bugzilla.suse.com/1261659"
},
{
"category": "self",
"summary": "SUSE Bug 1261660",
"url": "https://bugzilla.suse.com/1261660"
},
{
"category": "self",
"summary": "SUSE Bug 1261661",
"url": "https://bugzilla.suse.com/1261661"
},
{
"category": "self",
"summary": "SUSE Bug 1261662",
"url": "https://bugzilla.suse.com/1261662"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-27140 page",
"url": "https://www.suse.com/security/cve/CVE-2026-27140/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-27143 page",
"url": "https://www.suse.com/security/cve/CVE-2026-27143/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-27144 page",
"url": "https://www.suse.com/security/cve/CVE-2026-27144/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-32280 page",
"url": "https://www.suse.com/security/cve/CVE-2026-32280/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-32281 page",
"url": "https://www.suse.com/security/cve/CVE-2026-32281/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-32282 page",
"url": "https://www.suse.com/security/cve/CVE-2026-32282/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-32283 page",
"url": "https://www.suse.com/security/cve/CVE-2026-32283/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-32288 page",
"url": "https://www.suse.com/security/cve/CVE-2026-32288/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-32289 page",
"url": "https://www.suse.com/security/cve/CVE-2026-32289/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-33810 page",
"url": "https://www.suse.com/security/cve/CVE-2026-33810/"
}
],
"title": "Security update for go1.26",
"tracking": {
"current_release_date": "2026-04-20T14:00:06Z",
"generator": {
"date": "2026-04-20T14:00:06Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:21356-1",
"initial_release_date": "2026-04-20T14:00:06Z",
"revision_history": [
{
"date": "2026-04-20T14:00:06Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "go1.26-1.26.2-160000.1.1.aarch64",
"product": {
"name": "go1.26-1.26.2-160000.1.1.aarch64",
"product_id": "go1.26-1.26.2-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.26-doc-1.26.2-160000.1.1.aarch64",
"product": {
"name": "go1.26-doc-1.26.2-160000.1.1.aarch64",
"product_id": "go1.26-doc-1.26.2-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.26-libstd-1.26.2-160000.1.1.aarch64",
"product": {
"name": "go1.26-libstd-1.26.2-160000.1.1.aarch64",
"product_id": "go1.26-libstd-1.26.2-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.26-race-1.26.2-160000.1.1.aarch64",
"product": {
"name": "go1.26-race-1.26.2-160000.1.1.aarch64",
"product_id": "go1.26-race-1.26.2-160000.1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.26-1.26.2-160000.1.1.ppc64le",
"product": {
"name": "go1.26-1.26.2-160000.1.1.ppc64le",
"product_id": "go1.26-1.26.2-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.26-doc-1.26.2-160000.1.1.ppc64le",
"product": {
"name": "go1.26-doc-1.26.2-160000.1.1.ppc64le",
"product_id": "go1.26-doc-1.26.2-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.26-race-1.26.2-160000.1.1.ppc64le",
"product": {
"name": "go1.26-race-1.26.2-160000.1.1.ppc64le",
"product_id": "go1.26-race-1.26.2-160000.1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.26-1.26.2-160000.1.1.s390x",
"product": {
"name": "go1.26-1.26.2-160000.1.1.s390x",
"product_id": "go1.26-1.26.2-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.26-doc-1.26.2-160000.1.1.s390x",
"product": {
"name": "go1.26-doc-1.26.2-160000.1.1.s390x",
"product_id": "go1.26-doc-1.26.2-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.26-race-1.26.2-160000.1.1.s390x",
"product": {
"name": "go1.26-race-1.26.2-160000.1.1.s390x",
"product_id": "go1.26-race-1.26.2-160000.1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.26-1.26.2-160000.1.1.x86_64",
"product": {
"name": "go1.26-1.26.2-160000.1.1.x86_64",
"product_id": "go1.26-1.26.2-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.26-doc-1.26.2-160000.1.1.x86_64",
"product": {
"name": "go1.26-doc-1.26.2-160000.1.1.x86_64",
"product_id": "go1.26-doc-1.26.2-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.26-libstd-1.26.2-160000.1.1.x86_64",
"product": {
"name": "go1.26-libstd-1.26.2-160000.1.1.x86_64",
"product_id": "go1.26-libstd-1.26.2-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.26-race-1.26.2-160000.1.1.x86_64",
"product": {
"name": "go1.26-race-1.26.2-160000.1.1.x86_64",
"product_id": "go1.26-race-1.26.2-160000.1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 16.0",
"product": {
"name": "SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:16:16.0:server"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP applications 16.0",
"product": {
"name": "SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:16:16.0:server-sap"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.2-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.aarch64"
},
"product_reference": "go1.26-1.26.2-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.2-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.ppc64le"
},
"product_reference": "go1.26-1.26.2-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.2-160000.1.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.s390x"
},
"product_reference": "go1.26-1.26.2-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.2-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.x86_64"
},
"product_reference": "go1.26-1.26.2-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.2-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64"
},
"product_reference": "go1.26-doc-1.26.2-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.2-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le"
},
"product_reference": "go1.26-doc-1.26.2-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.2-160000.1.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.s390x"
},
"product_reference": "go1.26-doc-1.26.2-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.2-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64"
},
"product_reference": "go1.26-doc-1.26.2-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-libstd-1.26.2-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64"
},
"product_reference": "go1.26-libstd-1.26.2-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-libstd-1.26.2-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64"
},
"product_reference": "go1.26-libstd-1.26.2-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.2-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.aarch64"
},
"product_reference": "go1.26-race-1.26.2-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.2-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le"
},
"product_reference": "go1.26-race-1.26.2-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.2-160000.1.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.s390x"
},
"product_reference": "go1.26-race-1.26.2-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.2-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.x86_64"
},
"product_reference": "go1.26-race-1.26.2-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.2-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.aarch64"
},
"product_reference": "go1.26-1.26.2-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.2-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.ppc64le"
},
"product_reference": "go1.26-1.26.2-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.2-160000.1.1.s390x as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.s390x"
},
"product_reference": "go1.26-1.26.2-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.2-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.x86_64"
},
"product_reference": "go1.26-1.26.2-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.2-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64"
},
"product_reference": "go1.26-doc-1.26.2-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.2-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le"
},
"product_reference": "go1.26-doc-1.26.2-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.2-160000.1.1.s390x as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.s390x"
},
"product_reference": "go1.26-doc-1.26.2-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.2-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64"
},
"product_reference": "go1.26-doc-1.26.2-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-libstd-1.26.2-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64"
},
"product_reference": "go1.26-libstd-1.26.2-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-libstd-1.26.2-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64"
},
"product_reference": "go1.26-libstd-1.26.2-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.2-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.aarch64"
},
"product_reference": "go1.26-race-1.26.2-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.2-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le"
},
"product_reference": "go1.26-race-1.26.2-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.2-160000.1.1.s390x as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.s390x"
},
"product_reference": "go1.26-race-1.26.2-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.2-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.x86_64"
},
"product_reference": "go1.26-race-1.26.2-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-27140",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-27140"
}
],
"notes": [
{
"category": "general",
"text": "SWIG file names containing \u0027cgo\u0027 and well-crafted payloads could lead to code smuggling and arbitrary code execution at build time due to trust layer bypass.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-27140",
"url": "https://www.suse.com/security/cve/CVE-2026-27140"
},
{
"category": "external",
"summary": "SUSE Bug 1261653 for CVE-2026-27140",
"url": "https://bugzilla.suse.com/1261653"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-20T14:00:06Z",
"details": "important"
}
],
"title": "CVE-2026-27140"
},
{
"cve": "CVE-2026-27143",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-27143"
}
],
"notes": [
{
"category": "general",
"text": "Arithmetic over induction variables in loops were not correctly checked for underflow or overflow. As a result, the compiler would allow for invalid indexing to occur at runtime, potentially leading to memory corruption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-27143",
"url": "https://www.suse.com/security/cve/CVE-2026-27143"
},
{
"category": "external",
"summary": "SUSE Bug 1261654 for CVE-2026-27143",
"url": "https://bugzilla.suse.com/1261654"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-20T14:00:06Z",
"details": "important"
}
],
"title": "CVE-2026-27143"
},
{
"cve": "CVE-2026-27144",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-27144"
}
],
"notes": [
{
"category": "general",
"text": "The compiler is meant to unwrap pointers which are the operands of a memory move; a no-op interface conversion prevented the compiler from making the correct determination about non-overlapping moves, potentially leading to memory corruption at runtime.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-27144",
"url": "https://www.suse.com/security/cve/CVE-2026-27144"
},
{
"category": "external",
"summary": "SUSE Bug 1261655 for CVE-2026-27144",
"url": "https://bugzilla.suse.com/1261655"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-20T14:00:06Z",
"details": "moderate"
}
],
"title": "CVE-2026-27144"
},
{
"cve": "CVE-2026-32280",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-32280"
}
],
"notes": [
{
"category": "general",
"text": "During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions.Intermediates, which can lead to a denial of service. This affects both direct users of crypto/x509 and users of crypto/tls.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-32280",
"url": "https://www.suse.com/security/cve/CVE-2026-32280"
},
{
"category": "external",
"summary": "SUSE Bug 1261656 for CVE-2026-32280",
"url": "https://bugzilla.suse.com/1261656"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-20T14:00:06Z",
"details": "important"
}
],
"title": "CVE-2026-32280"
},
{
"cve": "CVE-2026-32281",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-32281"
}
],
"notes": [
{
"category": "general",
"text": "Validating certificate chains which use policies is unexpectedly inefficient when certificates in the chain contain a very large number of policy mappings, possibly causing denial of service. This only affects validation of otherwise trusted certificate chains, issued by a root CA in the VerifyOptions.Roots CertPool, or in the system certificate pool.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-32281",
"url": "https://www.suse.com/security/cve/CVE-2026-32281"
},
{
"category": "external",
"summary": "SUSE Bug 1261657 for CVE-2026-32281",
"url": "https://bugzilla.suse.com/1261657"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-20T14:00:06Z",
"details": "moderate"
}
],
"title": "CVE-2026-32281"
},
{
"cve": "CVE-2026-32282",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-32282"
}
],
"notes": [
{
"category": "general",
"text": "On Linux, if the target of Root.Chmod is replaced with a symlink while the chmod operation is in progress, Chmod can operate on the target of the symlink, even when the target lies outside the root. The Linux fchmodat syscall silently ignores the AT_SYMLINK_NOFOLLOW flag, which Root.Chmod uses to avoid symlink traversal. Root.Chmod checks its target before acting and returns an error if the target is a symlink lying outside the root, so the impact is limited to cases where the target is replaced with a symlink between the check and operation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-32282",
"url": "https://www.suse.com/security/cve/CVE-2026-32282"
},
{
"category": "external",
"summary": "SUSE Bug 1261658 for CVE-2026-32282",
"url": "https://bugzilla.suse.com/1261658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-20T14:00:06Z",
"details": "moderate"
}
],
"title": "CVE-2026-32282"
},
{
"cve": "CVE-2026-32283",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-32283"
}
],
"notes": [
{
"category": "general",
"text": "If one side of the TLS connection sends multiple key update messages post-handshake in a single record, the connection can deadlock, causing uncontrolled consumption of resources. This can lead to a denial of service. This only affects TLS 1.3.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-32283",
"url": "https://www.suse.com/security/cve/CVE-2026-32283"
},
{
"category": "external",
"summary": "SUSE Bug 1261659 for CVE-2026-32283",
"url": "https://bugzilla.suse.com/1261659"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-20T14:00:06Z",
"details": "moderate"
}
],
"title": "CVE-2026-32283"
},
{
"cve": "CVE-2026-32288",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-32288"
}
],
"notes": [
{
"category": "general",
"text": "tar.Reader can allocate an unbounded amount of memory when reading a maliciously-crafted archive containing a large number of sparse regions encoded in the \"old GNU sparse map\" format.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-32288",
"url": "https://www.suse.com/security/cve/CVE-2026-32288"
},
{
"category": "external",
"summary": "SUSE Bug 1261660 for CVE-2026-32288",
"url": "https://bugzilla.suse.com/1261660"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-20T14:00:06Z",
"details": "moderate"
}
],
"title": "CVE-2026-32288"
},
{
"cve": "CVE-2026-32289",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-32289"
}
],
"notes": [
{
"category": "general",
"text": "Context was not properly tracked across template branches for JS template literals, leading to possibly incorrect escaping of content when branches were used. Additionally template actions within JS template literals did not properly track the brace depth, leading to incorrect escaping being applied. These issues could cause actions within JS template literals to be incorrectly or improperly escaped, leading to XSS vulnerabilities.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-32289",
"url": "https://www.suse.com/security/cve/CVE-2026-32289"
},
{
"category": "external",
"summary": "SUSE Bug 1261661 for CVE-2026-32289",
"url": "https://bugzilla.suse.com/1261661"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-20T14:00:06Z",
"details": "moderate"
}
],
"title": "CVE-2026-32289"
},
{
"cve": "CVE-2026-33810",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-33810"
}
],
"notes": [
{
"category": "general",
"text": "When verifying a certificate chain containing excluded DNS constraints, these constraints are not correctly applied to wildcard DNS SANs which use a different case than the constraint. This only affects validation of otherwise trusted certificate chains, issued by a root CA in the VerifyOptions.Roots CertPool, or in the system certificate pool.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-33810",
"url": "https://www.suse.com/security/cve/CVE-2026-33810"
},
{
"category": "external",
"summary": "SUSE Bug 1261662 for CVE-2026-33810",
"url": "https://bugzilla.suse.com/1261662"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-20T14:00:06Z",
"details": "moderate"
}
],
"title": "CVE-2026-33810"
}
]
}
CERTFR-2026-AVI-0445
Vulnerability from certfr_avis - Published: 2026-04-15 - Updated: 2026-04-15
De multiples vulnérabilités ont été découvertes dans les produits Microsoft. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Microsoft indique que la vulnérabilité CVE-2026-32201 est activement exploitée.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | N/A | Microsoft SharePoint Server Subscription Edition versions antérieures à 16.0.19725.20210 | ||
| Microsoft | N/A | azl3 rubygem-addressable 2.8.5-2 versions antérieures à 2.9.0-1 | ||
| Microsoft | N/A | Microsoft Power Apps versions antérieures à 3.26032.10.0 | ||
| Microsoft | N/A | Microsoft SQL Server 2019 pour systèmes x64 (GDR) versions antérieures à 15.0.2165.1 | ||
| Microsoft | N/A | Microsoft Visual Studio 2017 version 15.9 (inclus 15.0 - 15.8) antérieures à 15.9.79 | ||
| Microsoft | N/A | Microsoft SQL Server 2022 pour systèmes x64 (GDR) versions antérieures à 16.0.1175.1 | ||
| Microsoft | N/A | Microsoft Visual Studio Code CoPilot Chat Extension versions antérieures à 0.37.3 | ||
| Microsoft | N/A | Microsoft Visual Studio 2022 version 17.14 antérieures à 17.14.30 | ||
| Microsoft | N/A | Microsoft SQL Server 2022 pour systèmes x64 (CU 24) versions antérieures à 16.0.4250.1 | ||
| Microsoft | N/A | Microsoft SQL Server 2017 pour systèmes x64 (CU 31) versions antérieures à 14.0.3525.1 | ||
| Microsoft | N/A | Microsoft Visual Studio 2022 version 17.12 antérieures à 17.12.19 | ||
| Microsoft | N/A | Microsoft SharePoint Server 2019 versions antérieures à 16.0.10417.20114 | ||
| Microsoft | N/A | azl3 libpng 1.6.56-1 versions antérieures à 1.6.57-1 | ||
| Microsoft | N/A | Microsoft Visual Studio 2019 version 16.4 (inclus 16.0 - 16.3) antérieures à 16.11.55 | ||
| Microsoft | N/A | Microsoft SQL Server 2016 pour systèmes x64 Service Pack 3 Azure Connect Feature Pack versions antérieures à 13.0.7080.1 | ||
| Microsoft | N/A | Microsoft Visual Studio 2019 version 16.11 (inclus 16.0 - 16.10) antérieures à 16.11.55 | ||
| Microsoft | N/A | Microsoft SQL Server 2025 pour systèmes x64 (GDR) versions antérieures à 17.0.1110.1 | ||
| Microsoft | N/A | Microsoft SQL Server 2019 pour systèmes x64 (CU 32) versions antérieures à 15.0.4465.1 | ||
| Microsoft | N/A | Microsoft SQL Server 2017 pour systèmes x64 (GDR) versions antérieures à 14.0.2105.1 | ||
| Microsoft | N/A | Microsoft SharePoint Enterprise Server 2016 versions antérieures à 16.0.5548.1003 | ||
| Microsoft | N/A | Microsoft Defender Antimalware Platform versions antérieures à 4.18.26030.3011 | ||
| Microsoft | N/A | Microsoft HPC Pack 2019 versions antérieures à 6.3.8355 | ||
| Microsoft | N/A | azl3 golang 1.25.8-1 versions antérieures à 1.25.9-1 | ||
| Microsoft | N/A | Microsoft SQL Server 2016 pour systèmes x64 Service Pack 3 (GDR) versions antérieures à 13.0.6485.1 | ||
| Microsoft | N/A | Microsoft Dynamics 365 (on-premises) version 9.0 antérieures à 9.1.0044.0015 | ||
| Microsoft | N/A | Microsoft SQL Server 2025 pour systèmes x64 (CU3) versions antérieures à 17.0.4030.1 | ||
| Microsoft | N/A | PowerShell 7.5 versions antérieures à 7.5.5 | ||
| Microsoft | N/A | PowerShell 7.4 versions antérieures à 7.4.14 | ||
| Microsoft | N/A | azl3 golang 1.26.1-1 versions antérieures à 1.26.2-1 | ||
| Microsoft | N/A | azl3 libexif 0.6.24-2 versions antérieures à 0.6.24-3 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Microsoft SharePoint Server Subscription Edition versions ant\u00e9rieures \u00e0 16.0.19725.20210",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 rubygem-addressable 2.8.5-2 versions ant\u00e9rieures \u00e0 2.9.0-1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Power Apps versions ant\u00e9rieures \u00e0 3.26032.10.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SQL Server 2019 pour syst\u00e8mes x64 (GDR) versions ant\u00e9rieures \u00e0 15.0.2165.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Visual Studio 2017 version 15.9 (inclus 15.0 - 15.8) ant\u00e9rieures \u00e0 15.9.79",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SQL Server 2022 pour syst\u00e8mes x64 (GDR) versions ant\u00e9rieures \u00e0 16.0.1175.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Visual Studio Code CoPilot Chat Extension versions ant\u00e9rieures \u00e0 0.37.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Visual Studio 2022 version 17.14 ant\u00e9rieures \u00e0 17.14.30",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SQL Server 2022 pour syst\u00e8mes x64 (CU 24) versions ant\u00e9rieures \u00e0 16.0.4250.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SQL Server 2017 pour syst\u00e8mes x64 (CU 31) versions ant\u00e9rieures \u00e0 14.0.3525.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Visual Studio 2022 version 17.12 ant\u00e9rieures \u00e0 17.12.19",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SharePoint Server 2019 versions ant\u00e9rieures \u00e0 16.0.10417.20114",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 libpng 1.6.56-1 versions ant\u00e9rieures \u00e0 1.6.57-1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Visual Studio 2019 version 16.4 (inclus 16.0 - 16.3) ant\u00e9rieures \u00e0 16.11.55",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SQL Server 2016 pour syst\u00e8mes x64 Service Pack 3 Azure Connect Feature Pack versions ant\u00e9rieures \u00e0 13.0.7080.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Visual Studio 2019 version 16.11 (inclus 16.0 - 16.10) ant\u00e9rieures \u00e0 16.11.55",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SQL Server 2025 pour syst\u00e8mes x64 (GDR) versions ant\u00e9rieures \u00e0 17.0.1110.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SQL Server 2019 pour syst\u00e8mes x64 (CU 32) versions ant\u00e9rieures \u00e0 15.0.4465.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SQL Server 2017 pour syst\u00e8mes x64 (GDR) versions ant\u00e9rieures \u00e0 14.0.2105.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SharePoint Enterprise Server 2016 versions ant\u00e9rieures \u00e0 16.0.5548.1003",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Defender Antimalware Platform versions ant\u00e9rieures \u00e0 4.18.26030.3011",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft HPC Pack 2019 versions ant\u00e9rieures \u00e0 6.3.8355",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 golang 1.25.8-1 versions ant\u00e9rieures \u00e0 1.25.9-1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SQL Server 2016 pour syst\u00e8mes x64 Service Pack 3 (GDR) versions ant\u00e9rieures \u00e0 13.0.6485.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Dynamics 365 (on-premises) version 9.0 ant\u00e9rieures \u00e0 9.1.0044.0015",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SQL Server 2025 pour syst\u00e8mes x64 (CU3) versions ant\u00e9rieures \u00e0 17.0.4030.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "PowerShell 7.5 versions ant\u00e9rieures \u00e0 7.5.5",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "PowerShell 7.4 versions ant\u00e9rieures \u00e0 7.4.14",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 golang 1.26.1-1 versions ant\u00e9rieures \u00e0 1.26.2-1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 libexif 0.6.24-2 versions ant\u00e9rieures \u00e0 0.6.24-3",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2026-20945",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20945"
},
{
"name": "CVE-2026-21637",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21637"
},
{
"name": "CVE-2026-35611",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-35611"
},
{
"name": "CVE-2026-40385",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-40385"
},
{
"name": "CVE-2026-26143",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26143"
},
{
"name": "CVE-2026-32631",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32631"
},
{
"name": "CVE-2026-32167",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32167"
},
{
"name": "CVE-2026-34757",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34757"
},
{
"name": "CVE-2026-33120",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33120"
},
{
"name": "CVE-2026-33825",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33825"
},
{
"name": "CVE-2026-23653",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23653"
},
{
"name": "CVE-2026-26149",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26149"
},
{
"name": "CVE-2026-32184",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32184"
},
{
"name": "CVE-2026-32203",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32203"
},
{
"name": "CVE-2026-32201",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32201"
},
{
"name": "CVE-2026-32178",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32178"
},
{
"name": "CVE-2026-33810",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33810"
},
{
"name": "CVE-2026-40386",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-40386"
},
{
"name": "CVE-2026-33103",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33103"
},
{
"name": "CVE-2026-32176",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32176"
}
],
"initial_release_date": "2026-04-15T00:00:00",
"last_revision_date": "2026-04-15T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0445",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-04-15T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Microsoft. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.\n\nMicrosoft indique que la vuln\u00e9rabilit\u00e9 CVE-2026-32201 est activement exploit\u00e9e.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Microsoft",
"vendor_advisories": [
{
"published_at": "2026-04-11",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-35611",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-35611"
},
{
"published_at": "2026-04-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-26143",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26143"
},
{
"published_at": "2026-04-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-34757",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-34757"
},
{
"published_at": "2026-04-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-33103",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33103"
},
{
"published_at": "2026-04-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-32178",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32178"
},
{
"published_at": "2026-04-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-32176",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32176"
},
{
"published_at": "2026-04-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-32167",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32167"
},
{
"published_at": "2026-04-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-32631",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32631"
},
{
"published_at": "2026-04-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-32203",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32203"
},
{
"published_at": "2026-04-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-32184",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32184"
},
{
"published_at": "2026-04-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-32201",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32201"
},
{
"published_at": "2026-04-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-20945",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20945"
},
{
"published_at": "2026-04-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-21637",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21637"
},
{
"published_at": "2026-04-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23653",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23653"
},
{
"published_at": "2026-04-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-33825",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33825"
},
{
"published_at": "2026-04-11",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-33810",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33810"
},
{
"published_at": "2026-04-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-40385",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40385"
},
{
"published_at": "2026-04-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-40386",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40386"
},
{
"published_at": "2026-04-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-33120",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33120"
},
{
"published_at": "2026-04-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-26149",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26149"
}
]
}
bit-golang-2026-33810
Vulnerability from bitnami_vulndb
When verifying a certificate chain containing excluded DNS constraints, these constraints are not correctly applied to wildcard DNS SANs which use a different case than the constraint. This only affects validation of otherwise trusted certificate chains, issued by a root CA in the VerifyOptions.Roots CertPool, or in the system certificate pool.
{
"affected": [
{
"package": {
"ecosystem": "Bitnami",
"name": "golang",
"purl": "pkg:bitnami/golang"
},
"ranges": [
{
"events": [
{
"introduced": "1.26.0-0"
},
{
"fixed": "1.26.2"
}
],
"type": "SEMVER"
}
],
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N",
"type": "CVSS_V3"
}
]
}
],
"aliases": [
"CVE-2026-33810"
],
"database_specific": {
"cpes": [
"cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*"
],
"severity": "High"
},
"details": "When verifying a certificate chain containing excluded DNS constraints, these constraints are not correctly applied to wildcard DNS SANs which use a different case than the constraint. This only affects validation of otherwise trusted certificate chains, issued by a root CA in the VerifyOptions.Roots CertPool, or in the system certificate pool.",
"id": "BIT-golang-2026-33810",
"modified": "2026-04-21T12:33:30.555Z",
"published": "2026-04-13T05:43:50.259Z",
"references": [
{
"type": "WEB",
"url": "https://go.dev/cl/763763"
},
{
"type": "WEB",
"url": "https://go.dev/issue/78332"
},
{
"type": "WEB",
"url": "https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33810"
},
{
"type": "WEB",
"url": "https://pkg.go.dev/vuln/GO-2026-4866"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2026/04/19/4"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2026/04/20/1"
}
],
"schema_version": "1.6.2",
"summary": "Case-sensitive excludedSubtrees name constraints cause Auth Bypass in crypto/x509"
}
FKIE_CVE-2026-33810
Vulnerability from fkie_nvd - Published: 2026-04-08 02:16 - Updated: 2026-04-20 18:167.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
| URL | Tags | ||
|---|---|---|---|
| security@golang.org | https://go.dev/cl/763763 | Patch | |
| security@golang.org | https://go.dev/issue/78332 | Issue Tracking | |
| security@golang.org | https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU | Mailing List, Release Notes | |
| security@golang.org | https://pkg.go.dev/vuln/GO-2026-4866 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2026/04/19/4 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2026/04/20/1 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*",
"matchCriteriaId": "39FE9BAF-55E9-43AA-B14E-239E7EF1D65D",
"versionEndExcluding": "1.26.2",
"versionStartIncluding": "1.26.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "When verifying a certificate chain containing excluded DNS constraints, these constraints are not correctly applied to wildcard DNS SANs which use a different case than the constraint. This only affects validation of otherwise trusted certificate chains, issued by a root CA in the VerifyOptions.Roots CertPool, or in the system certificate pool."
}
],
"id": "CVE-2026-33810",
"lastModified": "2026-04-20T18:16:26.813",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 4.2,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2026-04-08T02:16:03.950",
"references": [
{
"source": "security@golang.org",
"tags": [
"Patch"
],
"url": "https://go.dev/cl/763763"
},
{
"source": "security@golang.org",
"tags": [
"Issue Tracking"
],
"url": "https://go.dev/issue/78332"
},
{
"source": "security@golang.org",
"tags": [
"Mailing List",
"Release Notes"
],
"url": "https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU"
},
{
"source": "security@golang.org",
"tags": [
"Vendor Advisory"
],
"url": "https://pkg.go.dev/vuln/GO-2026-4866"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.openwall.com/lists/oss-security/2026/04/19/4"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.openwall.com/lists/oss-security/2026/04/20/1"
}
],
"sourceIdentifier": "security@golang.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-295"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-FV83-X2XW-2J55
Vulnerability from github – Published: 2026-04-08 03:32 – Updated: 2026-04-20 18:31When verifying a certificate chain containing excluded DNS constraints, these constraints are not correctly applied to wildcard DNS SANs which use a different case than the constraint. This only affects validation of otherwise trusted certificate chains, issued by a root CA in the VerifyOptions.Roots CertPool, or in the system certificate pool.
{
"affected": [],
"aliases": [
"CVE-2026-33810"
],
"database_specific": {
"cwe_ids": [
"CWE-295"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2026-04-08T02:16:03Z",
"severity": "HIGH"
},
"details": "When verifying a certificate chain containing excluded DNS constraints, these constraints are not correctly applied to wildcard DNS SANs which use a different case than the constraint. This only affects validation of otherwise trusted certificate chains, issued by a root CA in the VerifyOptions.Roots CertPool, or in the system certificate pool.",
"id": "GHSA-fv83-x2xw-2j55",
"modified": "2026-04-20T18:31:42Z",
"published": "2026-04-08T03:32:14Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33810"
},
{
"type": "WEB",
"url": "https://go.dev/cl/763763"
},
{
"type": "WEB",
"url": "https://go.dev/issue/78332"
},
{
"type": "WEB",
"url": "https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU"
},
{
"type": "WEB",
"url": "https://pkg.go.dev/vuln/GO-2026-4866"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2026/04/19/4"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2026/04/20/1"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"type": "CVSS_V3"
}
]
}
WID-SEC-W-2026-1006
Vulnerability from csaf_certbund - Published: 2026-04-07 22:00 - Updated: 2026-04-09 22:00{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Go ist eine quelloffene Programmiersprache.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in Golang Go ausnutzen, um Speicherbesch\u00e4digungen zu verursachen, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand auszul\u00f6sen oder andere, nicht n\u00e4her spezifizierte Angriffe durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Sonstiges\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2026-1006 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-1006.json"
},
{
"category": "self",
"summary": "WID-SEC-2026-1006 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1006"
},
{
"category": "external",
"summary": "Go 1.26.2 and Go 1.25.9 releases vom 2026-04-07",
"url": "https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU"
}
],
"source_lang": "en-US",
"title": "Golang Go: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2026-04-09T22:00:00.000+00:00",
"generator": {
"date": "2026-04-10T07:05:07.518+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2026-1006",
"initial_release_date": "2026-04-07T22:00:00.000+00:00",
"revision_history": [
{
"date": "2026-04-07T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2026-04-09T22:00:00.000+00:00",
"number": "2",
"summary": "Referenz(en) aufgenommen: 2456336"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c1.26.2",
"product": {
"name": "Golang Go \u003c1.26.2",
"product_id": "T052518"
}
},
{
"category": "product_version",
"name": "1.26.2",
"product": {
"name": "Golang Go 1.26.2",
"product_id": "T052518-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:golang:go:1.26.2"
}
}
},
{
"category": "product_version_range",
"name": "\u003c1.25.9",
"product": {
"name": "Golang Go \u003c1.25.9",
"product_id": "T052519"
}
},
{
"category": "product_version",
"name": "1.25.9",
"product": {
"name": "Golang Go 1.25.9",
"product_id": "T052519-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:golang:go:1.25.9"
}
}
}
],
"category": "product_name",
"name": "Go"
}
],
"category": "vendor",
"name": "Golang"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-27140",
"product_status": {
"known_affected": [
"T052519",
"T052518"
]
},
"release_date": "2026-04-07T22:00:00.000+00:00",
"title": "CVE-2026-27140"
},
{
"cve": "CVE-2026-27143",
"product_status": {
"known_affected": [
"T052519",
"T052518"
]
},
"release_date": "2026-04-07T22:00:00.000+00:00",
"title": "CVE-2026-27143"
},
{
"cve": "CVE-2026-27144",
"product_status": {
"known_affected": [
"T052519",
"T052518"
]
},
"release_date": "2026-04-07T22:00:00.000+00:00",
"title": "CVE-2026-27144"
},
{
"cve": "CVE-2026-32280",
"product_status": {
"known_affected": [
"T052519",
"T052518"
]
},
"release_date": "2026-04-07T22:00:00.000+00:00",
"title": "CVE-2026-32280"
},
{
"cve": "CVE-2026-32281",
"product_status": {
"known_affected": [
"T052519",
"T052518"
]
},
"release_date": "2026-04-07T22:00:00.000+00:00",
"title": "CVE-2026-32281"
},
{
"cve": "CVE-2026-32282",
"product_status": {
"known_affected": [
"T052519",
"T052518"
]
},
"release_date": "2026-04-07T22:00:00.000+00:00",
"title": "CVE-2026-32282"
},
{
"cve": "CVE-2026-32283",
"product_status": {
"known_affected": [
"T052519",
"T052518"
]
},
"release_date": "2026-04-07T22:00:00.000+00:00",
"title": "CVE-2026-32283"
},
{
"cve": "CVE-2026-32288",
"product_status": {
"known_affected": [
"T052519",
"T052518"
]
},
"release_date": "2026-04-07T22:00:00.000+00:00",
"title": "CVE-2026-32288"
},
{
"cve": "CVE-2026-32289",
"product_status": {
"known_affected": [
"T052519",
"T052518"
]
},
"release_date": "2026-04-07T22:00:00.000+00:00",
"title": "CVE-2026-32289"
},
{
"cve": "CVE-2026-33810",
"product_status": {
"known_affected": [
"T052519",
"T052518"
]
},
"release_date": "2026-04-07T22:00:00.000+00:00",
"title": "CVE-2026-33810"
}
]
}
MSRC_CVE-2026-33810
Vulnerability from csaf_microsoft - Published: 2026-04-02 00:00 - Updated: 2026-04-14 14:47| URL | Category | |
|---|---|---|
{
"document": {
"category": "csaf_vex",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2026-33810 Case-sensitive excludedSubtrees name constraints cause Auth Bypass in crypto/x509 - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2026/msrc_cve-2026-33810.json"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "Case-sensitive excludedSubtrees name constraints cause Auth Bypass in crypto/x509",
"tracking": {
"current_release_date": "2026-04-14T14:47:37.000Z",
"generator": {
"date": "2026-04-15T07:32:45.880Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2026-33810",
"initial_release_date": "2026-04-02T00:00:00.000Z",
"revision_history": [
{
"date": "2026-04-11T01:10:17.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
},
{
"date": "2026-04-14T14:47:37.000Z",
"legacy_version": "2",
"number": "2",
"summary": "Information published."
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "3.0",
"product": {
"name": "Azure Linux 3.0",
"product_id": "17084"
}
}
],
"category": "product_name",
"name": "Azure Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cazl3 golang 1.25.8-1",
"product": {
"name": "\u003cazl3 golang 1.25.8-1",
"product_id": "2"
}
},
{
"category": "product_version",
"name": "azl3 golang 1.25.8-1",
"product": {
"name": "azl3 golang 1.25.8-1",
"product_id": "21113"
}
},
{
"category": "product_version_range",
"name": "\u003cazl3 golang 1.26.1-1",
"product": {
"name": "\u003cazl3 golang 1.26.1-1",
"product_id": "1"
}
},
{
"category": "product_version",
"name": "azl3 golang 1.26.1-1",
"product": {
"name": "azl3 golang 1.26.1-1",
"product_id": "21116"
}
}
],
"category": "product_name",
"name": "golang"
}
],
"category": "vendor",
"name": "Microsoft"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 golang 1.25.8-1 as a component of Azure Linux 3.0",
"product_id": "17084-2"
},
"product_reference": "2",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 golang 1.25.8-1 as a component of Azure Linux 3.0",
"product_id": "21113-17084"
},
"product_reference": "21113",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 golang 1.26.1-1 as a component of Azure Linux 3.0",
"product_id": "17084-1"
},
"product_reference": "1",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 golang 1.26.1-1 as a component of Azure Linux 3.0",
"product_id": "21116-17084"
},
"product_reference": "21116",
"relates_to_product_reference": "17084"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-33810",
"notes": [
{
"category": "general",
"text": "Go",
"title": "Assigning CNA"
}
],
"product_status": {
"fixed": [
"21113-17084",
"21116-17084"
],
"known_affected": [
"17084-2",
"17084-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-33810 Case-sensitive excludedSubtrees name constraints cause Auth Bypass in crypto/x509 - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2026/msrc_cve-2026-33810.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-11T01:10:17.000Z",
"details": "1.25.9-1:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17084-2"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2026-04-11T01:10:17.000Z",
"details": "1.26.2-1:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17084-1"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
}
],
"title": "Case-sensitive excludedSubtrees name constraints cause Auth Bypass in crypto/x509"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.