Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-61920 (GCVE-0-2025-61920)
Vulnerability from cvelistv5 – Published: 2025-10-10 19:25 – Updated: 2025-11-03 17:45| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-61920",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-10-10T20:46:55.883426Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-10-10T20:47:08.736Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2025-11-03T17:45:23.708Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00032.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "authlib",
"vendor": "authlib",
"versions": [
{
"status": "affected",
"version": "\u003c 1.6.5"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Authlib is a Python library which builds OAuth and OpenID Connect servers. Prior to version 1.6.5, Authlib\u2019s JOSE implementation accepts unbounded JWS/JWT header and signature segments. A remote attacker can craft a token whose base64url\u2011encoded header or signature spans hundreds of megabytes. During verification, Authlib decodes and parses the full input before it is rejected, driving CPU and memory consumption to hostile levels and enabling denial of service. Version 1.6.5 patches the issue. Some temporary workarounds are available. Enforce input size limits before handing tokens to Authlib and/or use application-level throttling to reduce amplification risk."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-20",
"description": "CWE-20: Improper Input Validation",
"lang": "en",
"type": "CWE"
}
]
},
{
"descriptions": [
{
"cweId": "CWE-400",
"description": "CWE-400: Uncontrolled Resource Consumption",
"lang": "en",
"type": "CWE"
}
]
},
{
"descriptions": [
{
"cweId": "CWE-770",
"description": "CWE-770: Allocation of Resources Without Limits or Throttling",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-10-10T19:25:07.679Z",
"orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"shortName": "GitHub_M"
},
"references": [
{
"name": "https://github.com/authlib/authlib/security/advisories/GHSA-pq5p-34cr-23v9",
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/authlib/authlib/security/advisories/GHSA-pq5p-34cr-23v9"
},
{
"name": "https://github.com/authlib/authlib/commit/867e3f87b072347a1ae9cf6983cc8bbf88447e5e",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/authlib/authlib/commit/867e3f87b072347a1ae9cf6983cc8bbf88447e5e"
}
],
"source": {
"advisory": "GHSA-pq5p-34cr-23v9",
"discovery": "UNKNOWN"
},
"title": "Authlib is vulnerable to Denial of Service via Oversized JOSE Segments"
}
},
"cveMetadata": {
"assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"assignerShortName": "GitHub_M",
"cveId": "CVE-2025-61920",
"datePublished": "2025-10-10T19:25:07.679Z",
"dateReserved": "2025-10-03T22:21:59.615Z",
"dateUpdated": "2025-11-03T17:45:23.708Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-61920\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2025-10-10T20:15:37.893\",\"lastModified\":\"2025-11-03T18:17:01.530\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Authlib is a Python library which builds OAuth and OpenID Connect servers. Prior to version 1.6.5, Authlib\u2019s JOSE implementation accepts unbounded JWS/JWT header and signature segments. A remote attacker can craft a token whose base64url\u2011encoded header or signature spans hundreds of megabytes. During verification, Authlib decodes and parses the full input before it is rejected, driving CPU and memory consumption to hostile levels and enabling denial of service. Version 1.6.5 patches the issue. Some temporary workarounds are available. Enforce input size limits before handing tokens to Authlib and/or use application-level throttling to reduce amplification risk.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"},{\"lang\":\"en\",\"value\":\"CWE-400\"},{\"lang\":\"en\",\"value\":\"CWE-770\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:authlib:authlib:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.6.5\",\"matchCriteriaId\":\"B4367901-9190-47A3-88FA-173EE7C2FB13\"}]}]}],\"references\":[{\"url\":\"https://github.com/authlib/authlib/commit/867e3f87b072347a1ae9cf6983cc8bbf88447e5e\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Patch\"]},{\"url\":\"https://github.com/authlib/authlib/security/advisories/GHSA-pq5p-34cr-23v9\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Exploit\",\"Mitigation\",\"Vendor Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2025/10/msg00032.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://lists.debian.org/debian-lts-announce/2025/10/msg00032.html\"}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2025-11-03T17:45:23.708Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-61920\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-10-10T20:46:55.883426Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-10-10T20:47:02.479Z\"}}], \"cna\": {\"title\": \"Authlib is vulnerable to Denial of Service via Oversized JOSE Segments\", \"source\": {\"advisory\": \"GHSA-pq5p-34cr-23v9\", \"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.5, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}}], \"affected\": [{\"vendor\": \"authlib\", \"product\": \"authlib\", \"versions\": [{\"status\": \"affected\", \"version\": \"\u003c 1.6.5\"}]}], \"references\": [{\"url\": \"https://github.com/authlib/authlib/security/advisories/GHSA-pq5p-34cr-23v9\", \"name\": \"https://github.com/authlib/authlib/security/advisories/GHSA-pq5p-34cr-23v9\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"https://github.com/authlib/authlib/commit/867e3f87b072347a1ae9cf6983cc8bbf88447e5e\", \"name\": \"https://github.com/authlib/authlib/commit/867e3f87b072347a1ae9cf6983cc8bbf88447e5e\", \"tags\": [\"x_refsource_MISC\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Authlib is a Python library which builds OAuth and OpenID Connect servers. Prior to version 1.6.5, Authlib\\u2019s JOSE implementation accepts unbounded JWS/JWT header and signature segments. A remote attacker can craft a token whose base64url\\u2011encoded header or signature spans hundreds of megabytes. During verification, Authlib decodes and parses the full input before it is rejected, driving CPU and memory consumption to hostile levels and enabling denial of service. Version 1.6.5 patches the issue. Some temporary workarounds are available. Enforce input size limits before handing tokens to Authlib and/or use application-level throttling to reduce amplification risk.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-20\", \"description\": \"CWE-20: Improper Input Validation\"}]}, {\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-400\", \"description\": \"CWE-400: Uncontrolled Resource Consumption\"}]}, {\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-770\", \"description\": \"CWE-770: Allocation of Resources Without Limits or Throttling\"}]}], \"providerMetadata\": {\"orgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"shortName\": \"GitHub_M\", \"dateUpdated\": \"2025-10-10T19:25:07.679Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-61920\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-11-03T17:45:23.708Z\", \"dateReserved\": \"2025-10-03T22:21:59.615Z\", \"assignerOrgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"datePublished\": \"2025-10-10T19:25:07.679Z\", \"assignerShortName\": \"GitHub_M\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
SUSE-SU-2025:3754-1
Vulnerability from csaf_suse - Published: 2025-10-23 10:27 - Updated: 2025-10-23 10:27Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for python-Authlib",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for python-Authlib fixes the following issues:\n\n- CVE-2025-61920: limited the size of the header to prevent DoS (bsc#1251921).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2025-3754,SUSE-SLE-Module-Python3-15-SP6-2025-3754,SUSE-SLE-Module-Python3-15-SP7-2025-3754,openSUSE-SLE-15.6-2025-3754",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_3754-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:3754-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20253754-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:3754-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022984.html"
},
{
"category": "self",
"summary": "SUSE Bug 1251921",
"url": "https://bugzilla.suse.com/1251921"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61920 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61920/"
}
],
"title": "Security update for python-Authlib",
"tracking": {
"current_release_date": "2025-10-23T10:27:00Z",
"generator": {
"date": "2025-10-23T10:27:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:3754-1",
"initial_release_date": "2025-10-23T10:27:00Z",
"revision_history": [
{
"date": "2025-10-23T10:27:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "python311-Authlib-1.3.1-150600.3.6.1.noarch",
"product": {
"name": "python311-Authlib-1.3.1-150600.3.6.1.noarch",
"product_id": "python311-Authlib-1.3.1-150600.3.6.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Python 3 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Module for Python 3 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-python3:15:sp6"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Python 3 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Module for Python 3 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-python3:15:sp7"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.6",
"product": {
"name": "openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.6"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-Authlib-1.3.1-150600.3.6.1.noarch as component of SUSE Linux Enterprise Module for Python 3 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP6:python311-Authlib-1.3.1-150600.3.6.1.noarch"
},
"product_reference": "python311-Authlib-1.3.1-150600.3.6.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-Authlib-1.3.1-150600.3.6.1.noarch as component of SUSE Linux Enterprise Module for Python 3 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP7:python311-Authlib-1.3.1-150600.3.6.1.noarch"
},
"product_reference": "python311-Authlib-1.3.1-150600.3.6.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-Authlib-1.3.1-150600.3.6.1.noarch as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python311-Authlib-1.3.1-150600.3.6.1.noarch"
},
"product_reference": "python311-Authlib-1.3.1-150600.3.6.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61920",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61920"
}
],
"notes": [
{
"category": "general",
"text": "Authlib is a Python library which builds OAuth and OpenID Connect servers. Prior to version 1.6.5, Authlib\u0027s JOSE implementation accepts unbounded JWS/JWT header and signature segments. A remote attacker can craft a token whose base64url-encoded header or signature spans hundreds of megabytes. During verification, Authlib decodes and parses the full input before it is rejected, driving CPU and memory consumption to hostile levels and enabling denial of service. Version 1.6.5 patches the issue. Some temporary workarounds are available. Enforce input size limits before handing tokens to Authlib and/or use application-level throttling to reduce amplification risk.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-Authlib-1.3.1-150600.3.6.1.noarch",
"SUSE Linux Enterprise Module for Python 3 15 SP7:python311-Authlib-1.3.1-150600.3.6.1.noarch",
"openSUSE Leap 15.6:python311-Authlib-1.3.1-150600.3.6.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61920",
"url": "https://www.suse.com/security/cve/CVE-2025-61920"
},
{
"category": "external",
"summary": "SUSE Bug 1251921 for CVE-2025-61920",
"url": "https://bugzilla.suse.com/1251921"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-Authlib-1.3.1-150600.3.6.1.noarch",
"SUSE Linux Enterprise Module for Python 3 15 SP7:python311-Authlib-1.3.1-150600.3.6.1.noarch",
"openSUSE Leap 15.6:python311-Authlib-1.3.1-150600.3.6.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-Authlib-1.3.1-150600.3.6.1.noarch",
"SUSE Linux Enterprise Module for Python 3 15 SP7:python311-Authlib-1.3.1-150600.3.6.1.noarch",
"openSUSE Leap 15.6:python311-Authlib-1.3.1-150600.3.6.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-23T10:27:00Z",
"details": "important"
}
],
"title": "CVE-2025-61920"
}
]
}
FKIE_CVE-2025-61920
Vulnerability from fkie_nvd - Published: 2025-10-10 20:15 - Updated: 2025-11-03 18:17{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:authlib:authlib:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B4367901-9190-47A3-88FA-173EE7C2FB13",
"versionEndExcluding": "1.6.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Authlib is a Python library which builds OAuth and OpenID Connect servers. Prior to version 1.6.5, Authlib\u2019s JOSE implementation accepts unbounded JWS/JWT header and signature segments. A remote attacker can craft a token whose base64url\u2011encoded header or signature spans hundreds of megabytes. During verification, Authlib decodes and parses the full input before it is rejected, driving CPU and memory consumption to hostile levels and enabling denial of service. Version 1.6.5 patches the issue. Some temporary workarounds are available. Enforce input size limits before handing tokens to Authlib and/or use application-level throttling to reduce amplification risk."
}
],
"id": "CVE-2025-61920",
"lastModified": "2025-11-03T18:17:01.530",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "security-advisories@github.com",
"type": "Secondary"
}
]
},
"published": "2025-10-10T20:15:37.893",
"references": [
{
"source": "security-advisories@github.com",
"tags": [
"Patch"
],
"url": "https://github.com/authlib/authlib/commit/867e3f87b072347a1ae9cf6983cc8bbf88447e5e"
},
{
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Mitigation",
"Vendor Advisory"
],
"url": "https://github.com/authlib/authlib/security/advisories/GHSA-pq5p-34cr-23v9"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00032.html"
}
],
"sourceIdentifier": "security-advisories@github.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
},
{
"lang": "en",
"value": "CWE-400"
},
{
"lang": "en",
"value": "CWE-770"
}
],
"source": "security-advisories@github.com",
"type": "Secondary"
}
]
}
RHSA-2025:23059
Vulnerability from csaf_redhat - Published: 2025-12-10 15:51 - Updated: 2026-03-16 06:38Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat Quay 3.12 is now available with bug fixes.",
"title": "Topic"
},
{
"category": "general",
"text": "Quay 3.12",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:23059",
"url": "https://access.redhat.com/errata/RHSA-2025:23059"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2024-34156",
"url": "https://access.redhat.com/security/cve/CVE-2024-34156"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-47913",
"url": "https://access.redhat.com/security/cve/CVE-2025-47913"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-59420",
"url": "https://access.redhat.com/security/cve/CVE-2025-59420"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61920",
"url": "https://access.redhat.com/security/cve/CVE-2025-61920"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_23059.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Quay 3.12",
"tracking": {
"current_release_date": "2026-03-16T06:38:43+00:00",
"generator": {
"date": "2026-03-16T06:38:43+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.3"
}
},
"id": "RHSA-2025:23059",
"initial_release_date": "2025-12-10T15:51:53+00:00",
"revision_history": [
{
"date": "2025-12-10T15:51:53+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-12-10T15:52:01+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-16T06:38:43+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Quay 3.12",
"product": {
"name": "Red Hat Quay 3.12",
"product_id": "Red Hat Quay 3.12",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:quay:3.12::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat Quay"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:53c387293b92691eb66ea73b1d29781cf275f01b4254c38e21620c0502987272_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:53c387293b92691eb66ea73b1d29781cf275f01b4254c38e21620c0502987272_amd64",
"product_id": "registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:53c387293b92691eb66ea73b1d29781cf275f01b4254c38e21620c0502987272_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-container-security-operator-bundle@sha256%3A53c387293b92691eb66ea73b1d29781cf275f01b4254c38e21620c0502987272?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=3.12.13-1765381502"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7814f04947e8e98d3c4870894e320b12c557976495bdf28a89b55bf061bacf79_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7814f04947e8e98d3c4870894e320b12c557976495bdf28a89b55bf061bacf79_amd64",
"product_id": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7814f04947e8e98d3c4870894e320b12c557976495bdf28a89b55bf061bacf79_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-container-security-operator-rhel8@sha256%3A7814f04947e8e98d3c4870894e320b12c557976495bdf28a89b55bf061bacf79?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=3.12.13-1765381502"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:0a978bbe91e0e0b8bab6862522f8a0aa8e974b778cc36b83f0781081621c8e23_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:0a978bbe91e0e0b8bab6862522f8a0aa8e974b778cc36b83f0781081621c8e23_amd64",
"product_id": "registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:0a978bbe91e0e0b8bab6862522f8a0aa8e974b778cc36b83f0781081621c8e23_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-bridge-operator-bundle@sha256%3A0a978bbe91e0e0b8bab6862522f8a0aa8e974b778cc36b83f0781081621c8e23?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=3.12.13-1765381502"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:ad2119941c2e8db1691a9bfee085425c7203ab00c2cdf0a6441b1102109cfd21_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:ad2119941c2e8db1691a9bfee085425c7203ab00c2cdf0a6441b1102109cfd21_amd64",
"product_id": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:ad2119941c2e8db1691a9bfee085425c7203ab00c2cdf0a6441b1102109cfd21_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-bridge-operator-rhel8@sha256%3Aad2119941c2e8db1691a9bfee085425c7203ab00c2cdf0a6441b1102109cfd21?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=3.12.13-1765381502"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:1f769259f2b91d47f4d4fbf92414903a62380a358737e7100a1166ccd8c89b85_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:1f769259f2b91d47f4d4fbf92414903a62380a358737e7100a1166ccd8c89b85_amd64",
"product_id": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:1f769259f2b91d47f4d4fbf92414903a62380a358737e7100a1166ccd8c89b85_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-builder-qemu-rhcos-rhel8@sha256%3A1f769259f2b91d47f4d4fbf92414903a62380a358737e7100a1166ccd8c89b85?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=3.14-1765381502"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:7a338bb18181535a2644bf70cae05042e1ef2af5a80e70a6cab6516e8f054896_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:7a338bb18181535a2644bf70cae05042e1ef2af5a80e70a6cab6516e8f054896_amd64",
"product_id": "registry.redhat.io/quay/quay-builder-rhel8@sha256:7a338bb18181535a2644bf70cae05042e1ef2af5a80e70a6cab6516e8f054896_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-builder-rhel8@sha256%3A7a338bb18181535a2644bf70cae05042e1ef2af5a80e70a6cab6516e8f054896?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=8.10-1765381502"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/clair-rhel8@sha256:c5cb9d3d0f970ad36005f2d376547e967e4a89574cca1cf8806bb92d05199d70_amd64",
"product": {
"name": "registry.redhat.io/quay/clair-rhel8@sha256:c5cb9d3d0f970ad36005f2d376547e967e4a89574cca1cf8806bb92d05199d70_amd64",
"product_id": "registry.redhat.io/quay/clair-rhel8@sha256:c5cb9d3d0f970ad36005f2d376547e967e4a89574cca1cf8806bb92d05199d70_amd64",
"product_identification_helper": {
"purl": "pkg:oci/clair-rhel8@sha256%3Ac5cb9d3d0f970ad36005f2d376547e967e4a89574cca1cf8806bb92d05199d70?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=v3.12.0-1765381502"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-operator-bundle@sha256:1c915a6f813564b9bf8062ea5c6a83097a8dd78a38fda0171fae9cc8d81299c7_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-operator-bundle@sha256:1c915a6f813564b9bf8062ea5c6a83097a8dd78a38fda0171fae9cc8d81299c7_amd64",
"product_id": "registry.redhat.io/quay/quay-operator-bundle@sha256:1c915a6f813564b9bf8062ea5c6a83097a8dd78a38fda0171fae9cc8d81299c7_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-operator-bundle@sha256%3A1c915a6f813564b9bf8062ea5c6a83097a8dd78a38fda0171fae9cc8d81299c7?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=3.12.13-1765381502"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:f960e1816f8babb590a55ccab9f2db1b567df749e73c70067269d32f6200bca6_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:f960e1816f8babb590a55ccab9f2db1b567df749e73c70067269d32f6200bca6_amd64",
"product_id": "registry.redhat.io/quay/quay-operator-rhel8@sha256:f960e1816f8babb590a55ccab9f2db1b567df749e73c70067269d32f6200bca6_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-operator-rhel8@sha256%3Af960e1816f8babb590a55ccab9f2db1b567df749e73c70067269d32f6200bca6?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=3.12.13-1765381502"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-rhel8@sha256:a40309477f7286b6c00381012eec8d3ececb557a4b8db38e5b4ea7f321a17c79_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-rhel8@sha256:a40309477f7286b6c00381012eec8d3ececb557a4b8db38e5b4ea7f321a17c79_amd64",
"product_id": "registry.redhat.io/quay/quay-rhel8@sha256:a40309477f7286b6c00381012eec8d3ececb557a4b8db38e5b4ea7f321a17c79_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-rhel8@sha256%3Aa40309477f7286b6c00381012eec8d3ececb557a4b8db38e5b4ea7f321a17c79?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=3.12-1765381502"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:b2a263d3cbf303d0dffb2c36ee2a4187c29902ce96ca1ded6f33b2edcc68fda9_arm64",
"product": {
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:b2a263d3cbf303d0dffb2c36ee2a4187c29902ce96ca1ded6f33b2edcc68fda9_arm64",
"product_id": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:b2a263d3cbf303d0dffb2c36ee2a4187c29902ce96ca1ded6f33b2edcc68fda9_arm64",
"product_identification_helper": {
"purl": "pkg:oci/quay-container-security-operator-rhel8@sha256%3Ab2a263d3cbf303d0dffb2c36ee2a4187c29902ce96ca1ded6f33b2edcc68fda9?arch=arm64\u0026repository_url=registry.redhat.io/quay\u0026tag=3.12.13-1765381502"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8b3684c92affc7acadcd5dc8eb80e5727081c7ecf4cc6eeafe5ecc5ea60970bb_arm64",
"product": {
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8b3684c92affc7acadcd5dc8eb80e5727081c7ecf4cc6eeafe5ecc5ea60970bb_arm64",
"product_id": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8b3684c92affc7acadcd5dc8eb80e5727081c7ecf4cc6eeafe5ecc5ea60970bb_arm64",
"product_identification_helper": {
"purl": "pkg:oci/quay-bridge-operator-rhel8@sha256%3A8b3684c92affc7acadcd5dc8eb80e5727081c7ecf4cc6eeafe5ecc5ea60970bb?arch=arm64\u0026repository_url=registry.redhat.io/quay\u0026tag=3.12.13-1765381502"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0c7a94928e8ef89aebdd9b30a47aaf0fe4dfb3a716603362b5c7d52255c4e842_arm64",
"product": {
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0c7a94928e8ef89aebdd9b30a47aaf0fe4dfb3a716603362b5c7d52255c4e842_arm64",
"product_id": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0c7a94928e8ef89aebdd9b30a47aaf0fe4dfb3a716603362b5c7d52255c4e842_arm64",
"product_identification_helper": {
"purl": "pkg:oci/quay-builder-qemu-rhcos-rhel8@sha256%3A0c7a94928e8ef89aebdd9b30a47aaf0fe4dfb3a716603362b5c7d52255c4e842?arch=arm64\u0026repository_url=registry.redhat.io/quay\u0026tag=3.14-1765381502"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:00eb13b3cccf326292589a680a964160c58f83391d0036c4ebcb34fad32b6189_arm64",
"product": {
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:00eb13b3cccf326292589a680a964160c58f83391d0036c4ebcb34fad32b6189_arm64",
"product_id": "registry.redhat.io/quay/quay-builder-rhel8@sha256:00eb13b3cccf326292589a680a964160c58f83391d0036c4ebcb34fad32b6189_arm64",
"product_identification_helper": {
"purl": "pkg:oci/quay-builder-rhel8@sha256%3A00eb13b3cccf326292589a680a964160c58f83391d0036c4ebcb34fad32b6189?arch=arm64\u0026repository_url=registry.redhat.io/quay\u0026tag=8.10-1765381502"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/clair-rhel8@sha256:11091b652f65868606c3d4d3e30a04cea7396f06f119bcd0a4cf664db2aa790e_arm64",
"product": {
"name": "registry.redhat.io/quay/clair-rhel8@sha256:11091b652f65868606c3d4d3e30a04cea7396f06f119bcd0a4cf664db2aa790e_arm64",
"product_id": "registry.redhat.io/quay/clair-rhel8@sha256:11091b652f65868606c3d4d3e30a04cea7396f06f119bcd0a4cf664db2aa790e_arm64",
"product_identification_helper": {
"purl": "pkg:oci/clair-rhel8@sha256%3A11091b652f65868606c3d4d3e30a04cea7396f06f119bcd0a4cf664db2aa790e?arch=arm64\u0026repository_url=registry.redhat.io/quay\u0026tag=v3.12.0-1765381502"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:b2e2d245c7ba3d1528e73b59bad428f023eeb17a1983d61edcf6a22db58911cf_arm64",
"product": {
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:b2e2d245c7ba3d1528e73b59bad428f023eeb17a1983d61edcf6a22db58911cf_arm64",
"product_id": "registry.redhat.io/quay/quay-operator-rhel8@sha256:b2e2d245c7ba3d1528e73b59bad428f023eeb17a1983d61edcf6a22db58911cf_arm64",
"product_identification_helper": {
"purl": "pkg:oci/quay-operator-rhel8@sha256%3Ab2e2d245c7ba3d1528e73b59bad428f023eeb17a1983d61edcf6a22db58911cf?arch=arm64\u0026repository_url=registry.redhat.io/quay\u0026tag=3.12.13-1765381502"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-rhel8@sha256:30152d31da209c034ec39b52a32063437097eec9a4fac2eaf4a4110fea97cb70_arm64",
"product": {
"name": "registry.redhat.io/quay/quay-rhel8@sha256:30152d31da209c034ec39b52a32063437097eec9a4fac2eaf4a4110fea97cb70_arm64",
"product_id": "registry.redhat.io/quay/quay-rhel8@sha256:30152d31da209c034ec39b52a32063437097eec9a4fac2eaf4a4110fea97cb70_arm64",
"product_identification_helper": {
"purl": "pkg:oci/quay-rhel8@sha256%3A30152d31da209c034ec39b52a32063437097eec9a4fac2eaf4a4110fea97cb70?arch=arm64\u0026repository_url=registry.redhat.io/quay\u0026tag=3.12-1765381502"
}
}
}
],
"category": "architecture",
"name": "arm64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:33d0912dbad0b1702fd91abf87e38910d2b983334062044c292a0cb1714187a0_ppc64le",
"product": {
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:33d0912dbad0b1702fd91abf87e38910d2b983334062044c292a0cb1714187a0_ppc64le",
"product_id": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:33d0912dbad0b1702fd91abf87e38910d2b983334062044c292a0cb1714187a0_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/quay-container-security-operator-rhel8@sha256%3A33d0912dbad0b1702fd91abf87e38910d2b983334062044c292a0cb1714187a0?arch=ppc64le\u0026repository_url=registry.redhat.io/quay\u0026tag=3.12.13-1765381502"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8d474498354d438fc9deeceb3bc89649f35d4e382e930ee721059bfeaf0f8279_ppc64le",
"product": {
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8d474498354d438fc9deeceb3bc89649f35d4e382e930ee721059bfeaf0f8279_ppc64le",
"product_id": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8d474498354d438fc9deeceb3bc89649f35d4e382e930ee721059bfeaf0f8279_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/quay-bridge-operator-rhel8@sha256%3A8d474498354d438fc9deeceb3bc89649f35d4e382e930ee721059bfeaf0f8279?arch=ppc64le\u0026repository_url=registry.redhat.io/quay\u0026tag=3.12.13-1765381502"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bd796d2de4d02f63adc767aa22b9a388b3adea40c12b0d8f158ebffabed6fee9_ppc64le",
"product": {
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bd796d2de4d02f63adc767aa22b9a388b3adea40c12b0d8f158ebffabed6fee9_ppc64le",
"product_id": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bd796d2de4d02f63adc767aa22b9a388b3adea40c12b0d8f158ebffabed6fee9_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/quay-builder-qemu-rhcos-rhel8@sha256%3Abd796d2de4d02f63adc767aa22b9a388b3adea40c12b0d8f158ebffabed6fee9?arch=ppc64le\u0026repository_url=registry.redhat.io/quay\u0026tag=3.14-1765381502"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:3facbc804376b505181c2f52f0c7a433111bcedcb5699a0fcdffd7e9a2bdfbbe_ppc64le",
"product": {
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:3facbc804376b505181c2f52f0c7a433111bcedcb5699a0fcdffd7e9a2bdfbbe_ppc64le",
"product_id": "registry.redhat.io/quay/quay-builder-rhel8@sha256:3facbc804376b505181c2f52f0c7a433111bcedcb5699a0fcdffd7e9a2bdfbbe_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/quay-builder-rhel8@sha256%3A3facbc804376b505181c2f52f0c7a433111bcedcb5699a0fcdffd7e9a2bdfbbe?arch=ppc64le\u0026repository_url=registry.redhat.io/quay\u0026tag=8.10-1765381502"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/clair-rhel8@sha256:212ceac279067567409c47acf7792e0c4d1955395f045e3b717040321dc1b88f_ppc64le",
"product": {
"name": "registry.redhat.io/quay/clair-rhel8@sha256:212ceac279067567409c47acf7792e0c4d1955395f045e3b717040321dc1b88f_ppc64le",
"product_id": "registry.redhat.io/quay/clair-rhel8@sha256:212ceac279067567409c47acf7792e0c4d1955395f045e3b717040321dc1b88f_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/clair-rhel8@sha256%3A212ceac279067567409c47acf7792e0c4d1955395f045e3b717040321dc1b88f?arch=ppc64le\u0026repository_url=registry.redhat.io/quay\u0026tag=v3.12.0-1765381502"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:37039569fe73c3975468ffb8640c42becdd9b5304fb5e54789bf59dc67c52c9b_ppc64le",
"product": {
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:37039569fe73c3975468ffb8640c42becdd9b5304fb5e54789bf59dc67c52c9b_ppc64le",
"product_id": "registry.redhat.io/quay/quay-operator-rhel8@sha256:37039569fe73c3975468ffb8640c42becdd9b5304fb5e54789bf59dc67c52c9b_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/quay-operator-rhel8@sha256%3A37039569fe73c3975468ffb8640c42becdd9b5304fb5e54789bf59dc67c52c9b?arch=ppc64le\u0026repository_url=registry.redhat.io/quay\u0026tag=3.12.13-1765381502"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-rhel8@sha256:38f094f62eed92d88eae0e7a9be410ef908bd0194b30240d49087ae76250e0ee_ppc64le",
"product": {
"name": "registry.redhat.io/quay/quay-rhel8@sha256:38f094f62eed92d88eae0e7a9be410ef908bd0194b30240d49087ae76250e0ee_ppc64le",
"product_id": "registry.redhat.io/quay/quay-rhel8@sha256:38f094f62eed92d88eae0e7a9be410ef908bd0194b30240d49087ae76250e0ee_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/quay-rhel8@sha256%3A38f094f62eed92d88eae0e7a9be410ef908bd0194b30240d49087ae76250e0ee?arch=ppc64le\u0026repository_url=registry.redhat.io/quay\u0026tag=3.12-1765381502"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:1b0a31b5f6d1e1493974efb8c7ca5112e6e4d8f0b8e1de8e55b7b8c1184b2293_s390x",
"product": {
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:1b0a31b5f6d1e1493974efb8c7ca5112e6e4d8f0b8e1de8e55b7b8c1184b2293_s390x",
"product_id": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:1b0a31b5f6d1e1493974efb8c7ca5112e6e4d8f0b8e1de8e55b7b8c1184b2293_s390x",
"product_identification_helper": {
"purl": "pkg:oci/quay-container-security-operator-rhel8@sha256%3A1b0a31b5f6d1e1493974efb8c7ca5112e6e4d8f0b8e1de8e55b7b8c1184b2293?arch=s390x\u0026repository_url=registry.redhat.io/quay\u0026tag=3.12.13-1765381502"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:cdf96fe7a1ad4c192b4313e804d40d5c656c3f0ced498bae2427e449f0b2df02_s390x",
"product": {
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:cdf96fe7a1ad4c192b4313e804d40d5c656c3f0ced498bae2427e449f0b2df02_s390x",
"product_id": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:cdf96fe7a1ad4c192b4313e804d40d5c656c3f0ced498bae2427e449f0b2df02_s390x",
"product_identification_helper": {
"purl": "pkg:oci/quay-bridge-operator-rhel8@sha256%3Acdf96fe7a1ad4c192b4313e804d40d5c656c3f0ced498bae2427e449f0b2df02?arch=s390x\u0026repository_url=registry.redhat.io/quay\u0026tag=3.12.13-1765381502"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:a71b5493009863c4f1e9ae9393ff236dc262d84ee028482ee58840fbfe392c83_s390x",
"product": {
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:a71b5493009863c4f1e9ae9393ff236dc262d84ee028482ee58840fbfe392c83_s390x",
"product_id": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:a71b5493009863c4f1e9ae9393ff236dc262d84ee028482ee58840fbfe392c83_s390x",
"product_identification_helper": {
"purl": "pkg:oci/quay-builder-qemu-rhcos-rhel8@sha256%3Aa71b5493009863c4f1e9ae9393ff236dc262d84ee028482ee58840fbfe392c83?arch=s390x\u0026repository_url=registry.redhat.io/quay\u0026tag=3.14-1765381502"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:0ca5a583ca7ff0161ed35deeae94be78adc74100d0343b778f1edf5b77e90925_s390x",
"product": {
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:0ca5a583ca7ff0161ed35deeae94be78adc74100d0343b778f1edf5b77e90925_s390x",
"product_id": "registry.redhat.io/quay/quay-builder-rhel8@sha256:0ca5a583ca7ff0161ed35deeae94be78adc74100d0343b778f1edf5b77e90925_s390x",
"product_identification_helper": {
"purl": "pkg:oci/quay-builder-rhel8@sha256%3A0ca5a583ca7ff0161ed35deeae94be78adc74100d0343b778f1edf5b77e90925?arch=s390x\u0026repository_url=registry.redhat.io/quay\u0026tag=8.10-1765381502"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/clair-rhel8@sha256:451da4b858587adcef52b5f1c9b7c92985bd7cc7c90f651b9e38825b81b38fb0_s390x",
"product": {
"name": "registry.redhat.io/quay/clair-rhel8@sha256:451da4b858587adcef52b5f1c9b7c92985bd7cc7c90f651b9e38825b81b38fb0_s390x",
"product_id": "registry.redhat.io/quay/clair-rhel8@sha256:451da4b858587adcef52b5f1c9b7c92985bd7cc7c90f651b9e38825b81b38fb0_s390x",
"product_identification_helper": {
"purl": "pkg:oci/clair-rhel8@sha256%3A451da4b858587adcef52b5f1c9b7c92985bd7cc7c90f651b9e38825b81b38fb0?arch=s390x\u0026repository_url=registry.redhat.io/quay\u0026tag=v3.12.0-1765381502"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:4e2ef7cca978574e1715c24b9874c7a0a1a46a6319884a91fe54df06efe97df1_s390x",
"product": {
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:4e2ef7cca978574e1715c24b9874c7a0a1a46a6319884a91fe54df06efe97df1_s390x",
"product_id": "registry.redhat.io/quay/quay-operator-rhel8@sha256:4e2ef7cca978574e1715c24b9874c7a0a1a46a6319884a91fe54df06efe97df1_s390x",
"product_identification_helper": {
"purl": "pkg:oci/quay-operator-rhel8@sha256%3A4e2ef7cca978574e1715c24b9874c7a0a1a46a6319884a91fe54df06efe97df1?arch=s390x\u0026repository_url=registry.redhat.io/quay\u0026tag=3.12.13-1765381502"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-rhel8@sha256:4d0a86e557e93eb8e7d70d538f181c2d33176b3537fb8d9e3a1e76a16ee2eed5_s390x",
"product": {
"name": "registry.redhat.io/quay/quay-rhel8@sha256:4d0a86e557e93eb8e7d70d538f181c2d33176b3537fb8d9e3a1e76a16ee2eed5_s390x",
"product_id": "registry.redhat.io/quay/quay-rhel8@sha256:4d0a86e557e93eb8e7d70d538f181c2d33176b3537fb8d9e3a1e76a16ee2eed5_s390x",
"product_identification_helper": {
"purl": "pkg:oci/quay-rhel8@sha256%3A4d0a86e557e93eb8e7d70d538f181c2d33176b3537fb8d9e3a1e76a16ee2eed5?arch=s390x\u0026repository_url=registry.redhat.io/quay\u0026tag=3.12-1765381502"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/clair-rhel8@sha256:11091b652f65868606c3d4d3e30a04cea7396f06f119bcd0a4cf664db2aa790e_arm64 as a component of Red Hat Quay 3.12",
"product_id": "Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:11091b652f65868606c3d4d3e30a04cea7396f06f119bcd0a4cf664db2aa790e_arm64"
},
"product_reference": "registry.redhat.io/quay/clair-rhel8@sha256:11091b652f65868606c3d4d3e30a04cea7396f06f119bcd0a4cf664db2aa790e_arm64",
"relates_to_product_reference": "Red Hat Quay 3.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/clair-rhel8@sha256:212ceac279067567409c47acf7792e0c4d1955395f045e3b717040321dc1b88f_ppc64le as a component of Red Hat Quay 3.12",
"product_id": "Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:212ceac279067567409c47acf7792e0c4d1955395f045e3b717040321dc1b88f_ppc64le"
},
"product_reference": "registry.redhat.io/quay/clair-rhel8@sha256:212ceac279067567409c47acf7792e0c4d1955395f045e3b717040321dc1b88f_ppc64le",
"relates_to_product_reference": "Red Hat Quay 3.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/clair-rhel8@sha256:451da4b858587adcef52b5f1c9b7c92985bd7cc7c90f651b9e38825b81b38fb0_s390x as a component of Red Hat Quay 3.12",
"product_id": "Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:451da4b858587adcef52b5f1c9b7c92985bd7cc7c90f651b9e38825b81b38fb0_s390x"
},
"product_reference": "registry.redhat.io/quay/clair-rhel8@sha256:451da4b858587adcef52b5f1c9b7c92985bd7cc7c90f651b9e38825b81b38fb0_s390x",
"relates_to_product_reference": "Red Hat Quay 3.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/clair-rhel8@sha256:c5cb9d3d0f970ad36005f2d376547e967e4a89574cca1cf8806bb92d05199d70_amd64 as a component of Red Hat Quay 3.12",
"product_id": "Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:c5cb9d3d0f970ad36005f2d376547e967e4a89574cca1cf8806bb92d05199d70_amd64"
},
"product_reference": "registry.redhat.io/quay/clair-rhel8@sha256:c5cb9d3d0f970ad36005f2d376547e967e4a89574cca1cf8806bb92d05199d70_amd64",
"relates_to_product_reference": "Red Hat Quay 3.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:0a978bbe91e0e0b8bab6862522f8a0aa8e974b778cc36b83f0781081621c8e23_amd64 as a component of Red Hat Quay 3.12",
"product_id": "Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:0a978bbe91e0e0b8bab6862522f8a0aa8e974b778cc36b83f0781081621c8e23_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:0a978bbe91e0e0b8bab6862522f8a0aa8e974b778cc36b83f0781081621c8e23_amd64",
"relates_to_product_reference": "Red Hat Quay 3.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8b3684c92affc7acadcd5dc8eb80e5727081c7ecf4cc6eeafe5ecc5ea60970bb_arm64 as a component of Red Hat Quay 3.12",
"product_id": "Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8b3684c92affc7acadcd5dc8eb80e5727081c7ecf4cc6eeafe5ecc5ea60970bb_arm64"
},
"product_reference": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8b3684c92affc7acadcd5dc8eb80e5727081c7ecf4cc6eeafe5ecc5ea60970bb_arm64",
"relates_to_product_reference": "Red Hat Quay 3.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8d474498354d438fc9deeceb3bc89649f35d4e382e930ee721059bfeaf0f8279_ppc64le as a component of Red Hat Quay 3.12",
"product_id": "Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8d474498354d438fc9deeceb3bc89649f35d4e382e930ee721059bfeaf0f8279_ppc64le"
},
"product_reference": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8d474498354d438fc9deeceb3bc89649f35d4e382e930ee721059bfeaf0f8279_ppc64le",
"relates_to_product_reference": "Red Hat Quay 3.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:ad2119941c2e8db1691a9bfee085425c7203ab00c2cdf0a6441b1102109cfd21_amd64 as a component of Red Hat Quay 3.12",
"product_id": "Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:ad2119941c2e8db1691a9bfee085425c7203ab00c2cdf0a6441b1102109cfd21_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:ad2119941c2e8db1691a9bfee085425c7203ab00c2cdf0a6441b1102109cfd21_amd64",
"relates_to_product_reference": "Red Hat Quay 3.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:cdf96fe7a1ad4c192b4313e804d40d5c656c3f0ced498bae2427e449f0b2df02_s390x as a component of Red Hat Quay 3.12",
"product_id": "Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:cdf96fe7a1ad4c192b4313e804d40d5c656c3f0ced498bae2427e449f0b2df02_s390x"
},
"product_reference": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:cdf96fe7a1ad4c192b4313e804d40d5c656c3f0ced498bae2427e449f0b2df02_s390x",
"relates_to_product_reference": "Red Hat Quay 3.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0c7a94928e8ef89aebdd9b30a47aaf0fe4dfb3a716603362b5c7d52255c4e842_arm64 as a component of Red Hat Quay 3.12",
"product_id": "Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0c7a94928e8ef89aebdd9b30a47aaf0fe4dfb3a716603362b5c7d52255c4e842_arm64"
},
"product_reference": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0c7a94928e8ef89aebdd9b30a47aaf0fe4dfb3a716603362b5c7d52255c4e842_arm64",
"relates_to_product_reference": "Red Hat Quay 3.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:1f769259f2b91d47f4d4fbf92414903a62380a358737e7100a1166ccd8c89b85_amd64 as a component of Red Hat Quay 3.12",
"product_id": "Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:1f769259f2b91d47f4d4fbf92414903a62380a358737e7100a1166ccd8c89b85_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:1f769259f2b91d47f4d4fbf92414903a62380a358737e7100a1166ccd8c89b85_amd64",
"relates_to_product_reference": "Red Hat Quay 3.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:a71b5493009863c4f1e9ae9393ff236dc262d84ee028482ee58840fbfe392c83_s390x as a component of Red Hat Quay 3.12",
"product_id": "Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:a71b5493009863c4f1e9ae9393ff236dc262d84ee028482ee58840fbfe392c83_s390x"
},
"product_reference": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:a71b5493009863c4f1e9ae9393ff236dc262d84ee028482ee58840fbfe392c83_s390x",
"relates_to_product_reference": "Red Hat Quay 3.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bd796d2de4d02f63adc767aa22b9a388b3adea40c12b0d8f158ebffabed6fee9_ppc64le as a component of Red Hat Quay 3.12",
"product_id": "Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bd796d2de4d02f63adc767aa22b9a388b3adea40c12b0d8f158ebffabed6fee9_ppc64le"
},
"product_reference": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bd796d2de4d02f63adc767aa22b9a388b3adea40c12b0d8f158ebffabed6fee9_ppc64le",
"relates_to_product_reference": "Red Hat Quay 3.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:00eb13b3cccf326292589a680a964160c58f83391d0036c4ebcb34fad32b6189_arm64 as a component of Red Hat Quay 3.12",
"product_id": "Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:00eb13b3cccf326292589a680a964160c58f83391d0036c4ebcb34fad32b6189_arm64"
},
"product_reference": "registry.redhat.io/quay/quay-builder-rhel8@sha256:00eb13b3cccf326292589a680a964160c58f83391d0036c4ebcb34fad32b6189_arm64",
"relates_to_product_reference": "Red Hat Quay 3.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:0ca5a583ca7ff0161ed35deeae94be78adc74100d0343b778f1edf5b77e90925_s390x as a component of Red Hat Quay 3.12",
"product_id": "Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:0ca5a583ca7ff0161ed35deeae94be78adc74100d0343b778f1edf5b77e90925_s390x"
},
"product_reference": "registry.redhat.io/quay/quay-builder-rhel8@sha256:0ca5a583ca7ff0161ed35deeae94be78adc74100d0343b778f1edf5b77e90925_s390x",
"relates_to_product_reference": "Red Hat Quay 3.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:3facbc804376b505181c2f52f0c7a433111bcedcb5699a0fcdffd7e9a2bdfbbe_ppc64le as a component of Red Hat Quay 3.12",
"product_id": "Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:3facbc804376b505181c2f52f0c7a433111bcedcb5699a0fcdffd7e9a2bdfbbe_ppc64le"
},
"product_reference": "registry.redhat.io/quay/quay-builder-rhel8@sha256:3facbc804376b505181c2f52f0c7a433111bcedcb5699a0fcdffd7e9a2bdfbbe_ppc64le",
"relates_to_product_reference": "Red Hat Quay 3.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:7a338bb18181535a2644bf70cae05042e1ef2af5a80e70a6cab6516e8f054896_amd64 as a component of Red Hat Quay 3.12",
"product_id": "Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:7a338bb18181535a2644bf70cae05042e1ef2af5a80e70a6cab6516e8f054896_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-builder-rhel8@sha256:7a338bb18181535a2644bf70cae05042e1ef2af5a80e70a6cab6516e8f054896_amd64",
"relates_to_product_reference": "Red Hat Quay 3.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:53c387293b92691eb66ea73b1d29781cf275f01b4254c38e21620c0502987272_amd64 as a component of Red Hat Quay 3.12",
"product_id": "Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:53c387293b92691eb66ea73b1d29781cf275f01b4254c38e21620c0502987272_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:53c387293b92691eb66ea73b1d29781cf275f01b4254c38e21620c0502987272_amd64",
"relates_to_product_reference": "Red Hat Quay 3.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:1b0a31b5f6d1e1493974efb8c7ca5112e6e4d8f0b8e1de8e55b7b8c1184b2293_s390x as a component of Red Hat Quay 3.12",
"product_id": "Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:1b0a31b5f6d1e1493974efb8c7ca5112e6e4d8f0b8e1de8e55b7b8c1184b2293_s390x"
},
"product_reference": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:1b0a31b5f6d1e1493974efb8c7ca5112e6e4d8f0b8e1de8e55b7b8c1184b2293_s390x",
"relates_to_product_reference": "Red Hat Quay 3.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:33d0912dbad0b1702fd91abf87e38910d2b983334062044c292a0cb1714187a0_ppc64le as a component of Red Hat Quay 3.12",
"product_id": "Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:33d0912dbad0b1702fd91abf87e38910d2b983334062044c292a0cb1714187a0_ppc64le"
},
"product_reference": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:33d0912dbad0b1702fd91abf87e38910d2b983334062044c292a0cb1714187a0_ppc64le",
"relates_to_product_reference": "Red Hat Quay 3.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7814f04947e8e98d3c4870894e320b12c557976495bdf28a89b55bf061bacf79_amd64 as a component of Red Hat Quay 3.12",
"product_id": "Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7814f04947e8e98d3c4870894e320b12c557976495bdf28a89b55bf061bacf79_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7814f04947e8e98d3c4870894e320b12c557976495bdf28a89b55bf061bacf79_amd64",
"relates_to_product_reference": "Red Hat Quay 3.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:b2a263d3cbf303d0dffb2c36ee2a4187c29902ce96ca1ded6f33b2edcc68fda9_arm64 as a component of Red Hat Quay 3.12",
"product_id": "Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:b2a263d3cbf303d0dffb2c36ee2a4187c29902ce96ca1ded6f33b2edcc68fda9_arm64"
},
"product_reference": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:b2a263d3cbf303d0dffb2c36ee2a4187c29902ce96ca1ded6f33b2edcc68fda9_arm64",
"relates_to_product_reference": "Red Hat Quay 3.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-operator-bundle@sha256:1c915a6f813564b9bf8062ea5c6a83097a8dd78a38fda0171fae9cc8d81299c7_amd64 as a component of Red Hat Quay 3.12",
"product_id": "Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-bundle@sha256:1c915a6f813564b9bf8062ea5c6a83097a8dd78a38fda0171fae9cc8d81299c7_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-operator-bundle@sha256:1c915a6f813564b9bf8062ea5c6a83097a8dd78a38fda0171fae9cc8d81299c7_amd64",
"relates_to_product_reference": "Red Hat Quay 3.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:37039569fe73c3975468ffb8640c42becdd9b5304fb5e54789bf59dc67c52c9b_ppc64le as a component of Red Hat Quay 3.12",
"product_id": "Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:37039569fe73c3975468ffb8640c42becdd9b5304fb5e54789bf59dc67c52c9b_ppc64le"
},
"product_reference": "registry.redhat.io/quay/quay-operator-rhel8@sha256:37039569fe73c3975468ffb8640c42becdd9b5304fb5e54789bf59dc67c52c9b_ppc64le",
"relates_to_product_reference": "Red Hat Quay 3.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:4e2ef7cca978574e1715c24b9874c7a0a1a46a6319884a91fe54df06efe97df1_s390x as a component of Red Hat Quay 3.12",
"product_id": "Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:4e2ef7cca978574e1715c24b9874c7a0a1a46a6319884a91fe54df06efe97df1_s390x"
},
"product_reference": "registry.redhat.io/quay/quay-operator-rhel8@sha256:4e2ef7cca978574e1715c24b9874c7a0a1a46a6319884a91fe54df06efe97df1_s390x",
"relates_to_product_reference": "Red Hat Quay 3.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:b2e2d245c7ba3d1528e73b59bad428f023eeb17a1983d61edcf6a22db58911cf_arm64 as a component of Red Hat Quay 3.12",
"product_id": "Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:b2e2d245c7ba3d1528e73b59bad428f023eeb17a1983d61edcf6a22db58911cf_arm64"
},
"product_reference": "registry.redhat.io/quay/quay-operator-rhel8@sha256:b2e2d245c7ba3d1528e73b59bad428f023eeb17a1983d61edcf6a22db58911cf_arm64",
"relates_to_product_reference": "Red Hat Quay 3.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:f960e1816f8babb590a55ccab9f2db1b567df749e73c70067269d32f6200bca6_amd64 as a component of Red Hat Quay 3.12",
"product_id": "Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:f960e1816f8babb590a55ccab9f2db1b567df749e73c70067269d32f6200bca6_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-operator-rhel8@sha256:f960e1816f8babb590a55ccab9f2db1b567df749e73c70067269d32f6200bca6_amd64",
"relates_to_product_reference": "Red Hat Quay 3.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-rhel8@sha256:30152d31da209c034ec39b52a32063437097eec9a4fac2eaf4a4110fea97cb70_arm64 as a component of Red Hat Quay 3.12",
"product_id": "Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:30152d31da209c034ec39b52a32063437097eec9a4fac2eaf4a4110fea97cb70_arm64"
},
"product_reference": "registry.redhat.io/quay/quay-rhel8@sha256:30152d31da209c034ec39b52a32063437097eec9a4fac2eaf4a4110fea97cb70_arm64",
"relates_to_product_reference": "Red Hat Quay 3.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-rhel8@sha256:38f094f62eed92d88eae0e7a9be410ef908bd0194b30240d49087ae76250e0ee_ppc64le as a component of Red Hat Quay 3.12",
"product_id": "Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:38f094f62eed92d88eae0e7a9be410ef908bd0194b30240d49087ae76250e0ee_ppc64le"
},
"product_reference": "registry.redhat.io/quay/quay-rhel8@sha256:38f094f62eed92d88eae0e7a9be410ef908bd0194b30240d49087ae76250e0ee_ppc64le",
"relates_to_product_reference": "Red Hat Quay 3.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-rhel8@sha256:4d0a86e557e93eb8e7d70d538f181c2d33176b3537fb8d9e3a1e76a16ee2eed5_s390x as a component of Red Hat Quay 3.12",
"product_id": "Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:4d0a86e557e93eb8e7d70d538f181c2d33176b3537fb8d9e3a1e76a16ee2eed5_s390x"
},
"product_reference": "registry.redhat.io/quay/quay-rhel8@sha256:4d0a86e557e93eb8e7d70d538f181c2d33176b3537fb8d9e3a1e76a16ee2eed5_s390x",
"relates_to_product_reference": "Red Hat Quay 3.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-rhel8@sha256:a40309477f7286b6c00381012eec8d3ececb557a4b8db38e5b4ea7f321a17c79_amd64 as a component of Red Hat Quay 3.12",
"product_id": "Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:a40309477f7286b6c00381012eec8d3ececb557a4b8db38e5b4ea7f321a17c79_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-rhel8@sha256:a40309477f7286b6c00381012eec8d3ececb557a4b8db38e5b4ea7f321a17c79_amd64",
"relates_to_product_reference": "Red Hat Quay 3.12"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-34156",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"discovery_date": "2024-09-06T21:20:09.377905+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:11091b652f65868606c3d4d3e30a04cea7396f06f119bcd0a4cf664db2aa790e_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:212ceac279067567409c47acf7792e0c4d1955395f045e3b717040321dc1b88f_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:451da4b858587adcef52b5f1c9b7c92985bd7cc7c90f651b9e38825b81b38fb0_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:c5cb9d3d0f970ad36005f2d376547e967e4a89574cca1cf8806bb92d05199d70_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:0a978bbe91e0e0b8bab6862522f8a0aa8e974b778cc36b83f0781081621c8e23_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8b3684c92affc7acadcd5dc8eb80e5727081c7ecf4cc6eeafe5ecc5ea60970bb_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8d474498354d438fc9deeceb3bc89649f35d4e382e930ee721059bfeaf0f8279_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:ad2119941c2e8db1691a9bfee085425c7203ab00c2cdf0a6441b1102109cfd21_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:cdf96fe7a1ad4c192b4313e804d40d5c656c3f0ced498bae2427e449f0b2df02_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0c7a94928e8ef89aebdd9b30a47aaf0fe4dfb3a716603362b5c7d52255c4e842_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:1f769259f2b91d47f4d4fbf92414903a62380a358737e7100a1166ccd8c89b85_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:a71b5493009863c4f1e9ae9393ff236dc262d84ee028482ee58840fbfe392c83_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bd796d2de4d02f63adc767aa22b9a388b3adea40c12b0d8f158ebffabed6fee9_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:00eb13b3cccf326292589a680a964160c58f83391d0036c4ebcb34fad32b6189_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:0ca5a583ca7ff0161ed35deeae94be78adc74100d0343b778f1edf5b77e90925_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:3facbc804376b505181c2f52f0c7a433111bcedcb5699a0fcdffd7e9a2bdfbbe_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:7a338bb18181535a2644bf70cae05042e1ef2af5a80e70a6cab6516e8f054896_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:53c387293b92691eb66ea73b1d29781cf275f01b4254c38e21620c0502987272_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-bundle@sha256:1c915a6f813564b9bf8062ea5c6a83097a8dd78a38fda0171fae9cc8d81299c7_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:37039569fe73c3975468ffb8640c42becdd9b5304fb5e54789bf59dc67c52c9b_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:4e2ef7cca978574e1715c24b9874c7a0a1a46a6319884a91fe54df06efe97df1_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:b2e2d245c7ba3d1528e73b59bad428f023eeb17a1983d61edcf6a22db58911cf_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:f960e1816f8babb590a55ccab9f2db1b567df749e73c70067269d32f6200bca6_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:30152d31da209c034ec39b52a32063437097eec9a4fac2eaf4a4110fea97cb70_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:38f094f62eed92d88eae0e7a9be410ef908bd0194b30240d49087ae76250e0ee_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:4d0a86e557e93eb8e7d70d538f181c2d33176b3537fb8d9e3a1e76a16ee2eed5_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:a40309477f7286b6c00381012eec8d3ececb557a4b8db38e5b4ea7f321a17c79_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2310528"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the encoding/gob package of the Golang standard library. Calling Decoder.Decoding, a message that contains deeply nested structures, can cause a panic due to stack exhaustion. This is a follow-up to CVE-2022-30635.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability in Go\u0027s `encoding/gob` package is of high severity because it exposes applications to potential Denial of Service (DoS) attacks through stack exhaustion. Since `gob` relies on recursive function calls to decode nested structures, an attacker could exploit this by sending crafted messages with excessively deep nesting, causing the application to panic due to stack overflow. This risk is particularly important in scenarios where untrusted or external input is processed, as it can lead to system unavailability or crashes, undermining the reliability and availability of services.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:1b0a31b5f6d1e1493974efb8c7ca5112e6e4d8f0b8e1de8e55b7b8c1184b2293_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:33d0912dbad0b1702fd91abf87e38910d2b983334062044c292a0cb1714187a0_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7814f04947e8e98d3c4870894e320b12c557976495bdf28a89b55bf061bacf79_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:b2a263d3cbf303d0dffb2c36ee2a4187c29902ce96ca1ded6f33b2edcc68fda9_arm64"
],
"known_not_affected": [
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:11091b652f65868606c3d4d3e30a04cea7396f06f119bcd0a4cf664db2aa790e_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:212ceac279067567409c47acf7792e0c4d1955395f045e3b717040321dc1b88f_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:451da4b858587adcef52b5f1c9b7c92985bd7cc7c90f651b9e38825b81b38fb0_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:c5cb9d3d0f970ad36005f2d376547e967e4a89574cca1cf8806bb92d05199d70_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:0a978bbe91e0e0b8bab6862522f8a0aa8e974b778cc36b83f0781081621c8e23_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8b3684c92affc7acadcd5dc8eb80e5727081c7ecf4cc6eeafe5ecc5ea60970bb_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8d474498354d438fc9deeceb3bc89649f35d4e382e930ee721059bfeaf0f8279_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:ad2119941c2e8db1691a9bfee085425c7203ab00c2cdf0a6441b1102109cfd21_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:cdf96fe7a1ad4c192b4313e804d40d5c656c3f0ced498bae2427e449f0b2df02_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0c7a94928e8ef89aebdd9b30a47aaf0fe4dfb3a716603362b5c7d52255c4e842_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:1f769259f2b91d47f4d4fbf92414903a62380a358737e7100a1166ccd8c89b85_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:a71b5493009863c4f1e9ae9393ff236dc262d84ee028482ee58840fbfe392c83_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bd796d2de4d02f63adc767aa22b9a388b3adea40c12b0d8f158ebffabed6fee9_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:00eb13b3cccf326292589a680a964160c58f83391d0036c4ebcb34fad32b6189_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:0ca5a583ca7ff0161ed35deeae94be78adc74100d0343b778f1edf5b77e90925_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:3facbc804376b505181c2f52f0c7a433111bcedcb5699a0fcdffd7e9a2bdfbbe_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:7a338bb18181535a2644bf70cae05042e1ef2af5a80e70a6cab6516e8f054896_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:53c387293b92691eb66ea73b1d29781cf275f01b4254c38e21620c0502987272_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-bundle@sha256:1c915a6f813564b9bf8062ea5c6a83097a8dd78a38fda0171fae9cc8d81299c7_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:37039569fe73c3975468ffb8640c42becdd9b5304fb5e54789bf59dc67c52c9b_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:4e2ef7cca978574e1715c24b9874c7a0a1a46a6319884a91fe54df06efe97df1_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:b2e2d245c7ba3d1528e73b59bad428f023eeb17a1983d61edcf6a22db58911cf_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:f960e1816f8babb590a55ccab9f2db1b567df749e73c70067269d32f6200bca6_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:30152d31da209c034ec39b52a32063437097eec9a4fac2eaf4a4110fea97cb70_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:38f094f62eed92d88eae0e7a9be410ef908bd0194b30240d49087ae76250e0ee_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:4d0a86e557e93eb8e7d70d538f181c2d33176b3537fb8d9e3a1e76a16ee2eed5_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:a40309477f7286b6c00381012eec8d3ececb557a4b8db38e5b4ea7f321a17c79_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-34156"
},
{
"category": "external",
"summary": "RHBZ#2310528",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2310528"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-34156",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34156"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-34156",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-34156"
},
{
"category": "external",
"summary": "https://go.dev/cl/611239",
"url": "https://go.dev/cl/611239"
},
{
"category": "external",
"summary": "https://go.dev/issue/69139",
"url": "https://go.dev/issue/69139"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-dev/c/S9POB9NCTdk",
"url": "https://groups.google.com/g/golang-dev/c/S9POB9NCTdk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2024-3106",
"url": "https://pkg.go.dev/vuln/GO-2024-3106"
}
],
"release_date": "2024-09-06T21:15:12.020000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-12-10T15:51:53+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:1b0a31b5f6d1e1493974efb8c7ca5112e6e4d8f0b8e1de8e55b7b8c1184b2293_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:33d0912dbad0b1702fd91abf87e38910d2b983334062044c292a0cb1714187a0_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7814f04947e8e98d3c4870894e320b12c557976495bdf28a89b55bf061bacf79_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:b2a263d3cbf303d0dffb2c36ee2a4187c29902ce96ca1ded6f33b2edcc68fda9_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:23059"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:11091b652f65868606c3d4d3e30a04cea7396f06f119bcd0a4cf664db2aa790e_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:212ceac279067567409c47acf7792e0c4d1955395f045e3b717040321dc1b88f_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:451da4b858587adcef52b5f1c9b7c92985bd7cc7c90f651b9e38825b81b38fb0_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:c5cb9d3d0f970ad36005f2d376547e967e4a89574cca1cf8806bb92d05199d70_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:0a978bbe91e0e0b8bab6862522f8a0aa8e974b778cc36b83f0781081621c8e23_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8b3684c92affc7acadcd5dc8eb80e5727081c7ecf4cc6eeafe5ecc5ea60970bb_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8d474498354d438fc9deeceb3bc89649f35d4e382e930ee721059bfeaf0f8279_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:ad2119941c2e8db1691a9bfee085425c7203ab00c2cdf0a6441b1102109cfd21_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:cdf96fe7a1ad4c192b4313e804d40d5c656c3f0ced498bae2427e449f0b2df02_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0c7a94928e8ef89aebdd9b30a47aaf0fe4dfb3a716603362b5c7d52255c4e842_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:1f769259f2b91d47f4d4fbf92414903a62380a358737e7100a1166ccd8c89b85_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:a71b5493009863c4f1e9ae9393ff236dc262d84ee028482ee58840fbfe392c83_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bd796d2de4d02f63adc767aa22b9a388b3adea40c12b0d8f158ebffabed6fee9_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:00eb13b3cccf326292589a680a964160c58f83391d0036c4ebcb34fad32b6189_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:0ca5a583ca7ff0161ed35deeae94be78adc74100d0343b778f1edf5b77e90925_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:3facbc804376b505181c2f52f0c7a433111bcedcb5699a0fcdffd7e9a2bdfbbe_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:7a338bb18181535a2644bf70cae05042e1ef2af5a80e70a6cab6516e8f054896_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:53c387293b92691eb66ea73b1d29781cf275f01b4254c38e21620c0502987272_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:1b0a31b5f6d1e1493974efb8c7ca5112e6e4d8f0b8e1de8e55b7b8c1184b2293_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:33d0912dbad0b1702fd91abf87e38910d2b983334062044c292a0cb1714187a0_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7814f04947e8e98d3c4870894e320b12c557976495bdf28a89b55bf061bacf79_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:b2a263d3cbf303d0dffb2c36ee2a4187c29902ce96ca1ded6f33b2edcc68fda9_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-bundle@sha256:1c915a6f813564b9bf8062ea5c6a83097a8dd78a38fda0171fae9cc8d81299c7_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:37039569fe73c3975468ffb8640c42becdd9b5304fb5e54789bf59dc67c52c9b_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:4e2ef7cca978574e1715c24b9874c7a0a1a46a6319884a91fe54df06efe97df1_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:b2e2d245c7ba3d1528e73b59bad428f023eeb17a1983d61edcf6a22db58911cf_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:f960e1816f8babb590a55ccab9f2db1b567df749e73c70067269d32f6200bca6_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:30152d31da209c034ec39b52a32063437097eec9a4fac2eaf4a4110fea97cb70_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:38f094f62eed92d88eae0e7a9be410ef908bd0194b30240d49087ae76250e0ee_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:4d0a86e557e93eb8e7d70d538f181c2d33176b3537fb8d9e3a1e76a16ee2eed5_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:a40309477f7286b6c00381012eec8d3ececb557a4b8db38e5b4ea7f321a17c79_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:11091b652f65868606c3d4d3e30a04cea7396f06f119bcd0a4cf664db2aa790e_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:212ceac279067567409c47acf7792e0c4d1955395f045e3b717040321dc1b88f_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:451da4b858587adcef52b5f1c9b7c92985bd7cc7c90f651b9e38825b81b38fb0_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:c5cb9d3d0f970ad36005f2d376547e967e4a89574cca1cf8806bb92d05199d70_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:0a978bbe91e0e0b8bab6862522f8a0aa8e974b778cc36b83f0781081621c8e23_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8b3684c92affc7acadcd5dc8eb80e5727081c7ecf4cc6eeafe5ecc5ea60970bb_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8d474498354d438fc9deeceb3bc89649f35d4e382e930ee721059bfeaf0f8279_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:ad2119941c2e8db1691a9bfee085425c7203ab00c2cdf0a6441b1102109cfd21_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:cdf96fe7a1ad4c192b4313e804d40d5c656c3f0ced498bae2427e449f0b2df02_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0c7a94928e8ef89aebdd9b30a47aaf0fe4dfb3a716603362b5c7d52255c4e842_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:1f769259f2b91d47f4d4fbf92414903a62380a358737e7100a1166ccd8c89b85_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:a71b5493009863c4f1e9ae9393ff236dc262d84ee028482ee58840fbfe392c83_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bd796d2de4d02f63adc767aa22b9a388b3adea40c12b0d8f158ebffabed6fee9_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:00eb13b3cccf326292589a680a964160c58f83391d0036c4ebcb34fad32b6189_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:0ca5a583ca7ff0161ed35deeae94be78adc74100d0343b778f1edf5b77e90925_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:3facbc804376b505181c2f52f0c7a433111bcedcb5699a0fcdffd7e9a2bdfbbe_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:7a338bb18181535a2644bf70cae05042e1ef2af5a80e70a6cab6516e8f054896_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:53c387293b92691eb66ea73b1d29781cf275f01b4254c38e21620c0502987272_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:1b0a31b5f6d1e1493974efb8c7ca5112e6e4d8f0b8e1de8e55b7b8c1184b2293_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:33d0912dbad0b1702fd91abf87e38910d2b983334062044c292a0cb1714187a0_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7814f04947e8e98d3c4870894e320b12c557976495bdf28a89b55bf061bacf79_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:b2a263d3cbf303d0dffb2c36ee2a4187c29902ce96ca1ded6f33b2edcc68fda9_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-bundle@sha256:1c915a6f813564b9bf8062ea5c6a83097a8dd78a38fda0171fae9cc8d81299c7_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:37039569fe73c3975468ffb8640c42becdd9b5304fb5e54789bf59dc67c52c9b_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:4e2ef7cca978574e1715c24b9874c7a0a1a46a6319884a91fe54df06efe97df1_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:b2e2d245c7ba3d1528e73b59bad428f023eeb17a1983d61edcf6a22db58911cf_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:f960e1816f8babb590a55ccab9f2db1b567df749e73c70067269d32f6200bca6_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:30152d31da209c034ec39b52a32063437097eec9a4fac2eaf4a4110fea97cb70_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:38f094f62eed92d88eae0e7a9be410ef908bd0194b30240d49087ae76250e0ee_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:4d0a86e557e93eb8e7d70d538f181c2d33176b3537fb8d9e3a1e76a16ee2eed5_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:a40309477f7286b6c00381012eec8d3ececb557a4b8db38e5b4ea7f321a17c79_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion"
},
{
"cve": "CVE-2025-47913",
"discovery_date": "2025-11-13T22:01:26.092452+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:11091b652f65868606c3d4d3e30a04cea7396f06f119bcd0a4cf664db2aa790e_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:212ceac279067567409c47acf7792e0c4d1955395f045e3b717040321dc1b88f_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:451da4b858587adcef52b5f1c9b7c92985bd7cc7c90f651b9e38825b81b38fb0_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:c5cb9d3d0f970ad36005f2d376547e967e4a89574cca1cf8806bb92d05199d70_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:0a978bbe91e0e0b8bab6862522f8a0aa8e974b778cc36b83f0781081621c8e23_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8b3684c92affc7acadcd5dc8eb80e5727081c7ecf4cc6eeafe5ecc5ea60970bb_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8d474498354d438fc9deeceb3bc89649f35d4e382e930ee721059bfeaf0f8279_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:ad2119941c2e8db1691a9bfee085425c7203ab00c2cdf0a6441b1102109cfd21_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:cdf96fe7a1ad4c192b4313e804d40d5c656c3f0ced498bae2427e449f0b2df02_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0c7a94928e8ef89aebdd9b30a47aaf0fe4dfb3a716603362b5c7d52255c4e842_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:1f769259f2b91d47f4d4fbf92414903a62380a358737e7100a1166ccd8c89b85_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:a71b5493009863c4f1e9ae9393ff236dc262d84ee028482ee58840fbfe392c83_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bd796d2de4d02f63adc767aa22b9a388b3adea40c12b0d8f158ebffabed6fee9_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:53c387293b92691eb66ea73b1d29781cf275f01b4254c38e21620c0502987272_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:1b0a31b5f6d1e1493974efb8c7ca5112e6e4d8f0b8e1de8e55b7b8c1184b2293_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:33d0912dbad0b1702fd91abf87e38910d2b983334062044c292a0cb1714187a0_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7814f04947e8e98d3c4870894e320b12c557976495bdf28a89b55bf061bacf79_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:b2a263d3cbf303d0dffb2c36ee2a4187c29902ce96ca1ded6f33b2edcc68fda9_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-bundle@sha256:1c915a6f813564b9bf8062ea5c6a83097a8dd78a38fda0171fae9cc8d81299c7_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:37039569fe73c3975468ffb8640c42becdd9b5304fb5e54789bf59dc67c52c9b_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:4e2ef7cca978574e1715c24b9874c7a0a1a46a6319884a91fe54df06efe97df1_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:b2e2d245c7ba3d1528e73b59bad428f023eeb17a1983d61edcf6a22db58911cf_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:f960e1816f8babb590a55ccab9f2db1b567df749e73c70067269d32f6200bca6_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:30152d31da209c034ec39b52a32063437097eec9a4fac2eaf4a4110fea97cb70_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:38f094f62eed92d88eae0e7a9be410ef908bd0194b30240d49087ae76250e0ee_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:4d0a86e557e93eb8e7d70d538f181c2d33176b3537fb8d9e3a1e76a16ee2eed5_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:a40309477f7286b6c00381012eec8d3ececb557a4b8db38e5b4ea7f321a17c79_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2414943"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in golang.org/x/crypto/ssh/agent causes the SSH agent client to panic when a peer responds with the generic SSH_AGENT_SUCCESS (0x06) message to requests expecting typed replies (e.g., List, Sign). The unmarshal layer produces an unexpected message type, which the client code does not handle, leading to panic(\"unreachable\") or a nil-pointer dereference. A malicious agent or forwarded connection can exploit this to terminate the client process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang.org/x/crypto/ssh/agent: golang.org/x/crypto/ssh/agent: SSH client panic due to unexpected SSH_AGENT_SUCCESS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability was marked as Important because it allows any malicious or misbehaving SSH agent to force a crash in the client process using a single valid protocol byte. The panic occurs before the client has a chance to validate message structure or recover, which means an attacker controlling\u2014or intercepting\u2014SSH agent traffic can reliably terminate processes that rely on agent interactions. In environments where SSH agents operate over forwarded sockets, shared workspaces, or CI/CD runners, this turns into a reliable, unauthenticated remote denial of service against critical automation or developer tooling. The flaw also stems from unsafe assumptions in the unmarshalling logic, where unexpected but protocol-legal message types drop into \u201cunreachable\u201d code paths instead of being handled gracefully\u2014making it a design-level reliability break rather than a simple error-handling bug. For this reason, it is rated as an important availability-impacting vulnerability rather than a moderate issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:00eb13b3cccf326292589a680a964160c58f83391d0036c4ebcb34fad32b6189_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:0ca5a583ca7ff0161ed35deeae94be78adc74100d0343b778f1edf5b77e90925_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:3facbc804376b505181c2f52f0c7a433111bcedcb5699a0fcdffd7e9a2bdfbbe_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:7a338bb18181535a2644bf70cae05042e1ef2af5a80e70a6cab6516e8f054896_amd64"
],
"known_not_affected": [
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:11091b652f65868606c3d4d3e30a04cea7396f06f119bcd0a4cf664db2aa790e_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:212ceac279067567409c47acf7792e0c4d1955395f045e3b717040321dc1b88f_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:451da4b858587adcef52b5f1c9b7c92985bd7cc7c90f651b9e38825b81b38fb0_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:c5cb9d3d0f970ad36005f2d376547e967e4a89574cca1cf8806bb92d05199d70_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:0a978bbe91e0e0b8bab6862522f8a0aa8e974b778cc36b83f0781081621c8e23_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8b3684c92affc7acadcd5dc8eb80e5727081c7ecf4cc6eeafe5ecc5ea60970bb_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8d474498354d438fc9deeceb3bc89649f35d4e382e930ee721059bfeaf0f8279_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:ad2119941c2e8db1691a9bfee085425c7203ab00c2cdf0a6441b1102109cfd21_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:cdf96fe7a1ad4c192b4313e804d40d5c656c3f0ced498bae2427e449f0b2df02_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0c7a94928e8ef89aebdd9b30a47aaf0fe4dfb3a716603362b5c7d52255c4e842_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:1f769259f2b91d47f4d4fbf92414903a62380a358737e7100a1166ccd8c89b85_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:a71b5493009863c4f1e9ae9393ff236dc262d84ee028482ee58840fbfe392c83_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bd796d2de4d02f63adc767aa22b9a388b3adea40c12b0d8f158ebffabed6fee9_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:53c387293b92691eb66ea73b1d29781cf275f01b4254c38e21620c0502987272_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:1b0a31b5f6d1e1493974efb8c7ca5112e6e4d8f0b8e1de8e55b7b8c1184b2293_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:33d0912dbad0b1702fd91abf87e38910d2b983334062044c292a0cb1714187a0_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7814f04947e8e98d3c4870894e320b12c557976495bdf28a89b55bf061bacf79_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:b2a263d3cbf303d0dffb2c36ee2a4187c29902ce96ca1ded6f33b2edcc68fda9_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-bundle@sha256:1c915a6f813564b9bf8062ea5c6a83097a8dd78a38fda0171fae9cc8d81299c7_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:37039569fe73c3975468ffb8640c42becdd9b5304fb5e54789bf59dc67c52c9b_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:4e2ef7cca978574e1715c24b9874c7a0a1a46a6319884a91fe54df06efe97df1_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:b2e2d245c7ba3d1528e73b59bad428f023eeb17a1983d61edcf6a22db58911cf_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:f960e1816f8babb590a55ccab9f2db1b567df749e73c70067269d32f6200bca6_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:30152d31da209c034ec39b52a32063437097eec9a4fac2eaf4a4110fea97cb70_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:38f094f62eed92d88eae0e7a9be410ef908bd0194b30240d49087ae76250e0ee_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:4d0a86e557e93eb8e7d70d538f181c2d33176b3537fb8d9e3a1e76a16ee2eed5_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:a40309477f7286b6c00381012eec8d3ececb557a4b8db38e5b4ea7f321a17c79_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-47913"
},
{
"category": "external",
"summary": "RHBZ#2414943",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2414943"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-47913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47913"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-47913",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47913"
},
{
"category": "external",
"summary": "https://github.com/advisories/GHSA-hcg3-q754-cr77",
"url": "https://github.com/advisories/GHSA-hcg3-q754-cr77"
},
{
"category": "external",
"summary": "https://go.dev/cl/700295",
"url": "https://go.dev/cl/700295"
},
{
"category": "external",
"summary": "https://go.dev/issue/75178",
"url": "https://go.dev/issue/75178"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4116",
"url": "https://pkg.go.dev/vuln/GO-2025-4116"
}
],
"release_date": "2025-11-13T21:29:39.907000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-12-10T15:51:53+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:00eb13b3cccf326292589a680a964160c58f83391d0036c4ebcb34fad32b6189_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:0ca5a583ca7ff0161ed35deeae94be78adc74100d0343b778f1edf5b77e90925_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:3facbc804376b505181c2f52f0c7a433111bcedcb5699a0fcdffd7e9a2bdfbbe_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:7a338bb18181535a2644bf70cae05042e1ef2af5a80e70a6cab6516e8f054896_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:23059"
},
{
"category": "workaround",
"details": "No mitigation is currently available that meets Red Hat Product Security\u2019s standards for usability, deployment, applicability, or stability.",
"product_ids": [
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:11091b652f65868606c3d4d3e30a04cea7396f06f119bcd0a4cf664db2aa790e_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:212ceac279067567409c47acf7792e0c4d1955395f045e3b717040321dc1b88f_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:451da4b858587adcef52b5f1c9b7c92985bd7cc7c90f651b9e38825b81b38fb0_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:c5cb9d3d0f970ad36005f2d376547e967e4a89574cca1cf8806bb92d05199d70_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:0a978bbe91e0e0b8bab6862522f8a0aa8e974b778cc36b83f0781081621c8e23_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8b3684c92affc7acadcd5dc8eb80e5727081c7ecf4cc6eeafe5ecc5ea60970bb_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8d474498354d438fc9deeceb3bc89649f35d4e382e930ee721059bfeaf0f8279_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:ad2119941c2e8db1691a9bfee085425c7203ab00c2cdf0a6441b1102109cfd21_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:cdf96fe7a1ad4c192b4313e804d40d5c656c3f0ced498bae2427e449f0b2df02_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0c7a94928e8ef89aebdd9b30a47aaf0fe4dfb3a716603362b5c7d52255c4e842_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:1f769259f2b91d47f4d4fbf92414903a62380a358737e7100a1166ccd8c89b85_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:a71b5493009863c4f1e9ae9393ff236dc262d84ee028482ee58840fbfe392c83_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bd796d2de4d02f63adc767aa22b9a388b3adea40c12b0d8f158ebffabed6fee9_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:00eb13b3cccf326292589a680a964160c58f83391d0036c4ebcb34fad32b6189_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:0ca5a583ca7ff0161ed35deeae94be78adc74100d0343b778f1edf5b77e90925_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:3facbc804376b505181c2f52f0c7a433111bcedcb5699a0fcdffd7e9a2bdfbbe_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:7a338bb18181535a2644bf70cae05042e1ef2af5a80e70a6cab6516e8f054896_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:53c387293b92691eb66ea73b1d29781cf275f01b4254c38e21620c0502987272_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:1b0a31b5f6d1e1493974efb8c7ca5112e6e4d8f0b8e1de8e55b7b8c1184b2293_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:33d0912dbad0b1702fd91abf87e38910d2b983334062044c292a0cb1714187a0_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7814f04947e8e98d3c4870894e320b12c557976495bdf28a89b55bf061bacf79_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:b2a263d3cbf303d0dffb2c36ee2a4187c29902ce96ca1ded6f33b2edcc68fda9_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-bundle@sha256:1c915a6f813564b9bf8062ea5c6a83097a8dd78a38fda0171fae9cc8d81299c7_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:37039569fe73c3975468ffb8640c42becdd9b5304fb5e54789bf59dc67c52c9b_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:4e2ef7cca978574e1715c24b9874c7a0a1a46a6319884a91fe54df06efe97df1_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:b2e2d245c7ba3d1528e73b59bad428f023eeb17a1983d61edcf6a22db58911cf_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:f960e1816f8babb590a55ccab9f2db1b567df749e73c70067269d32f6200bca6_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:30152d31da209c034ec39b52a32063437097eec9a4fac2eaf4a4110fea97cb70_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:38f094f62eed92d88eae0e7a9be410ef908bd0194b30240d49087ae76250e0ee_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:4d0a86e557e93eb8e7d70d538f181c2d33176b3537fb8d9e3a1e76a16ee2eed5_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:a40309477f7286b6c00381012eec8d3ececb557a4b8db38e5b4ea7f321a17c79_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:11091b652f65868606c3d4d3e30a04cea7396f06f119bcd0a4cf664db2aa790e_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:212ceac279067567409c47acf7792e0c4d1955395f045e3b717040321dc1b88f_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:451da4b858587adcef52b5f1c9b7c92985bd7cc7c90f651b9e38825b81b38fb0_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:c5cb9d3d0f970ad36005f2d376547e967e4a89574cca1cf8806bb92d05199d70_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:0a978bbe91e0e0b8bab6862522f8a0aa8e974b778cc36b83f0781081621c8e23_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8b3684c92affc7acadcd5dc8eb80e5727081c7ecf4cc6eeafe5ecc5ea60970bb_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8d474498354d438fc9deeceb3bc89649f35d4e382e930ee721059bfeaf0f8279_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:ad2119941c2e8db1691a9bfee085425c7203ab00c2cdf0a6441b1102109cfd21_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:cdf96fe7a1ad4c192b4313e804d40d5c656c3f0ced498bae2427e449f0b2df02_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0c7a94928e8ef89aebdd9b30a47aaf0fe4dfb3a716603362b5c7d52255c4e842_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:1f769259f2b91d47f4d4fbf92414903a62380a358737e7100a1166ccd8c89b85_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:a71b5493009863c4f1e9ae9393ff236dc262d84ee028482ee58840fbfe392c83_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bd796d2de4d02f63adc767aa22b9a388b3adea40c12b0d8f158ebffabed6fee9_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:00eb13b3cccf326292589a680a964160c58f83391d0036c4ebcb34fad32b6189_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:0ca5a583ca7ff0161ed35deeae94be78adc74100d0343b778f1edf5b77e90925_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:3facbc804376b505181c2f52f0c7a433111bcedcb5699a0fcdffd7e9a2bdfbbe_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:7a338bb18181535a2644bf70cae05042e1ef2af5a80e70a6cab6516e8f054896_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:53c387293b92691eb66ea73b1d29781cf275f01b4254c38e21620c0502987272_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:1b0a31b5f6d1e1493974efb8c7ca5112e6e4d8f0b8e1de8e55b7b8c1184b2293_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:33d0912dbad0b1702fd91abf87e38910d2b983334062044c292a0cb1714187a0_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7814f04947e8e98d3c4870894e320b12c557976495bdf28a89b55bf061bacf79_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:b2a263d3cbf303d0dffb2c36ee2a4187c29902ce96ca1ded6f33b2edcc68fda9_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-bundle@sha256:1c915a6f813564b9bf8062ea5c6a83097a8dd78a38fda0171fae9cc8d81299c7_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:37039569fe73c3975468ffb8640c42becdd9b5304fb5e54789bf59dc67c52c9b_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:4e2ef7cca978574e1715c24b9874c7a0a1a46a6319884a91fe54df06efe97df1_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:b2e2d245c7ba3d1528e73b59bad428f023eeb17a1983d61edcf6a22db58911cf_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:f960e1816f8babb590a55ccab9f2db1b567df749e73c70067269d32f6200bca6_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:30152d31da209c034ec39b52a32063437097eec9a4fac2eaf4a4110fea97cb70_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:38f094f62eed92d88eae0e7a9be410ef908bd0194b30240d49087ae76250e0ee_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:4d0a86e557e93eb8e7d70d538f181c2d33176b3537fb8d9e3a1e76a16ee2eed5_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:a40309477f7286b6c00381012eec8d3ececb557a4b8db38e5b4ea7f321a17c79_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang.org/x/crypto/ssh/agent: golang.org/x/crypto/ssh/agent: SSH client panic due to unexpected SSH_AGENT_SUCCESS"
},
{
"cve": "CVE-2025-59420",
"cwe": {
"id": "CWE-440",
"name": "Expected Behavior Violation"
},
"discovery_date": "2025-09-22T18:01:35.379361+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:11091b652f65868606c3d4d3e30a04cea7396f06f119bcd0a4cf664db2aa790e_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:212ceac279067567409c47acf7792e0c4d1955395f045e3b717040321dc1b88f_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:451da4b858587adcef52b5f1c9b7c92985bd7cc7c90f651b9e38825b81b38fb0_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:c5cb9d3d0f970ad36005f2d376547e967e4a89574cca1cf8806bb92d05199d70_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:0a978bbe91e0e0b8bab6862522f8a0aa8e974b778cc36b83f0781081621c8e23_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8b3684c92affc7acadcd5dc8eb80e5727081c7ecf4cc6eeafe5ecc5ea60970bb_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8d474498354d438fc9deeceb3bc89649f35d4e382e930ee721059bfeaf0f8279_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:ad2119941c2e8db1691a9bfee085425c7203ab00c2cdf0a6441b1102109cfd21_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:cdf96fe7a1ad4c192b4313e804d40d5c656c3f0ced498bae2427e449f0b2df02_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0c7a94928e8ef89aebdd9b30a47aaf0fe4dfb3a716603362b5c7d52255c4e842_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:1f769259f2b91d47f4d4fbf92414903a62380a358737e7100a1166ccd8c89b85_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:a71b5493009863c4f1e9ae9393ff236dc262d84ee028482ee58840fbfe392c83_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bd796d2de4d02f63adc767aa22b9a388b3adea40c12b0d8f158ebffabed6fee9_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:00eb13b3cccf326292589a680a964160c58f83391d0036c4ebcb34fad32b6189_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:0ca5a583ca7ff0161ed35deeae94be78adc74100d0343b778f1edf5b77e90925_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:3facbc804376b505181c2f52f0c7a433111bcedcb5699a0fcdffd7e9a2bdfbbe_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:7a338bb18181535a2644bf70cae05042e1ef2af5a80e70a6cab6516e8f054896_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:53c387293b92691eb66ea73b1d29781cf275f01b4254c38e21620c0502987272_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:1b0a31b5f6d1e1493974efb8c7ca5112e6e4d8f0b8e1de8e55b7b8c1184b2293_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:33d0912dbad0b1702fd91abf87e38910d2b983334062044c292a0cb1714187a0_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7814f04947e8e98d3c4870894e320b12c557976495bdf28a89b55bf061bacf79_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:b2a263d3cbf303d0dffb2c36ee2a4187c29902ce96ca1ded6f33b2edcc68fda9_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-bundle@sha256:1c915a6f813564b9bf8062ea5c6a83097a8dd78a38fda0171fae9cc8d81299c7_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:37039569fe73c3975468ffb8640c42becdd9b5304fb5e54789bf59dc67c52c9b_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:4e2ef7cca978574e1715c24b9874c7a0a1a46a6319884a91fe54df06efe97df1_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:b2e2d245c7ba3d1528e73b59bad428f023eeb17a1983d61edcf6a22db58911cf_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:f960e1816f8babb590a55ccab9f2db1b567df749e73c70067269d32f6200bca6_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2397460"
}
],
"notes": [
{
"category": "description",
"text": "Authlib\u2019s JWS verification accepts tokens that declare unknown critical header parameters (crit), violating RFC 7515 \u201cmust\u2011understand\u201d semantics. An attacker can craft a signed token with a critical header (for example, bork or cnf) that strict verifiers reject but Authlib accepts. In mixed\u2011language fleets, this enables split\u2011brain verification and can lead to policy bypass, replay, or privilege escalation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "authlib: Authlib RFC violation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:30152d31da209c034ec39b52a32063437097eec9a4fac2eaf4a4110fea97cb70_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:38f094f62eed92d88eae0e7a9be410ef908bd0194b30240d49087ae76250e0ee_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:4d0a86e557e93eb8e7d70d538f181c2d33176b3537fb8d9e3a1e76a16ee2eed5_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:a40309477f7286b6c00381012eec8d3ececb557a4b8db38e5b4ea7f321a17c79_amd64"
],
"known_not_affected": [
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:11091b652f65868606c3d4d3e30a04cea7396f06f119bcd0a4cf664db2aa790e_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:212ceac279067567409c47acf7792e0c4d1955395f045e3b717040321dc1b88f_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:451da4b858587adcef52b5f1c9b7c92985bd7cc7c90f651b9e38825b81b38fb0_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:c5cb9d3d0f970ad36005f2d376547e967e4a89574cca1cf8806bb92d05199d70_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:0a978bbe91e0e0b8bab6862522f8a0aa8e974b778cc36b83f0781081621c8e23_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8b3684c92affc7acadcd5dc8eb80e5727081c7ecf4cc6eeafe5ecc5ea60970bb_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8d474498354d438fc9deeceb3bc89649f35d4e382e930ee721059bfeaf0f8279_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:ad2119941c2e8db1691a9bfee085425c7203ab00c2cdf0a6441b1102109cfd21_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:cdf96fe7a1ad4c192b4313e804d40d5c656c3f0ced498bae2427e449f0b2df02_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0c7a94928e8ef89aebdd9b30a47aaf0fe4dfb3a716603362b5c7d52255c4e842_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:1f769259f2b91d47f4d4fbf92414903a62380a358737e7100a1166ccd8c89b85_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:a71b5493009863c4f1e9ae9393ff236dc262d84ee028482ee58840fbfe392c83_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bd796d2de4d02f63adc767aa22b9a388b3adea40c12b0d8f158ebffabed6fee9_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:00eb13b3cccf326292589a680a964160c58f83391d0036c4ebcb34fad32b6189_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:0ca5a583ca7ff0161ed35deeae94be78adc74100d0343b778f1edf5b77e90925_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:3facbc804376b505181c2f52f0c7a433111bcedcb5699a0fcdffd7e9a2bdfbbe_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:7a338bb18181535a2644bf70cae05042e1ef2af5a80e70a6cab6516e8f054896_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:53c387293b92691eb66ea73b1d29781cf275f01b4254c38e21620c0502987272_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:1b0a31b5f6d1e1493974efb8c7ca5112e6e4d8f0b8e1de8e55b7b8c1184b2293_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:33d0912dbad0b1702fd91abf87e38910d2b983334062044c292a0cb1714187a0_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7814f04947e8e98d3c4870894e320b12c557976495bdf28a89b55bf061bacf79_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:b2a263d3cbf303d0dffb2c36ee2a4187c29902ce96ca1ded6f33b2edcc68fda9_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-bundle@sha256:1c915a6f813564b9bf8062ea5c6a83097a8dd78a38fda0171fae9cc8d81299c7_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:37039569fe73c3975468ffb8640c42becdd9b5304fb5e54789bf59dc67c52c9b_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:4e2ef7cca978574e1715c24b9874c7a0a1a46a6319884a91fe54df06efe97df1_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:b2e2d245c7ba3d1528e73b59bad428f023eeb17a1983d61edcf6a22db58911cf_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:f960e1816f8babb590a55ccab9f2db1b567df749e73c70067269d32f6200bca6_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-59420"
},
{
"category": "external",
"summary": "RHBZ#2397460",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2397460"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-59420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59420"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-59420",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-59420"
},
{
"category": "external",
"summary": "https://github.com/authlib/authlib/commit/6b1813e4392eb7c168c276099ff7783b176479df",
"url": "https://github.com/authlib/authlib/commit/6b1813e4392eb7c168c276099ff7783b176479df"
},
{
"category": "external",
"summary": "https://github.com/authlib/authlib/security/advisories/GHSA-9ggr-2464-2j32",
"url": "https://github.com/authlib/authlib/security/advisories/GHSA-9ggr-2464-2j32"
}
],
"release_date": "2025-09-22T17:28:53.869000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-12-10T15:51:53+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:30152d31da209c034ec39b52a32063437097eec9a4fac2eaf4a4110fea97cb70_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:38f094f62eed92d88eae0e7a9be410ef908bd0194b30240d49087ae76250e0ee_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:4d0a86e557e93eb8e7d70d538f181c2d33176b3537fb8d9e3a1e76a16ee2eed5_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:a40309477f7286b6c00381012eec8d3ececb557a4b8db38e5b4ea7f321a17c79_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:23059"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:11091b652f65868606c3d4d3e30a04cea7396f06f119bcd0a4cf664db2aa790e_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:212ceac279067567409c47acf7792e0c4d1955395f045e3b717040321dc1b88f_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:451da4b858587adcef52b5f1c9b7c92985bd7cc7c90f651b9e38825b81b38fb0_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:c5cb9d3d0f970ad36005f2d376547e967e4a89574cca1cf8806bb92d05199d70_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:0a978bbe91e0e0b8bab6862522f8a0aa8e974b778cc36b83f0781081621c8e23_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8b3684c92affc7acadcd5dc8eb80e5727081c7ecf4cc6eeafe5ecc5ea60970bb_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8d474498354d438fc9deeceb3bc89649f35d4e382e930ee721059bfeaf0f8279_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:ad2119941c2e8db1691a9bfee085425c7203ab00c2cdf0a6441b1102109cfd21_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:cdf96fe7a1ad4c192b4313e804d40d5c656c3f0ced498bae2427e449f0b2df02_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0c7a94928e8ef89aebdd9b30a47aaf0fe4dfb3a716603362b5c7d52255c4e842_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:1f769259f2b91d47f4d4fbf92414903a62380a358737e7100a1166ccd8c89b85_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:a71b5493009863c4f1e9ae9393ff236dc262d84ee028482ee58840fbfe392c83_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bd796d2de4d02f63adc767aa22b9a388b3adea40c12b0d8f158ebffabed6fee9_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:00eb13b3cccf326292589a680a964160c58f83391d0036c4ebcb34fad32b6189_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:0ca5a583ca7ff0161ed35deeae94be78adc74100d0343b778f1edf5b77e90925_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:3facbc804376b505181c2f52f0c7a433111bcedcb5699a0fcdffd7e9a2bdfbbe_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:7a338bb18181535a2644bf70cae05042e1ef2af5a80e70a6cab6516e8f054896_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:53c387293b92691eb66ea73b1d29781cf275f01b4254c38e21620c0502987272_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:1b0a31b5f6d1e1493974efb8c7ca5112e6e4d8f0b8e1de8e55b7b8c1184b2293_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:33d0912dbad0b1702fd91abf87e38910d2b983334062044c292a0cb1714187a0_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7814f04947e8e98d3c4870894e320b12c557976495bdf28a89b55bf061bacf79_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:b2a263d3cbf303d0dffb2c36ee2a4187c29902ce96ca1ded6f33b2edcc68fda9_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-bundle@sha256:1c915a6f813564b9bf8062ea5c6a83097a8dd78a38fda0171fae9cc8d81299c7_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:37039569fe73c3975468ffb8640c42becdd9b5304fb5e54789bf59dc67c52c9b_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:4e2ef7cca978574e1715c24b9874c7a0a1a46a6319884a91fe54df06efe97df1_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:b2e2d245c7ba3d1528e73b59bad428f023eeb17a1983d61edcf6a22db58911cf_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:f960e1816f8babb590a55ccab9f2db1b567df749e73c70067269d32f6200bca6_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:30152d31da209c034ec39b52a32063437097eec9a4fac2eaf4a4110fea97cb70_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:38f094f62eed92d88eae0e7a9be410ef908bd0194b30240d49087ae76250e0ee_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:4d0a86e557e93eb8e7d70d538f181c2d33176b3537fb8d9e3a1e76a16ee2eed5_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:a40309477f7286b6c00381012eec8d3ececb557a4b8db38e5b4ea7f321a17c79_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:11091b652f65868606c3d4d3e30a04cea7396f06f119bcd0a4cf664db2aa790e_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:212ceac279067567409c47acf7792e0c4d1955395f045e3b717040321dc1b88f_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:451da4b858587adcef52b5f1c9b7c92985bd7cc7c90f651b9e38825b81b38fb0_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:c5cb9d3d0f970ad36005f2d376547e967e4a89574cca1cf8806bb92d05199d70_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:0a978bbe91e0e0b8bab6862522f8a0aa8e974b778cc36b83f0781081621c8e23_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8b3684c92affc7acadcd5dc8eb80e5727081c7ecf4cc6eeafe5ecc5ea60970bb_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8d474498354d438fc9deeceb3bc89649f35d4e382e930ee721059bfeaf0f8279_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:ad2119941c2e8db1691a9bfee085425c7203ab00c2cdf0a6441b1102109cfd21_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:cdf96fe7a1ad4c192b4313e804d40d5c656c3f0ced498bae2427e449f0b2df02_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0c7a94928e8ef89aebdd9b30a47aaf0fe4dfb3a716603362b5c7d52255c4e842_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:1f769259f2b91d47f4d4fbf92414903a62380a358737e7100a1166ccd8c89b85_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:a71b5493009863c4f1e9ae9393ff236dc262d84ee028482ee58840fbfe392c83_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bd796d2de4d02f63adc767aa22b9a388b3adea40c12b0d8f158ebffabed6fee9_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:00eb13b3cccf326292589a680a964160c58f83391d0036c4ebcb34fad32b6189_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:0ca5a583ca7ff0161ed35deeae94be78adc74100d0343b778f1edf5b77e90925_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:3facbc804376b505181c2f52f0c7a433111bcedcb5699a0fcdffd7e9a2bdfbbe_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:7a338bb18181535a2644bf70cae05042e1ef2af5a80e70a6cab6516e8f054896_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:53c387293b92691eb66ea73b1d29781cf275f01b4254c38e21620c0502987272_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:1b0a31b5f6d1e1493974efb8c7ca5112e6e4d8f0b8e1de8e55b7b8c1184b2293_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:33d0912dbad0b1702fd91abf87e38910d2b983334062044c292a0cb1714187a0_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7814f04947e8e98d3c4870894e320b12c557976495bdf28a89b55bf061bacf79_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:b2a263d3cbf303d0dffb2c36ee2a4187c29902ce96ca1ded6f33b2edcc68fda9_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-bundle@sha256:1c915a6f813564b9bf8062ea5c6a83097a8dd78a38fda0171fae9cc8d81299c7_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:37039569fe73c3975468ffb8640c42becdd9b5304fb5e54789bf59dc67c52c9b_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:4e2ef7cca978574e1715c24b9874c7a0a1a46a6319884a91fe54df06efe97df1_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:b2e2d245c7ba3d1528e73b59bad428f023eeb17a1983d61edcf6a22db58911cf_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:f960e1816f8babb590a55ccab9f2db1b567df749e73c70067269d32f6200bca6_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:30152d31da209c034ec39b52a32063437097eec9a4fac2eaf4a4110fea97cb70_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:38f094f62eed92d88eae0e7a9be410ef908bd0194b30240d49087ae76250e0ee_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:4d0a86e557e93eb8e7d70d538f181c2d33176b3537fb8d9e3a1e76a16ee2eed5_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:a40309477f7286b6c00381012eec8d3ececb557a4b8db38e5b4ea7f321a17c79_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "authlib: Authlib RFC violation"
},
{
"cve": "CVE-2025-61920",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2025-10-10T20:01:12.833962+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:11091b652f65868606c3d4d3e30a04cea7396f06f119bcd0a4cf664db2aa790e_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:212ceac279067567409c47acf7792e0c4d1955395f045e3b717040321dc1b88f_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:451da4b858587adcef52b5f1c9b7c92985bd7cc7c90f651b9e38825b81b38fb0_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:c5cb9d3d0f970ad36005f2d376547e967e4a89574cca1cf8806bb92d05199d70_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:0a978bbe91e0e0b8bab6862522f8a0aa8e974b778cc36b83f0781081621c8e23_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8b3684c92affc7acadcd5dc8eb80e5727081c7ecf4cc6eeafe5ecc5ea60970bb_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8d474498354d438fc9deeceb3bc89649f35d4e382e930ee721059bfeaf0f8279_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:ad2119941c2e8db1691a9bfee085425c7203ab00c2cdf0a6441b1102109cfd21_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:cdf96fe7a1ad4c192b4313e804d40d5c656c3f0ced498bae2427e449f0b2df02_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0c7a94928e8ef89aebdd9b30a47aaf0fe4dfb3a716603362b5c7d52255c4e842_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:1f769259f2b91d47f4d4fbf92414903a62380a358737e7100a1166ccd8c89b85_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:a71b5493009863c4f1e9ae9393ff236dc262d84ee028482ee58840fbfe392c83_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bd796d2de4d02f63adc767aa22b9a388b3adea40c12b0d8f158ebffabed6fee9_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:00eb13b3cccf326292589a680a964160c58f83391d0036c4ebcb34fad32b6189_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:0ca5a583ca7ff0161ed35deeae94be78adc74100d0343b778f1edf5b77e90925_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:3facbc804376b505181c2f52f0c7a433111bcedcb5699a0fcdffd7e9a2bdfbbe_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:7a338bb18181535a2644bf70cae05042e1ef2af5a80e70a6cab6516e8f054896_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:53c387293b92691eb66ea73b1d29781cf275f01b4254c38e21620c0502987272_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:1b0a31b5f6d1e1493974efb8c7ca5112e6e4d8f0b8e1de8e55b7b8c1184b2293_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:33d0912dbad0b1702fd91abf87e38910d2b983334062044c292a0cb1714187a0_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7814f04947e8e98d3c4870894e320b12c557976495bdf28a89b55bf061bacf79_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:b2a263d3cbf303d0dffb2c36ee2a4187c29902ce96ca1ded6f33b2edcc68fda9_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-bundle@sha256:1c915a6f813564b9bf8062ea5c6a83097a8dd78a38fda0171fae9cc8d81299c7_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:37039569fe73c3975468ffb8640c42becdd9b5304fb5e54789bf59dc67c52c9b_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:4e2ef7cca978574e1715c24b9874c7a0a1a46a6319884a91fe54df06efe97df1_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:b2e2d245c7ba3d1528e73b59bad428f023eeb17a1983d61edcf6a22db58911cf_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:f960e1816f8babb590a55ccab9f2db1b567df749e73c70067269d32f6200bca6_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2403179"
}
],
"notes": [
{
"category": "description",
"text": "A denial of service flaw has been discovered in the python Authlib package. Authlib\u2019s JOSE implementation accepts unbounded JWS/JWT header and signature segments. A remote attacker can craft a token whose base64url\u2011encoded header or signature spans hundreds of megabytes. During verification, Authlib decodes and parses the full input before it is rejected, driving CPU and memory consumption to hostile levels and enabling denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "authlib: Authlib Denial of Service",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:30152d31da209c034ec39b52a32063437097eec9a4fac2eaf4a4110fea97cb70_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:38f094f62eed92d88eae0e7a9be410ef908bd0194b30240d49087ae76250e0ee_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:4d0a86e557e93eb8e7d70d538f181c2d33176b3537fb8d9e3a1e76a16ee2eed5_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:a40309477f7286b6c00381012eec8d3ececb557a4b8db38e5b4ea7f321a17c79_amd64"
],
"known_not_affected": [
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:11091b652f65868606c3d4d3e30a04cea7396f06f119bcd0a4cf664db2aa790e_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:212ceac279067567409c47acf7792e0c4d1955395f045e3b717040321dc1b88f_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:451da4b858587adcef52b5f1c9b7c92985bd7cc7c90f651b9e38825b81b38fb0_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:c5cb9d3d0f970ad36005f2d376547e967e4a89574cca1cf8806bb92d05199d70_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:0a978bbe91e0e0b8bab6862522f8a0aa8e974b778cc36b83f0781081621c8e23_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8b3684c92affc7acadcd5dc8eb80e5727081c7ecf4cc6eeafe5ecc5ea60970bb_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8d474498354d438fc9deeceb3bc89649f35d4e382e930ee721059bfeaf0f8279_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:ad2119941c2e8db1691a9bfee085425c7203ab00c2cdf0a6441b1102109cfd21_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:cdf96fe7a1ad4c192b4313e804d40d5c656c3f0ced498bae2427e449f0b2df02_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0c7a94928e8ef89aebdd9b30a47aaf0fe4dfb3a716603362b5c7d52255c4e842_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:1f769259f2b91d47f4d4fbf92414903a62380a358737e7100a1166ccd8c89b85_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:a71b5493009863c4f1e9ae9393ff236dc262d84ee028482ee58840fbfe392c83_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bd796d2de4d02f63adc767aa22b9a388b3adea40c12b0d8f158ebffabed6fee9_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:00eb13b3cccf326292589a680a964160c58f83391d0036c4ebcb34fad32b6189_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:0ca5a583ca7ff0161ed35deeae94be78adc74100d0343b778f1edf5b77e90925_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:3facbc804376b505181c2f52f0c7a433111bcedcb5699a0fcdffd7e9a2bdfbbe_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:7a338bb18181535a2644bf70cae05042e1ef2af5a80e70a6cab6516e8f054896_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:53c387293b92691eb66ea73b1d29781cf275f01b4254c38e21620c0502987272_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:1b0a31b5f6d1e1493974efb8c7ca5112e6e4d8f0b8e1de8e55b7b8c1184b2293_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:33d0912dbad0b1702fd91abf87e38910d2b983334062044c292a0cb1714187a0_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7814f04947e8e98d3c4870894e320b12c557976495bdf28a89b55bf061bacf79_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:b2a263d3cbf303d0dffb2c36ee2a4187c29902ce96ca1ded6f33b2edcc68fda9_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-bundle@sha256:1c915a6f813564b9bf8062ea5c6a83097a8dd78a38fda0171fae9cc8d81299c7_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:37039569fe73c3975468ffb8640c42becdd9b5304fb5e54789bf59dc67c52c9b_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:4e2ef7cca978574e1715c24b9874c7a0a1a46a6319884a91fe54df06efe97df1_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:b2e2d245c7ba3d1528e73b59bad428f023eeb17a1983d61edcf6a22db58911cf_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:f960e1816f8babb590a55ccab9f2db1b567df749e73c70067269d32f6200bca6_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61920"
},
{
"category": "external",
"summary": "RHBZ#2403179",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2403179"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61920",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61920"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61920",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61920"
},
{
"category": "external",
"summary": "https://github.com/authlib/authlib/commit/867e3f87b072347a1ae9cf6983cc8bbf88447e5e",
"url": "https://github.com/authlib/authlib/commit/867e3f87b072347a1ae9cf6983cc8bbf88447e5e"
},
{
"category": "external",
"summary": "https://github.com/authlib/authlib/security/advisories/GHSA-pq5p-34cr-23v9",
"url": "https://github.com/authlib/authlib/security/advisories/GHSA-pq5p-34cr-23v9"
}
],
"release_date": "2025-10-10T19:25:07.679000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-12-10T15:51:53+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:30152d31da209c034ec39b52a32063437097eec9a4fac2eaf4a4110fea97cb70_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:38f094f62eed92d88eae0e7a9be410ef908bd0194b30240d49087ae76250e0ee_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:4d0a86e557e93eb8e7d70d538f181c2d33176b3537fb8d9e3a1e76a16ee2eed5_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:a40309477f7286b6c00381012eec8d3ececb557a4b8db38e5b4ea7f321a17c79_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:23059"
},
{
"category": "workaround",
"details": "Users unable to upgrade may manually enforce input size limits before handing tokens to Authlib and/or use application-level throttling to reduce amplification risk.",
"product_ids": [
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:11091b652f65868606c3d4d3e30a04cea7396f06f119bcd0a4cf664db2aa790e_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:212ceac279067567409c47acf7792e0c4d1955395f045e3b717040321dc1b88f_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:451da4b858587adcef52b5f1c9b7c92985bd7cc7c90f651b9e38825b81b38fb0_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:c5cb9d3d0f970ad36005f2d376547e967e4a89574cca1cf8806bb92d05199d70_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:0a978bbe91e0e0b8bab6862522f8a0aa8e974b778cc36b83f0781081621c8e23_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8b3684c92affc7acadcd5dc8eb80e5727081c7ecf4cc6eeafe5ecc5ea60970bb_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8d474498354d438fc9deeceb3bc89649f35d4e382e930ee721059bfeaf0f8279_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:ad2119941c2e8db1691a9bfee085425c7203ab00c2cdf0a6441b1102109cfd21_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:cdf96fe7a1ad4c192b4313e804d40d5c656c3f0ced498bae2427e449f0b2df02_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0c7a94928e8ef89aebdd9b30a47aaf0fe4dfb3a716603362b5c7d52255c4e842_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:1f769259f2b91d47f4d4fbf92414903a62380a358737e7100a1166ccd8c89b85_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:a71b5493009863c4f1e9ae9393ff236dc262d84ee028482ee58840fbfe392c83_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bd796d2de4d02f63adc767aa22b9a388b3adea40c12b0d8f158ebffabed6fee9_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:00eb13b3cccf326292589a680a964160c58f83391d0036c4ebcb34fad32b6189_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:0ca5a583ca7ff0161ed35deeae94be78adc74100d0343b778f1edf5b77e90925_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:3facbc804376b505181c2f52f0c7a433111bcedcb5699a0fcdffd7e9a2bdfbbe_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:7a338bb18181535a2644bf70cae05042e1ef2af5a80e70a6cab6516e8f054896_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:53c387293b92691eb66ea73b1d29781cf275f01b4254c38e21620c0502987272_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:1b0a31b5f6d1e1493974efb8c7ca5112e6e4d8f0b8e1de8e55b7b8c1184b2293_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:33d0912dbad0b1702fd91abf87e38910d2b983334062044c292a0cb1714187a0_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7814f04947e8e98d3c4870894e320b12c557976495bdf28a89b55bf061bacf79_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:b2a263d3cbf303d0dffb2c36ee2a4187c29902ce96ca1ded6f33b2edcc68fda9_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-bundle@sha256:1c915a6f813564b9bf8062ea5c6a83097a8dd78a38fda0171fae9cc8d81299c7_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:37039569fe73c3975468ffb8640c42becdd9b5304fb5e54789bf59dc67c52c9b_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:4e2ef7cca978574e1715c24b9874c7a0a1a46a6319884a91fe54df06efe97df1_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:b2e2d245c7ba3d1528e73b59bad428f023eeb17a1983d61edcf6a22db58911cf_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:f960e1816f8babb590a55ccab9f2db1b567df749e73c70067269d32f6200bca6_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:30152d31da209c034ec39b52a32063437097eec9a4fac2eaf4a4110fea97cb70_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:38f094f62eed92d88eae0e7a9be410ef908bd0194b30240d49087ae76250e0ee_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:4d0a86e557e93eb8e7d70d538f181c2d33176b3537fb8d9e3a1e76a16ee2eed5_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:a40309477f7286b6c00381012eec8d3ececb557a4b8db38e5b4ea7f321a17c79_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:11091b652f65868606c3d4d3e30a04cea7396f06f119bcd0a4cf664db2aa790e_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:212ceac279067567409c47acf7792e0c4d1955395f045e3b717040321dc1b88f_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:451da4b858587adcef52b5f1c9b7c92985bd7cc7c90f651b9e38825b81b38fb0_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:c5cb9d3d0f970ad36005f2d376547e967e4a89574cca1cf8806bb92d05199d70_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:0a978bbe91e0e0b8bab6862522f8a0aa8e974b778cc36b83f0781081621c8e23_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8b3684c92affc7acadcd5dc8eb80e5727081c7ecf4cc6eeafe5ecc5ea60970bb_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8d474498354d438fc9deeceb3bc89649f35d4e382e930ee721059bfeaf0f8279_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:ad2119941c2e8db1691a9bfee085425c7203ab00c2cdf0a6441b1102109cfd21_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:cdf96fe7a1ad4c192b4313e804d40d5c656c3f0ced498bae2427e449f0b2df02_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0c7a94928e8ef89aebdd9b30a47aaf0fe4dfb3a716603362b5c7d52255c4e842_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:1f769259f2b91d47f4d4fbf92414903a62380a358737e7100a1166ccd8c89b85_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:a71b5493009863c4f1e9ae9393ff236dc262d84ee028482ee58840fbfe392c83_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bd796d2de4d02f63adc767aa22b9a388b3adea40c12b0d8f158ebffabed6fee9_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:00eb13b3cccf326292589a680a964160c58f83391d0036c4ebcb34fad32b6189_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:0ca5a583ca7ff0161ed35deeae94be78adc74100d0343b778f1edf5b77e90925_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:3facbc804376b505181c2f52f0c7a433111bcedcb5699a0fcdffd7e9a2bdfbbe_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:7a338bb18181535a2644bf70cae05042e1ef2af5a80e70a6cab6516e8f054896_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:53c387293b92691eb66ea73b1d29781cf275f01b4254c38e21620c0502987272_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:1b0a31b5f6d1e1493974efb8c7ca5112e6e4d8f0b8e1de8e55b7b8c1184b2293_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:33d0912dbad0b1702fd91abf87e38910d2b983334062044c292a0cb1714187a0_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7814f04947e8e98d3c4870894e320b12c557976495bdf28a89b55bf061bacf79_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:b2a263d3cbf303d0dffb2c36ee2a4187c29902ce96ca1ded6f33b2edcc68fda9_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-bundle@sha256:1c915a6f813564b9bf8062ea5c6a83097a8dd78a38fda0171fae9cc8d81299c7_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:37039569fe73c3975468ffb8640c42becdd9b5304fb5e54789bf59dc67c52c9b_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:4e2ef7cca978574e1715c24b9874c7a0a1a46a6319884a91fe54df06efe97df1_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:b2e2d245c7ba3d1528e73b59bad428f023eeb17a1983d61edcf6a22db58911cf_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:f960e1816f8babb590a55ccab9f2db1b567df749e73c70067269d32f6200bca6_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:30152d31da209c034ec39b52a32063437097eec9a4fac2eaf4a4110fea97cb70_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:38f094f62eed92d88eae0e7a9be410ef908bd0194b30240d49087ae76250e0ee_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:4d0a86e557e93eb8e7d70d538f181c2d33176b3537fb8d9e3a1e76a16ee2eed5_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:a40309477f7286b6c00381012eec8d3ececb557a4b8db38e5b4ea7f321a17c79_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "authlib: Authlib Denial of Service"
}
]
}
RHSA-2025:22182
Vulnerability from csaf_redhat - Published: 2025-11-26 14:52 - Updated: 2026-03-16 12:13Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat Quay 3.10.16 is now available with bug fixes.",
"title": "Topic"
},
{
"category": "general",
"text": "Quay 3.10.16",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:22182",
"url": "https://access.redhat.com/errata/RHSA-2025:22182"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2024-34156",
"url": "https://access.redhat.com/security/cve/CVE-2024-34156"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2024-45337",
"url": "https://access.redhat.com/security/cve/CVE-2024-45337"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2024-45338",
"url": "https://access.redhat.com/security/cve/CVE-2024-45338"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-59420",
"url": "https://access.redhat.com/security/cve/CVE-2025-59420"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61920",
"url": "https://access.redhat.com/security/cve/CVE-2025-61920"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_22182.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Quay 3.10.16",
"tracking": {
"current_release_date": "2026-03-16T12:13:38+00:00",
"generator": {
"date": "2026-03-16T12:13:38+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.3"
}
},
"id": "RHSA-2025:22182",
"initial_release_date": "2025-11-26T14:52:57+00:00",
"revision_history": [
{
"date": "2025-11-26T14:52:57+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-11-26T14:53:02+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-16T12:13:38+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Quay 3.1",
"product": {
"name": "Red Hat Quay 3.1",
"product_id": "Red Hat Quay 3.1",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:quay:3.10::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat Quay"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:64bad8b3369eeac99384b41984e32c85e8fdee2ae32282ca2d8e4df8b9d36df5_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:64bad8b3369eeac99384b41984e32c85e8fdee2ae32282ca2d8e4df8b9d36df5_amd64",
"product_id": "registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:64bad8b3369eeac99384b41984e32c85e8fdee2ae32282ca2d8e4df8b9d36df5_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-container-security-operator-bundle@sha256%3A64bad8b3369eeac99384b41984e32c85e8fdee2ae32282ca2d8e4df8b9d36df5?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=3.10.17-1764168428"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:d86d94c67d42f5ca58f0ea102f74499cbbd0abd0f0d4bab039557981c8c18363_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:d86d94c67d42f5ca58f0ea102f74499cbbd0abd0f0d4bab039557981c8c18363_amd64",
"product_id": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:d86d94c67d42f5ca58f0ea102f74499cbbd0abd0f0d4bab039557981c8c18363_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-container-security-operator-rhel8@sha256%3Ad86d94c67d42f5ca58f0ea102f74499cbbd0abd0f0d4bab039557981c8c18363?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=3.10.17-1764168428"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:8b475114a5f77f7c041509a30246769a5f9064510724c8fc99ac29164dc3a0bb_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:8b475114a5f77f7c041509a30246769a5f9064510724c8fc99ac29164dc3a0bb_amd64",
"product_id": "registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:8b475114a5f77f7c041509a30246769a5f9064510724c8fc99ac29164dc3a0bb_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-bridge-operator-bundle@sha256%3A8b475114a5f77f7c041509a30246769a5f9064510724c8fc99ac29164dc3a0bb?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=3.10.17-1764168428"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa126c3f4865a2a62cba2734110418c865aa2d32f38147c056732e53fc593715_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa126c3f4865a2a62cba2734110418c865aa2d32f38147c056732e53fc593715_amd64",
"product_id": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa126c3f4865a2a62cba2734110418c865aa2d32f38147c056732e53fc593715_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-bridge-operator-rhel8@sha256%3Aaa126c3f4865a2a62cba2734110418c865aa2d32f38147c056732e53fc593715?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=3.10.17-1764168428"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:69a3b67246d2fe32b1a1a6d726086ebd5a5f37c1ccc3c0e0021562d83caea21a_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:69a3b67246d2fe32b1a1a6d726086ebd5a5f37c1ccc3c0e0021562d83caea21a_amd64",
"product_id": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:69a3b67246d2fe32b1a1a6d726086ebd5a5f37c1ccc3c0e0021562d83caea21a_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-builder-qemu-rhcos-rhel8@sha256%3A69a3b67246d2fe32b1a1a6d726086ebd5a5f37c1ccc3c0e0021562d83caea21a?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=3.14-1764168428"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:d007cac747d974c476392a703abe053dcee0603dfc0836d180175a1e2180c02b_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:d007cac747d974c476392a703abe053dcee0603dfc0836d180175a1e2180c02b_amd64",
"product_id": "registry.redhat.io/quay/quay-builder-rhel8@sha256:d007cac747d974c476392a703abe053dcee0603dfc0836d180175a1e2180c02b_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-builder-rhel8@sha256%3Ad007cac747d974c476392a703abe053dcee0603dfc0836d180175a1e2180c02b?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=8.10-1764168428"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/clair-rhel8@sha256:4d10cbc5518e4e6d5d2a8fc6a15afe3526865df26eaa95e265a3ece624b31e90_amd64",
"product": {
"name": "registry.redhat.io/quay/clair-rhel8@sha256:4d10cbc5518e4e6d5d2a8fc6a15afe3526865df26eaa95e265a3ece624b31e90_amd64",
"product_id": "registry.redhat.io/quay/clair-rhel8@sha256:4d10cbc5518e4e6d5d2a8fc6a15afe3526865df26eaa95e265a3ece624b31e90_amd64",
"product_identification_helper": {
"purl": "pkg:oci/clair-rhel8@sha256%3A4d10cbc5518e4e6d5d2a8fc6a15afe3526865df26eaa95e265a3ece624b31e90?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=v3.10.16-1764168428"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-operator-bundle@sha256:76db6178b69a489a215a5aeb295530fe6dd35210d353103139b4c5a4bfc05565_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-operator-bundle@sha256:76db6178b69a489a215a5aeb295530fe6dd35210d353103139b4c5a4bfc05565_amd64",
"product_id": "registry.redhat.io/quay/quay-operator-bundle@sha256:76db6178b69a489a215a5aeb295530fe6dd35210d353103139b4c5a4bfc05565_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-operator-bundle@sha256%3A76db6178b69a489a215a5aeb295530fe6dd35210d353103139b4c5a4bfc05565?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=3.10.17-1764168428"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:073d670f841132b02663a58c8eca5f6dce09f3233d8d3a6d2d55de2e78374b6c_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:073d670f841132b02663a58c8eca5f6dce09f3233d8d3a6d2d55de2e78374b6c_amd64",
"product_id": "registry.redhat.io/quay/quay-operator-rhel8@sha256:073d670f841132b02663a58c8eca5f6dce09f3233d8d3a6d2d55de2e78374b6c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-operator-rhel8@sha256%3A073d670f841132b02663a58c8eca5f6dce09f3233d8d3a6d2d55de2e78374b6c?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=3.10.17-1764168428"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-rhel8@sha256:cb10c70bfb9d8dc3f7bc75506901cd84af0cd11e21883f78d651838eaa83c16c_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-rhel8@sha256:cb10c70bfb9d8dc3f7bc75506901cd84af0cd11e21883f78d651838eaa83c16c_amd64",
"product_id": "registry.redhat.io/quay/quay-rhel8@sha256:cb10c70bfb9d8dc3f7bc75506901cd84af0cd11e21883f78d651838eaa83c16c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-rhel8@sha256%3Acb10c70bfb9d8dc3f7bc75506901cd84af0cd11e21883f78d651838eaa83c16c?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=3.10.17-1764168428"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:c0fdf2c449051a44ffbdd7794c4fd6c3d6892ad7d1e30ec9e72c97ae34053127_arm64",
"product": {
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:c0fdf2c449051a44ffbdd7794c4fd6c3d6892ad7d1e30ec9e72c97ae34053127_arm64",
"product_id": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:c0fdf2c449051a44ffbdd7794c4fd6c3d6892ad7d1e30ec9e72c97ae34053127_arm64",
"product_identification_helper": {
"purl": "pkg:oci/quay-container-security-operator-rhel8@sha256%3Ac0fdf2c449051a44ffbdd7794c4fd6c3d6892ad7d1e30ec9e72c97ae34053127?arch=arm64\u0026repository_url=registry.redhat.io/quay\u0026tag=3.10.17-1764168428"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f55014b7e95512e2dcad9ebde4d36a39e136093ed22fc3436e66cf9b34091999_arm64",
"product": {
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f55014b7e95512e2dcad9ebde4d36a39e136093ed22fc3436e66cf9b34091999_arm64",
"product_id": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f55014b7e95512e2dcad9ebde4d36a39e136093ed22fc3436e66cf9b34091999_arm64",
"product_identification_helper": {
"purl": "pkg:oci/quay-bridge-operator-rhel8@sha256%3Af55014b7e95512e2dcad9ebde4d36a39e136093ed22fc3436e66cf9b34091999?arch=arm64\u0026repository_url=registry.redhat.io/quay\u0026tag=3.10.17-1764168428"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:a4cb517edd5c5a6bf9766e1fdbd9226ffce969000dc6a8070dba193299f467a9_arm64",
"product": {
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:a4cb517edd5c5a6bf9766e1fdbd9226ffce969000dc6a8070dba193299f467a9_arm64",
"product_id": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:a4cb517edd5c5a6bf9766e1fdbd9226ffce969000dc6a8070dba193299f467a9_arm64",
"product_identification_helper": {
"purl": "pkg:oci/quay-builder-qemu-rhcos-rhel8@sha256%3Aa4cb517edd5c5a6bf9766e1fdbd9226ffce969000dc6a8070dba193299f467a9?arch=arm64\u0026repository_url=registry.redhat.io/quay\u0026tag=3.14-1764168428"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:55679b420af4e99bffa2ac83979bfaeb18fa2e88999be01dbb00b5912dad6f57_arm64",
"product": {
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:55679b420af4e99bffa2ac83979bfaeb18fa2e88999be01dbb00b5912dad6f57_arm64",
"product_id": "registry.redhat.io/quay/quay-builder-rhel8@sha256:55679b420af4e99bffa2ac83979bfaeb18fa2e88999be01dbb00b5912dad6f57_arm64",
"product_identification_helper": {
"purl": "pkg:oci/quay-builder-rhel8@sha256%3A55679b420af4e99bffa2ac83979bfaeb18fa2e88999be01dbb00b5912dad6f57?arch=arm64\u0026repository_url=registry.redhat.io/quay\u0026tag=8.10-1764168428"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/clair-rhel8@sha256:9eab1ead869fc65a1d3e0dd482f409f954d68361be09b230aff8d399970790de_arm64",
"product": {
"name": "registry.redhat.io/quay/clair-rhel8@sha256:9eab1ead869fc65a1d3e0dd482f409f954d68361be09b230aff8d399970790de_arm64",
"product_id": "registry.redhat.io/quay/clair-rhel8@sha256:9eab1ead869fc65a1d3e0dd482f409f954d68361be09b230aff8d399970790de_arm64",
"product_identification_helper": {
"purl": "pkg:oci/clair-rhel8@sha256%3A9eab1ead869fc65a1d3e0dd482f409f954d68361be09b230aff8d399970790de?arch=arm64\u0026repository_url=registry.redhat.io/quay\u0026tag=v3.10.16-1764168428"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:98918dfb471d2c25a93a31830e308d32ba84057021c4b9312346b3f534ea0ec8_arm64",
"product": {
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:98918dfb471d2c25a93a31830e308d32ba84057021c4b9312346b3f534ea0ec8_arm64",
"product_id": "registry.redhat.io/quay/quay-operator-rhel8@sha256:98918dfb471d2c25a93a31830e308d32ba84057021c4b9312346b3f534ea0ec8_arm64",
"product_identification_helper": {
"purl": "pkg:oci/quay-operator-rhel8@sha256%3A98918dfb471d2c25a93a31830e308d32ba84057021c4b9312346b3f534ea0ec8?arch=arm64\u0026repository_url=registry.redhat.io/quay\u0026tag=3.10.17-1764168428"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-rhel8@sha256:fe48d48bb338329da213a0a21d2ac706b4b731593f154d554bfd420ad21a2912_arm64",
"product": {
"name": "registry.redhat.io/quay/quay-rhel8@sha256:fe48d48bb338329da213a0a21d2ac706b4b731593f154d554bfd420ad21a2912_arm64",
"product_id": "registry.redhat.io/quay/quay-rhel8@sha256:fe48d48bb338329da213a0a21d2ac706b4b731593f154d554bfd420ad21a2912_arm64",
"product_identification_helper": {
"purl": "pkg:oci/quay-rhel8@sha256%3Afe48d48bb338329da213a0a21d2ac706b4b731593f154d554bfd420ad21a2912?arch=arm64\u0026repository_url=registry.redhat.io/quay\u0026tag=3.10.17-1764168428"
}
}
}
],
"category": "architecture",
"name": "arm64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:a97741941ab1688bec159eef3918cfceaab47263a1ff0871588cde2a16f39c27_ppc64le",
"product": {
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:a97741941ab1688bec159eef3918cfceaab47263a1ff0871588cde2a16f39c27_ppc64le",
"product_id": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:a97741941ab1688bec159eef3918cfceaab47263a1ff0871588cde2a16f39c27_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/quay-container-security-operator-rhel8@sha256%3Aa97741941ab1688bec159eef3918cfceaab47263a1ff0871588cde2a16f39c27?arch=ppc64le\u0026repository_url=registry.redhat.io/quay\u0026tag=3.10.17-1764168428"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b9889747f06f6fe48cd1a79aaf6dcafcf6a9cdd2d2ad986fb10da3f2a51c103b_ppc64le",
"product": {
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b9889747f06f6fe48cd1a79aaf6dcafcf6a9cdd2d2ad986fb10da3f2a51c103b_ppc64le",
"product_id": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b9889747f06f6fe48cd1a79aaf6dcafcf6a9cdd2d2ad986fb10da3f2a51c103b_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/quay-bridge-operator-rhel8@sha256%3Ab9889747f06f6fe48cd1a79aaf6dcafcf6a9cdd2d2ad986fb10da3f2a51c103b?arch=ppc64le\u0026repository_url=registry.redhat.io/quay\u0026tag=3.10.17-1764168428"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:27cd6dee034e7eaafa86c955d119b86b8454b8721131ba870a534dacae48653e_ppc64le",
"product": {
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:27cd6dee034e7eaafa86c955d119b86b8454b8721131ba870a534dacae48653e_ppc64le",
"product_id": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:27cd6dee034e7eaafa86c955d119b86b8454b8721131ba870a534dacae48653e_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/quay-builder-qemu-rhcos-rhel8@sha256%3A27cd6dee034e7eaafa86c955d119b86b8454b8721131ba870a534dacae48653e?arch=ppc64le\u0026repository_url=registry.redhat.io/quay\u0026tag=3.14-1764168428"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:826d18a3ecd4df0c8a8d67844677b394d1f86f365141c08cda8ce0eda78f3132_ppc64le",
"product": {
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:826d18a3ecd4df0c8a8d67844677b394d1f86f365141c08cda8ce0eda78f3132_ppc64le",
"product_id": "registry.redhat.io/quay/quay-builder-rhel8@sha256:826d18a3ecd4df0c8a8d67844677b394d1f86f365141c08cda8ce0eda78f3132_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/quay-builder-rhel8@sha256%3A826d18a3ecd4df0c8a8d67844677b394d1f86f365141c08cda8ce0eda78f3132?arch=ppc64le\u0026repository_url=registry.redhat.io/quay\u0026tag=8.10-1764168428"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/clair-rhel8@sha256:7541bf72daac1e784b5194b9c564fbc66831c6633aa7dd8eae3a7bd0c358c27e_ppc64le",
"product": {
"name": "registry.redhat.io/quay/clair-rhel8@sha256:7541bf72daac1e784b5194b9c564fbc66831c6633aa7dd8eae3a7bd0c358c27e_ppc64le",
"product_id": "registry.redhat.io/quay/clair-rhel8@sha256:7541bf72daac1e784b5194b9c564fbc66831c6633aa7dd8eae3a7bd0c358c27e_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/clair-rhel8@sha256%3A7541bf72daac1e784b5194b9c564fbc66831c6633aa7dd8eae3a7bd0c358c27e?arch=ppc64le\u0026repository_url=registry.redhat.io/quay\u0026tag=v3.10.16-1764168428"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:2837c7bcbf44311879e67be1642b3e4e3c328da0ff138ae7def975cb169f4e03_ppc64le",
"product": {
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:2837c7bcbf44311879e67be1642b3e4e3c328da0ff138ae7def975cb169f4e03_ppc64le",
"product_id": "registry.redhat.io/quay/quay-operator-rhel8@sha256:2837c7bcbf44311879e67be1642b3e4e3c328da0ff138ae7def975cb169f4e03_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/quay-operator-rhel8@sha256%3A2837c7bcbf44311879e67be1642b3e4e3c328da0ff138ae7def975cb169f4e03?arch=ppc64le\u0026repository_url=registry.redhat.io/quay\u0026tag=3.10.17-1764168428"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-rhel8@sha256:f5047f7dea7825a5d0ad7323f433af0ce17fea83d1d3861372edd682584bb30e_ppc64le",
"product": {
"name": "registry.redhat.io/quay/quay-rhel8@sha256:f5047f7dea7825a5d0ad7323f433af0ce17fea83d1d3861372edd682584bb30e_ppc64le",
"product_id": "registry.redhat.io/quay/quay-rhel8@sha256:f5047f7dea7825a5d0ad7323f433af0ce17fea83d1d3861372edd682584bb30e_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/quay-rhel8@sha256%3Af5047f7dea7825a5d0ad7323f433af0ce17fea83d1d3861372edd682584bb30e?arch=ppc64le\u0026repository_url=registry.redhat.io/quay\u0026tag=3.10.17-1764168428"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:74b4b594ffab3b29043c45163245df4f47aa0dea982dcac7474f09a0f6329f24_s390x",
"product": {
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:74b4b594ffab3b29043c45163245df4f47aa0dea982dcac7474f09a0f6329f24_s390x",
"product_id": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:74b4b594ffab3b29043c45163245df4f47aa0dea982dcac7474f09a0f6329f24_s390x",
"product_identification_helper": {
"purl": "pkg:oci/quay-container-security-operator-rhel8@sha256%3A74b4b594ffab3b29043c45163245df4f47aa0dea982dcac7474f09a0f6329f24?arch=s390x\u0026repository_url=registry.redhat.io/quay\u0026tag=3.10.17-1764168428"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:892bee6e3214a69b8924f840b69a55ac0c8d66443bf042cfa88c13766bd8dce3_s390x",
"product": {
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:892bee6e3214a69b8924f840b69a55ac0c8d66443bf042cfa88c13766bd8dce3_s390x",
"product_id": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:892bee6e3214a69b8924f840b69a55ac0c8d66443bf042cfa88c13766bd8dce3_s390x",
"product_identification_helper": {
"purl": "pkg:oci/quay-bridge-operator-rhel8@sha256%3A892bee6e3214a69b8924f840b69a55ac0c8d66443bf042cfa88c13766bd8dce3?arch=s390x\u0026repository_url=registry.redhat.io/quay\u0026tag=3.10.17-1764168428"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:086f08c9878414065d1ccd65caaf2609aba4d6aa9656f4a0387134ffda0b231d_s390x",
"product": {
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:086f08c9878414065d1ccd65caaf2609aba4d6aa9656f4a0387134ffda0b231d_s390x",
"product_id": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:086f08c9878414065d1ccd65caaf2609aba4d6aa9656f4a0387134ffda0b231d_s390x",
"product_identification_helper": {
"purl": "pkg:oci/quay-builder-qemu-rhcos-rhel8@sha256%3A086f08c9878414065d1ccd65caaf2609aba4d6aa9656f4a0387134ffda0b231d?arch=s390x\u0026repository_url=registry.redhat.io/quay\u0026tag=3.14-1764168428"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:f5e49246468aeaf92745e513e66224698e6a280a76a129ba91f7c41fd0be1225_s390x",
"product": {
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:f5e49246468aeaf92745e513e66224698e6a280a76a129ba91f7c41fd0be1225_s390x",
"product_id": "registry.redhat.io/quay/quay-builder-rhel8@sha256:f5e49246468aeaf92745e513e66224698e6a280a76a129ba91f7c41fd0be1225_s390x",
"product_identification_helper": {
"purl": "pkg:oci/quay-builder-rhel8@sha256%3Af5e49246468aeaf92745e513e66224698e6a280a76a129ba91f7c41fd0be1225?arch=s390x\u0026repository_url=registry.redhat.io/quay\u0026tag=8.10-1764168428"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/clair-rhel8@sha256:fb19f8197c0b403cb25287b23e19230d986f0bd45c920672dea1bf532cabe52d_s390x",
"product": {
"name": "registry.redhat.io/quay/clair-rhel8@sha256:fb19f8197c0b403cb25287b23e19230d986f0bd45c920672dea1bf532cabe52d_s390x",
"product_id": "registry.redhat.io/quay/clair-rhel8@sha256:fb19f8197c0b403cb25287b23e19230d986f0bd45c920672dea1bf532cabe52d_s390x",
"product_identification_helper": {
"purl": "pkg:oci/clair-rhel8@sha256%3Afb19f8197c0b403cb25287b23e19230d986f0bd45c920672dea1bf532cabe52d?arch=s390x\u0026repository_url=registry.redhat.io/quay\u0026tag=v3.10.16-1764168428"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:9dd90fe106a4c25b245ef65a66d082d3addb28a06606f7a38cb12e7e35b00ce8_s390x",
"product": {
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:9dd90fe106a4c25b245ef65a66d082d3addb28a06606f7a38cb12e7e35b00ce8_s390x",
"product_id": "registry.redhat.io/quay/quay-operator-rhel8@sha256:9dd90fe106a4c25b245ef65a66d082d3addb28a06606f7a38cb12e7e35b00ce8_s390x",
"product_identification_helper": {
"purl": "pkg:oci/quay-operator-rhel8@sha256%3A9dd90fe106a4c25b245ef65a66d082d3addb28a06606f7a38cb12e7e35b00ce8?arch=s390x\u0026repository_url=registry.redhat.io/quay\u0026tag=3.10.17-1764168428"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-rhel8@sha256:f8c677a9fc5a608bc6c1848db7e3ff906ea93cb9cbc92af3d574c3158b2af668_s390x",
"product": {
"name": "registry.redhat.io/quay/quay-rhel8@sha256:f8c677a9fc5a608bc6c1848db7e3ff906ea93cb9cbc92af3d574c3158b2af668_s390x",
"product_id": "registry.redhat.io/quay/quay-rhel8@sha256:f8c677a9fc5a608bc6c1848db7e3ff906ea93cb9cbc92af3d574c3158b2af668_s390x",
"product_identification_helper": {
"purl": "pkg:oci/quay-rhel8@sha256%3Af8c677a9fc5a608bc6c1848db7e3ff906ea93cb9cbc92af3d574c3158b2af668?arch=s390x\u0026repository_url=registry.redhat.io/quay\u0026tag=3.10.17-1764168428"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/clair-rhel8@sha256:4d10cbc5518e4e6d5d2a8fc6a15afe3526865df26eaa95e265a3ece624b31e90_amd64 as a component of Red Hat Quay 3.1",
"product_id": "Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:4d10cbc5518e4e6d5d2a8fc6a15afe3526865df26eaa95e265a3ece624b31e90_amd64"
},
"product_reference": "registry.redhat.io/quay/clair-rhel8@sha256:4d10cbc5518e4e6d5d2a8fc6a15afe3526865df26eaa95e265a3ece624b31e90_amd64",
"relates_to_product_reference": "Red Hat Quay 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/clair-rhel8@sha256:7541bf72daac1e784b5194b9c564fbc66831c6633aa7dd8eae3a7bd0c358c27e_ppc64le as a component of Red Hat Quay 3.1",
"product_id": "Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:7541bf72daac1e784b5194b9c564fbc66831c6633aa7dd8eae3a7bd0c358c27e_ppc64le"
},
"product_reference": "registry.redhat.io/quay/clair-rhel8@sha256:7541bf72daac1e784b5194b9c564fbc66831c6633aa7dd8eae3a7bd0c358c27e_ppc64le",
"relates_to_product_reference": "Red Hat Quay 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/clair-rhel8@sha256:9eab1ead869fc65a1d3e0dd482f409f954d68361be09b230aff8d399970790de_arm64 as a component of Red Hat Quay 3.1",
"product_id": "Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:9eab1ead869fc65a1d3e0dd482f409f954d68361be09b230aff8d399970790de_arm64"
},
"product_reference": "registry.redhat.io/quay/clair-rhel8@sha256:9eab1ead869fc65a1d3e0dd482f409f954d68361be09b230aff8d399970790de_arm64",
"relates_to_product_reference": "Red Hat Quay 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/clair-rhel8@sha256:fb19f8197c0b403cb25287b23e19230d986f0bd45c920672dea1bf532cabe52d_s390x as a component of Red Hat Quay 3.1",
"product_id": "Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:fb19f8197c0b403cb25287b23e19230d986f0bd45c920672dea1bf532cabe52d_s390x"
},
"product_reference": "registry.redhat.io/quay/clair-rhel8@sha256:fb19f8197c0b403cb25287b23e19230d986f0bd45c920672dea1bf532cabe52d_s390x",
"relates_to_product_reference": "Red Hat Quay 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:8b475114a5f77f7c041509a30246769a5f9064510724c8fc99ac29164dc3a0bb_amd64 as a component of Red Hat Quay 3.1",
"product_id": "Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:8b475114a5f77f7c041509a30246769a5f9064510724c8fc99ac29164dc3a0bb_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:8b475114a5f77f7c041509a30246769a5f9064510724c8fc99ac29164dc3a0bb_amd64",
"relates_to_product_reference": "Red Hat Quay 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:892bee6e3214a69b8924f840b69a55ac0c8d66443bf042cfa88c13766bd8dce3_s390x as a component of Red Hat Quay 3.1",
"product_id": "Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:892bee6e3214a69b8924f840b69a55ac0c8d66443bf042cfa88c13766bd8dce3_s390x"
},
"product_reference": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:892bee6e3214a69b8924f840b69a55ac0c8d66443bf042cfa88c13766bd8dce3_s390x",
"relates_to_product_reference": "Red Hat Quay 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa126c3f4865a2a62cba2734110418c865aa2d32f38147c056732e53fc593715_amd64 as a component of Red Hat Quay 3.1",
"product_id": "Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa126c3f4865a2a62cba2734110418c865aa2d32f38147c056732e53fc593715_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa126c3f4865a2a62cba2734110418c865aa2d32f38147c056732e53fc593715_amd64",
"relates_to_product_reference": "Red Hat Quay 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b9889747f06f6fe48cd1a79aaf6dcafcf6a9cdd2d2ad986fb10da3f2a51c103b_ppc64le as a component of Red Hat Quay 3.1",
"product_id": "Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b9889747f06f6fe48cd1a79aaf6dcafcf6a9cdd2d2ad986fb10da3f2a51c103b_ppc64le"
},
"product_reference": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b9889747f06f6fe48cd1a79aaf6dcafcf6a9cdd2d2ad986fb10da3f2a51c103b_ppc64le",
"relates_to_product_reference": "Red Hat Quay 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f55014b7e95512e2dcad9ebde4d36a39e136093ed22fc3436e66cf9b34091999_arm64 as a component of Red Hat Quay 3.1",
"product_id": "Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f55014b7e95512e2dcad9ebde4d36a39e136093ed22fc3436e66cf9b34091999_arm64"
},
"product_reference": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f55014b7e95512e2dcad9ebde4d36a39e136093ed22fc3436e66cf9b34091999_arm64",
"relates_to_product_reference": "Red Hat Quay 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:086f08c9878414065d1ccd65caaf2609aba4d6aa9656f4a0387134ffda0b231d_s390x as a component of Red Hat Quay 3.1",
"product_id": "Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:086f08c9878414065d1ccd65caaf2609aba4d6aa9656f4a0387134ffda0b231d_s390x"
},
"product_reference": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:086f08c9878414065d1ccd65caaf2609aba4d6aa9656f4a0387134ffda0b231d_s390x",
"relates_to_product_reference": "Red Hat Quay 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:27cd6dee034e7eaafa86c955d119b86b8454b8721131ba870a534dacae48653e_ppc64le as a component of Red Hat Quay 3.1",
"product_id": "Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:27cd6dee034e7eaafa86c955d119b86b8454b8721131ba870a534dacae48653e_ppc64le"
},
"product_reference": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:27cd6dee034e7eaafa86c955d119b86b8454b8721131ba870a534dacae48653e_ppc64le",
"relates_to_product_reference": "Red Hat Quay 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:69a3b67246d2fe32b1a1a6d726086ebd5a5f37c1ccc3c0e0021562d83caea21a_amd64 as a component of Red Hat Quay 3.1",
"product_id": "Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:69a3b67246d2fe32b1a1a6d726086ebd5a5f37c1ccc3c0e0021562d83caea21a_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:69a3b67246d2fe32b1a1a6d726086ebd5a5f37c1ccc3c0e0021562d83caea21a_amd64",
"relates_to_product_reference": "Red Hat Quay 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:a4cb517edd5c5a6bf9766e1fdbd9226ffce969000dc6a8070dba193299f467a9_arm64 as a component of Red Hat Quay 3.1",
"product_id": "Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:a4cb517edd5c5a6bf9766e1fdbd9226ffce969000dc6a8070dba193299f467a9_arm64"
},
"product_reference": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:a4cb517edd5c5a6bf9766e1fdbd9226ffce969000dc6a8070dba193299f467a9_arm64",
"relates_to_product_reference": "Red Hat Quay 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:55679b420af4e99bffa2ac83979bfaeb18fa2e88999be01dbb00b5912dad6f57_arm64 as a component of Red Hat Quay 3.1",
"product_id": "Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:55679b420af4e99bffa2ac83979bfaeb18fa2e88999be01dbb00b5912dad6f57_arm64"
},
"product_reference": "registry.redhat.io/quay/quay-builder-rhel8@sha256:55679b420af4e99bffa2ac83979bfaeb18fa2e88999be01dbb00b5912dad6f57_arm64",
"relates_to_product_reference": "Red Hat Quay 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:826d18a3ecd4df0c8a8d67844677b394d1f86f365141c08cda8ce0eda78f3132_ppc64le as a component of Red Hat Quay 3.1",
"product_id": "Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:826d18a3ecd4df0c8a8d67844677b394d1f86f365141c08cda8ce0eda78f3132_ppc64le"
},
"product_reference": "registry.redhat.io/quay/quay-builder-rhel8@sha256:826d18a3ecd4df0c8a8d67844677b394d1f86f365141c08cda8ce0eda78f3132_ppc64le",
"relates_to_product_reference": "Red Hat Quay 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:d007cac747d974c476392a703abe053dcee0603dfc0836d180175a1e2180c02b_amd64 as a component of Red Hat Quay 3.1",
"product_id": "Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:d007cac747d974c476392a703abe053dcee0603dfc0836d180175a1e2180c02b_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-builder-rhel8@sha256:d007cac747d974c476392a703abe053dcee0603dfc0836d180175a1e2180c02b_amd64",
"relates_to_product_reference": "Red Hat Quay 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:f5e49246468aeaf92745e513e66224698e6a280a76a129ba91f7c41fd0be1225_s390x as a component of Red Hat Quay 3.1",
"product_id": "Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:f5e49246468aeaf92745e513e66224698e6a280a76a129ba91f7c41fd0be1225_s390x"
},
"product_reference": "registry.redhat.io/quay/quay-builder-rhel8@sha256:f5e49246468aeaf92745e513e66224698e6a280a76a129ba91f7c41fd0be1225_s390x",
"relates_to_product_reference": "Red Hat Quay 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:64bad8b3369eeac99384b41984e32c85e8fdee2ae32282ca2d8e4df8b9d36df5_amd64 as a component of Red Hat Quay 3.1",
"product_id": "Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:64bad8b3369eeac99384b41984e32c85e8fdee2ae32282ca2d8e4df8b9d36df5_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:64bad8b3369eeac99384b41984e32c85e8fdee2ae32282ca2d8e4df8b9d36df5_amd64",
"relates_to_product_reference": "Red Hat Quay 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:74b4b594ffab3b29043c45163245df4f47aa0dea982dcac7474f09a0f6329f24_s390x as a component of Red Hat Quay 3.1",
"product_id": "Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:74b4b594ffab3b29043c45163245df4f47aa0dea982dcac7474f09a0f6329f24_s390x"
},
"product_reference": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:74b4b594ffab3b29043c45163245df4f47aa0dea982dcac7474f09a0f6329f24_s390x",
"relates_to_product_reference": "Red Hat Quay 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:a97741941ab1688bec159eef3918cfceaab47263a1ff0871588cde2a16f39c27_ppc64le as a component of Red Hat Quay 3.1",
"product_id": "Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:a97741941ab1688bec159eef3918cfceaab47263a1ff0871588cde2a16f39c27_ppc64le"
},
"product_reference": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:a97741941ab1688bec159eef3918cfceaab47263a1ff0871588cde2a16f39c27_ppc64le",
"relates_to_product_reference": "Red Hat Quay 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:c0fdf2c449051a44ffbdd7794c4fd6c3d6892ad7d1e30ec9e72c97ae34053127_arm64 as a component of Red Hat Quay 3.1",
"product_id": "Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:c0fdf2c449051a44ffbdd7794c4fd6c3d6892ad7d1e30ec9e72c97ae34053127_arm64"
},
"product_reference": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:c0fdf2c449051a44ffbdd7794c4fd6c3d6892ad7d1e30ec9e72c97ae34053127_arm64",
"relates_to_product_reference": "Red Hat Quay 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:d86d94c67d42f5ca58f0ea102f74499cbbd0abd0f0d4bab039557981c8c18363_amd64 as a component of Red Hat Quay 3.1",
"product_id": "Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:d86d94c67d42f5ca58f0ea102f74499cbbd0abd0f0d4bab039557981c8c18363_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:d86d94c67d42f5ca58f0ea102f74499cbbd0abd0f0d4bab039557981c8c18363_amd64",
"relates_to_product_reference": "Red Hat Quay 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-operator-bundle@sha256:76db6178b69a489a215a5aeb295530fe6dd35210d353103139b4c5a4bfc05565_amd64 as a component of Red Hat Quay 3.1",
"product_id": "Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-bundle@sha256:76db6178b69a489a215a5aeb295530fe6dd35210d353103139b4c5a4bfc05565_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-operator-bundle@sha256:76db6178b69a489a215a5aeb295530fe6dd35210d353103139b4c5a4bfc05565_amd64",
"relates_to_product_reference": "Red Hat Quay 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:073d670f841132b02663a58c8eca5f6dce09f3233d8d3a6d2d55de2e78374b6c_amd64 as a component of Red Hat Quay 3.1",
"product_id": "Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:073d670f841132b02663a58c8eca5f6dce09f3233d8d3a6d2d55de2e78374b6c_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-operator-rhel8@sha256:073d670f841132b02663a58c8eca5f6dce09f3233d8d3a6d2d55de2e78374b6c_amd64",
"relates_to_product_reference": "Red Hat Quay 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:2837c7bcbf44311879e67be1642b3e4e3c328da0ff138ae7def975cb169f4e03_ppc64le as a component of Red Hat Quay 3.1",
"product_id": "Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:2837c7bcbf44311879e67be1642b3e4e3c328da0ff138ae7def975cb169f4e03_ppc64le"
},
"product_reference": "registry.redhat.io/quay/quay-operator-rhel8@sha256:2837c7bcbf44311879e67be1642b3e4e3c328da0ff138ae7def975cb169f4e03_ppc64le",
"relates_to_product_reference": "Red Hat Quay 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:98918dfb471d2c25a93a31830e308d32ba84057021c4b9312346b3f534ea0ec8_arm64 as a component of Red Hat Quay 3.1",
"product_id": "Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:98918dfb471d2c25a93a31830e308d32ba84057021c4b9312346b3f534ea0ec8_arm64"
},
"product_reference": "registry.redhat.io/quay/quay-operator-rhel8@sha256:98918dfb471d2c25a93a31830e308d32ba84057021c4b9312346b3f534ea0ec8_arm64",
"relates_to_product_reference": "Red Hat Quay 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:9dd90fe106a4c25b245ef65a66d082d3addb28a06606f7a38cb12e7e35b00ce8_s390x as a component of Red Hat Quay 3.1",
"product_id": "Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:9dd90fe106a4c25b245ef65a66d082d3addb28a06606f7a38cb12e7e35b00ce8_s390x"
},
"product_reference": "registry.redhat.io/quay/quay-operator-rhel8@sha256:9dd90fe106a4c25b245ef65a66d082d3addb28a06606f7a38cb12e7e35b00ce8_s390x",
"relates_to_product_reference": "Red Hat Quay 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-rhel8@sha256:cb10c70bfb9d8dc3f7bc75506901cd84af0cd11e21883f78d651838eaa83c16c_amd64 as a component of Red Hat Quay 3.1",
"product_id": "Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:cb10c70bfb9d8dc3f7bc75506901cd84af0cd11e21883f78d651838eaa83c16c_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-rhel8@sha256:cb10c70bfb9d8dc3f7bc75506901cd84af0cd11e21883f78d651838eaa83c16c_amd64",
"relates_to_product_reference": "Red Hat Quay 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-rhel8@sha256:f5047f7dea7825a5d0ad7323f433af0ce17fea83d1d3861372edd682584bb30e_ppc64le as a component of Red Hat Quay 3.1",
"product_id": "Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:f5047f7dea7825a5d0ad7323f433af0ce17fea83d1d3861372edd682584bb30e_ppc64le"
},
"product_reference": "registry.redhat.io/quay/quay-rhel8@sha256:f5047f7dea7825a5d0ad7323f433af0ce17fea83d1d3861372edd682584bb30e_ppc64le",
"relates_to_product_reference": "Red Hat Quay 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-rhel8@sha256:f8c677a9fc5a608bc6c1848db7e3ff906ea93cb9cbc92af3d574c3158b2af668_s390x as a component of Red Hat Quay 3.1",
"product_id": "Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:f8c677a9fc5a608bc6c1848db7e3ff906ea93cb9cbc92af3d574c3158b2af668_s390x"
},
"product_reference": "registry.redhat.io/quay/quay-rhel8@sha256:f8c677a9fc5a608bc6c1848db7e3ff906ea93cb9cbc92af3d574c3158b2af668_s390x",
"relates_to_product_reference": "Red Hat Quay 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-rhel8@sha256:fe48d48bb338329da213a0a21d2ac706b4b731593f154d554bfd420ad21a2912_arm64 as a component of Red Hat Quay 3.1",
"product_id": "Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:fe48d48bb338329da213a0a21d2ac706b4b731593f154d554bfd420ad21a2912_arm64"
},
"product_reference": "registry.redhat.io/quay/quay-rhel8@sha256:fe48d48bb338329da213a0a21d2ac706b4b731593f154d554bfd420ad21a2912_arm64",
"relates_to_product_reference": "Red Hat Quay 3.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-34156",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"discovery_date": "2024-09-06T21:20:09.377905+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:4d10cbc5518e4e6d5d2a8fc6a15afe3526865df26eaa95e265a3ece624b31e90_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:7541bf72daac1e784b5194b9c564fbc66831c6633aa7dd8eae3a7bd0c358c27e_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:9eab1ead869fc65a1d3e0dd482f409f954d68361be09b230aff8d399970790de_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:fb19f8197c0b403cb25287b23e19230d986f0bd45c920672dea1bf532cabe52d_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:8b475114a5f77f7c041509a30246769a5f9064510724c8fc99ac29164dc3a0bb_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:892bee6e3214a69b8924f840b69a55ac0c8d66443bf042cfa88c13766bd8dce3_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa126c3f4865a2a62cba2734110418c865aa2d32f38147c056732e53fc593715_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b9889747f06f6fe48cd1a79aaf6dcafcf6a9cdd2d2ad986fb10da3f2a51c103b_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f55014b7e95512e2dcad9ebde4d36a39e136093ed22fc3436e66cf9b34091999_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:086f08c9878414065d1ccd65caaf2609aba4d6aa9656f4a0387134ffda0b231d_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:27cd6dee034e7eaafa86c955d119b86b8454b8721131ba870a534dacae48653e_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:69a3b67246d2fe32b1a1a6d726086ebd5a5f37c1ccc3c0e0021562d83caea21a_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:a4cb517edd5c5a6bf9766e1fdbd9226ffce969000dc6a8070dba193299f467a9_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:55679b420af4e99bffa2ac83979bfaeb18fa2e88999be01dbb00b5912dad6f57_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:826d18a3ecd4df0c8a8d67844677b394d1f86f365141c08cda8ce0eda78f3132_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:d007cac747d974c476392a703abe053dcee0603dfc0836d180175a1e2180c02b_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:f5e49246468aeaf92745e513e66224698e6a280a76a129ba91f7c41fd0be1225_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:64bad8b3369eeac99384b41984e32c85e8fdee2ae32282ca2d8e4df8b9d36df5_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:74b4b594ffab3b29043c45163245df4f47aa0dea982dcac7474f09a0f6329f24_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:a97741941ab1688bec159eef3918cfceaab47263a1ff0871588cde2a16f39c27_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:c0fdf2c449051a44ffbdd7794c4fd6c3d6892ad7d1e30ec9e72c97ae34053127_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:d86d94c67d42f5ca58f0ea102f74499cbbd0abd0f0d4bab039557981c8c18363_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-bundle@sha256:76db6178b69a489a215a5aeb295530fe6dd35210d353103139b4c5a4bfc05565_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:cb10c70bfb9d8dc3f7bc75506901cd84af0cd11e21883f78d651838eaa83c16c_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:f5047f7dea7825a5d0ad7323f433af0ce17fea83d1d3861372edd682584bb30e_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:f8c677a9fc5a608bc6c1848db7e3ff906ea93cb9cbc92af3d574c3158b2af668_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:fe48d48bb338329da213a0a21d2ac706b4b731593f154d554bfd420ad21a2912_arm64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2310528"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the encoding/gob package of the Golang standard library. Calling Decoder.Decoding, a message that contains deeply nested structures, can cause a panic due to stack exhaustion. This is a follow-up to CVE-2022-30635.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability in Go\u0027s `encoding/gob` package is of high severity because it exposes applications to potential Denial of Service (DoS) attacks through stack exhaustion. Since `gob` relies on recursive function calls to decode nested structures, an attacker could exploit this by sending crafted messages with excessively deep nesting, causing the application to panic due to stack overflow. This risk is particularly important in scenarios where untrusted or external input is processed, as it can lead to system unavailability or crashes, undermining the reliability and availability of services.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:073d670f841132b02663a58c8eca5f6dce09f3233d8d3a6d2d55de2e78374b6c_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:2837c7bcbf44311879e67be1642b3e4e3c328da0ff138ae7def975cb169f4e03_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:98918dfb471d2c25a93a31830e308d32ba84057021c4b9312346b3f534ea0ec8_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:9dd90fe106a4c25b245ef65a66d082d3addb28a06606f7a38cb12e7e35b00ce8_s390x"
],
"known_not_affected": [
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:4d10cbc5518e4e6d5d2a8fc6a15afe3526865df26eaa95e265a3ece624b31e90_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:7541bf72daac1e784b5194b9c564fbc66831c6633aa7dd8eae3a7bd0c358c27e_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:9eab1ead869fc65a1d3e0dd482f409f954d68361be09b230aff8d399970790de_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:fb19f8197c0b403cb25287b23e19230d986f0bd45c920672dea1bf532cabe52d_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:8b475114a5f77f7c041509a30246769a5f9064510724c8fc99ac29164dc3a0bb_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:892bee6e3214a69b8924f840b69a55ac0c8d66443bf042cfa88c13766bd8dce3_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa126c3f4865a2a62cba2734110418c865aa2d32f38147c056732e53fc593715_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b9889747f06f6fe48cd1a79aaf6dcafcf6a9cdd2d2ad986fb10da3f2a51c103b_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f55014b7e95512e2dcad9ebde4d36a39e136093ed22fc3436e66cf9b34091999_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:086f08c9878414065d1ccd65caaf2609aba4d6aa9656f4a0387134ffda0b231d_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:27cd6dee034e7eaafa86c955d119b86b8454b8721131ba870a534dacae48653e_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:69a3b67246d2fe32b1a1a6d726086ebd5a5f37c1ccc3c0e0021562d83caea21a_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:a4cb517edd5c5a6bf9766e1fdbd9226ffce969000dc6a8070dba193299f467a9_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:55679b420af4e99bffa2ac83979bfaeb18fa2e88999be01dbb00b5912dad6f57_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:826d18a3ecd4df0c8a8d67844677b394d1f86f365141c08cda8ce0eda78f3132_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:d007cac747d974c476392a703abe053dcee0603dfc0836d180175a1e2180c02b_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:f5e49246468aeaf92745e513e66224698e6a280a76a129ba91f7c41fd0be1225_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:64bad8b3369eeac99384b41984e32c85e8fdee2ae32282ca2d8e4df8b9d36df5_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:74b4b594ffab3b29043c45163245df4f47aa0dea982dcac7474f09a0f6329f24_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:a97741941ab1688bec159eef3918cfceaab47263a1ff0871588cde2a16f39c27_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:c0fdf2c449051a44ffbdd7794c4fd6c3d6892ad7d1e30ec9e72c97ae34053127_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:d86d94c67d42f5ca58f0ea102f74499cbbd0abd0f0d4bab039557981c8c18363_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-bundle@sha256:76db6178b69a489a215a5aeb295530fe6dd35210d353103139b4c5a4bfc05565_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:cb10c70bfb9d8dc3f7bc75506901cd84af0cd11e21883f78d651838eaa83c16c_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:f5047f7dea7825a5d0ad7323f433af0ce17fea83d1d3861372edd682584bb30e_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:f8c677a9fc5a608bc6c1848db7e3ff906ea93cb9cbc92af3d574c3158b2af668_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:fe48d48bb338329da213a0a21d2ac706b4b731593f154d554bfd420ad21a2912_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-34156"
},
{
"category": "external",
"summary": "RHBZ#2310528",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2310528"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-34156",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34156"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-34156",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-34156"
},
{
"category": "external",
"summary": "https://go.dev/cl/611239",
"url": "https://go.dev/cl/611239"
},
{
"category": "external",
"summary": "https://go.dev/issue/69139",
"url": "https://go.dev/issue/69139"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-dev/c/S9POB9NCTdk",
"url": "https://groups.google.com/g/golang-dev/c/S9POB9NCTdk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2024-3106",
"url": "https://pkg.go.dev/vuln/GO-2024-3106"
}
],
"release_date": "2024-09-06T21:15:12.020000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-11-26T14:52:57+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:073d670f841132b02663a58c8eca5f6dce09f3233d8d3a6d2d55de2e78374b6c_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:2837c7bcbf44311879e67be1642b3e4e3c328da0ff138ae7def975cb169f4e03_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:98918dfb471d2c25a93a31830e308d32ba84057021c4b9312346b3f534ea0ec8_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:9dd90fe106a4c25b245ef65a66d082d3addb28a06606f7a38cb12e7e35b00ce8_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:22182"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:4d10cbc5518e4e6d5d2a8fc6a15afe3526865df26eaa95e265a3ece624b31e90_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:7541bf72daac1e784b5194b9c564fbc66831c6633aa7dd8eae3a7bd0c358c27e_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:9eab1ead869fc65a1d3e0dd482f409f954d68361be09b230aff8d399970790de_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:fb19f8197c0b403cb25287b23e19230d986f0bd45c920672dea1bf532cabe52d_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:8b475114a5f77f7c041509a30246769a5f9064510724c8fc99ac29164dc3a0bb_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:892bee6e3214a69b8924f840b69a55ac0c8d66443bf042cfa88c13766bd8dce3_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa126c3f4865a2a62cba2734110418c865aa2d32f38147c056732e53fc593715_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b9889747f06f6fe48cd1a79aaf6dcafcf6a9cdd2d2ad986fb10da3f2a51c103b_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f55014b7e95512e2dcad9ebde4d36a39e136093ed22fc3436e66cf9b34091999_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:086f08c9878414065d1ccd65caaf2609aba4d6aa9656f4a0387134ffda0b231d_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:27cd6dee034e7eaafa86c955d119b86b8454b8721131ba870a534dacae48653e_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:69a3b67246d2fe32b1a1a6d726086ebd5a5f37c1ccc3c0e0021562d83caea21a_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:a4cb517edd5c5a6bf9766e1fdbd9226ffce969000dc6a8070dba193299f467a9_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:55679b420af4e99bffa2ac83979bfaeb18fa2e88999be01dbb00b5912dad6f57_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:826d18a3ecd4df0c8a8d67844677b394d1f86f365141c08cda8ce0eda78f3132_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:d007cac747d974c476392a703abe053dcee0603dfc0836d180175a1e2180c02b_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:f5e49246468aeaf92745e513e66224698e6a280a76a129ba91f7c41fd0be1225_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:64bad8b3369eeac99384b41984e32c85e8fdee2ae32282ca2d8e4df8b9d36df5_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:74b4b594ffab3b29043c45163245df4f47aa0dea982dcac7474f09a0f6329f24_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:a97741941ab1688bec159eef3918cfceaab47263a1ff0871588cde2a16f39c27_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:c0fdf2c449051a44ffbdd7794c4fd6c3d6892ad7d1e30ec9e72c97ae34053127_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:d86d94c67d42f5ca58f0ea102f74499cbbd0abd0f0d4bab039557981c8c18363_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-bundle@sha256:76db6178b69a489a215a5aeb295530fe6dd35210d353103139b4c5a4bfc05565_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:073d670f841132b02663a58c8eca5f6dce09f3233d8d3a6d2d55de2e78374b6c_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:2837c7bcbf44311879e67be1642b3e4e3c328da0ff138ae7def975cb169f4e03_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:98918dfb471d2c25a93a31830e308d32ba84057021c4b9312346b3f534ea0ec8_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:9dd90fe106a4c25b245ef65a66d082d3addb28a06606f7a38cb12e7e35b00ce8_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:cb10c70bfb9d8dc3f7bc75506901cd84af0cd11e21883f78d651838eaa83c16c_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:f5047f7dea7825a5d0ad7323f433af0ce17fea83d1d3861372edd682584bb30e_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:f8c677a9fc5a608bc6c1848db7e3ff906ea93cb9cbc92af3d574c3158b2af668_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:fe48d48bb338329da213a0a21d2ac706b4b731593f154d554bfd420ad21a2912_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:4d10cbc5518e4e6d5d2a8fc6a15afe3526865df26eaa95e265a3ece624b31e90_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:7541bf72daac1e784b5194b9c564fbc66831c6633aa7dd8eae3a7bd0c358c27e_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:9eab1ead869fc65a1d3e0dd482f409f954d68361be09b230aff8d399970790de_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:fb19f8197c0b403cb25287b23e19230d986f0bd45c920672dea1bf532cabe52d_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:8b475114a5f77f7c041509a30246769a5f9064510724c8fc99ac29164dc3a0bb_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:892bee6e3214a69b8924f840b69a55ac0c8d66443bf042cfa88c13766bd8dce3_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa126c3f4865a2a62cba2734110418c865aa2d32f38147c056732e53fc593715_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b9889747f06f6fe48cd1a79aaf6dcafcf6a9cdd2d2ad986fb10da3f2a51c103b_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f55014b7e95512e2dcad9ebde4d36a39e136093ed22fc3436e66cf9b34091999_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:086f08c9878414065d1ccd65caaf2609aba4d6aa9656f4a0387134ffda0b231d_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:27cd6dee034e7eaafa86c955d119b86b8454b8721131ba870a534dacae48653e_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:69a3b67246d2fe32b1a1a6d726086ebd5a5f37c1ccc3c0e0021562d83caea21a_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:a4cb517edd5c5a6bf9766e1fdbd9226ffce969000dc6a8070dba193299f467a9_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:55679b420af4e99bffa2ac83979bfaeb18fa2e88999be01dbb00b5912dad6f57_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:826d18a3ecd4df0c8a8d67844677b394d1f86f365141c08cda8ce0eda78f3132_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:d007cac747d974c476392a703abe053dcee0603dfc0836d180175a1e2180c02b_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:f5e49246468aeaf92745e513e66224698e6a280a76a129ba91f7c41fd0be1225_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:64bad8b3369eeac99384b41984e32c85e8fdee2ae32282ca2d8e4df8b9d36df5_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:74b4b594ffab3b29043c45163245df4f47aa0dea982dcac7474f09a0f6329f24_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:a97741941ab1688bec159eef3918cfceaab47263a1ff0871588cde2a16f39c27_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:c0fdf2c449051a44ffbdd7794c4fd6c3d6892ad7d1e30ec9e72c97ae34053127_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:d86d94c67d42f5ca58f0ea102f74499cbbd0abd0f0d4bab039557981c8c18363_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-bundle@sha256:76db6178b69a489a215a5aeb295530fe6dd35210d353103139b4c5a4bfc05565_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:073d670f841132b02663a58c8eca5f6dce09f3233d8d3a6d2d55de2e78374b6c_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:2837c7bcbf44311879e67be1642b3e4e3c328da0ff138ae7def975cb169f4e03_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:98918dfb471d2c25a93a31830e308d32ba84057021c4b9312346b3f534ea0ec8_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:9dd90fe106a4c25b245ef65a66d082d3addb28a06606f7a38cb12e7e35b00ce8_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:cb10c70bfb9d8dc3f7bc75506901cd84af0cd11e21883f78d651838eaa83c16c_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:f5047f7dea7825a5d0ad7323f433af0ce17fea83d1d3861372edd682584bb30e_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:f8c677a9fc5a608bc6c1848db7e3ff906ea93cb9cbc92af3d574c3158b2af668_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:fe48d48bb338329da213a0a21d2ac706b4b731593f154d554bfd420ad21a2912_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion"
},
{
"cve": "CVE-2024-45337",
"cwe": {
"id": "CWE-285",
"name": "Improper Authorization"
},
"discovery_date": "2024-12-11T19:00:54.247490+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:4d10cbc5518e4e6d5d2a8fc6a15afe3526865df26eaa95e265a3ece624b31e90_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:7541bf72daac1e784b5194b9c564fbc66831c6633aa7dd8eae3a7bd0c358c27e_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:9eab1ead869fc65a1d3e0dd482f409f954d68361be09b230aff8d399970790de_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:fb19f8197c0b403cb25287b23e19230d986f0bd45c920672dea1bf532cabe52d_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:8b475114a5f77f7c041509a30246769a5f9064510724c8fc99ac29164dc3a0bb_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:892bee6e3214a69b8924f840b69a55ac0c8d66443bf042cfa88c13766bd8dce3_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa126c3f4865a2a62cba2734110418c865aa2d32f38147c056732e53fc593715_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b9889747f06f6fe48cd1a79aaf6dcafcf6a9cdd2d2ad986fb10da3f2a51c103b_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f55014b7e95512e2dcad9ebde4d36a39e136093ed22fc3436e66cf9b34091999_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:086f08c9878414065d1ccd65caaf2609aba4d6aa9656f4a0387134ffda0b231d_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:27cd6dee034e7eaafa86c955d119b86b8454b8721131ba870a534dacae48653e_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:69a3b67246d2fe32b1a1a6d726086ebd5a5f37c1ccc3c0e0021562d83caea21a_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:a4cb517edd5c5a6bf9766e1fdbd9226ffce969000dc6a8070dba193299f467a9_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:55679b420af4e99bffa2ac83979bfaeb18fa2e88999be01dbb00b5912dad6f57_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:826d18a3ecd4df0c8a8d67844677b394d1f86f365141c08cda8ce0eda78f3132_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:d007cac747d974c476392a703abe053dcee0603dfc0836d180175a1e2180c02b_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:f5e49246468aeaf92745e513e66224698e6a280a76a129ba91f7c41fd0be1225_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:64bad8b3369eeac99384b41984e32c85e8fdee2ae32282ca2d8e4df8b9d36df5_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:74b4b594ffab3b29043c45163245df4f47aa0dea982dcac7474f09a0f6329f24_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:a97741941ab1688bec159eef3918cfceaab47263a1ff0871588cde2a16f39c27_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:c0fdf2c449051a44ffbdd7794c4fd6c3d6892ad7d1e30ec9e72c97ae34053127_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:d86d94c67d42f5ca58f0ea102f74499cbbd0abd0f0d4bab039557981c8c18363_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-bundle@sha256:76db6178b69a489a215a5aeb295530fe6dd35210d353103139b4c5a4bfc05565_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:cb10c70bfb9d8dc3f7bc75506901cd84af0cd11e21883f78d651838eaa83c16c_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:f5047f7dea7825a5d0ad7323f433af0ce17fea83d1d3861372edd682584bb30e_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:f8c677a9fc5a608bc6c1848db7e3ff906ea93cb9cbc92af3d574c3158b2af668_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:fe48d48bb338329da213a0a21d2ac706b4b731593f154d554bfd420ad21a2912_arm64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2331720"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the x/crypto/ssh go library. Applications and libraries that misuse the ServerConfig.PublicKeyCallback callback may be susceptible to an authorization bypass. For example, an attacker may send public keys A and B and authenticate with A. PublicKeyCallback would be called only twice, first with A and then with B. A vulnerable application may then make authorization decisions based on key B, for which the attacker does not control the private key. The misuse of ServerConfig.PublicKeyCallback may cause an authorization bypass.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang.org/x/crypto/ssh: Misuse of ServerConfig.PublicKeyCallback may cause authorization bypass in golang.org/x/crypto",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is classified as important rather than critical because it does not directly enable unauthorized access but rather introduces a risk of authorization bypass if the application or library misuses the PublicKeyCallback API. The vulnerability relies on incorrect assumptions made by the application when handling the sequence or state of keys provided during SSH authentication. Properly implemented systems that use the Permissions field or avoid relying on external state remain unaffected. Additionally, the vulnerability does not allow direct exploitation to gain control over a system without the presence of insecure logic in the application\u0027s handling of authentication attempts.\n\n\nRed Hat Enterprise Linux(RHEL) 8 \u0026 9 and Red Hat Openshift marked as not affected as it was determined that the problem function `ServerConfig.PublicKeyCallback`, as noted in the CVE-2024-45337 issue, is not called by Podman, Buildah, containers-common, or the gvisor-tap-vsock projects.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:073d670f841132b02663a58c8eca5f6dce09f3233d8d3a6d2d55de2e78374b6c_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:2837c7bcbf44311879e67be1642b3e4e3c328da0ff138ae7def975cb169f4e03_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:98918dfb471d2c25a93a31830e308d32ba84057021c4b9312346b3f534ea0ec8_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:9dd90fe106a4c25b245ef65a66d082d3addb28a06606f7a38cb12e7e35b00ce8_s390x"
],
"known_not_affected": [
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:4d10cbc5518e4e6d5d2a8fc6a15afe3526865df26eaa95e265a3ece624b31e90_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:7541bf72daac1e784b5194b9c564fbc66831c6633aa7dd8eae3a7bd0c358c27e_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:9eab1ead869fc65a1d3e0dd482f409f954d68361be09b230aff8d399970790de_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:fb19f8197c0b403cb25287b23e19230d986f0bd45c920672dea1bf532cabe52d_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:8b475114a5f77f7c041509a30246769a5f9064510724c8fc99ac29164dc3a0bb_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:892bee6e3214a69b8924f840b69a55ac0c8d66443bf042cfa88c13766bd8dce3_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa126c3f4865a2a62cba2734110418c865aa2d32f38147c056732e53fc593715_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b9889747f06f6fe48cd1a79aaf6dcafcf6a9cdd2d2ad986fb10da3f2a51c103b_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f55014b7e95512e2dcad9ebde4d36a39e136093ed22fc3436e66cf9b34091999_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:086f08c9878414065d1ccd65caaf2609aba4d6aa9656f4a0387134ffda0b231d_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:27cd6dee034e7eaafa86c955d119b86b8454b8721131ba870a534dacae48653e_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:69a3b67246d2fe32b1a1a6d726086ebd5a5f37c1ccc3c0e0021562d83caea21a_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:a4cb517edd5c5a6bf9766e1fdbd9226ffce969000dc6a8070dba193299f467a9_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:55679b420af4e99bffa2ac83979bfaeb18fa2e88999be01dbb00b5912dad6f57_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:826d18a3ecd4df0c8a8d67844677b394d1f86f365141c08cda8ce0eda78f3132_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:d007cac747d974c476392a703abe053dcee0603dfc0836d180175a1e2180c02b_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:f5e49246468aeaf92745e513e66224698e6a280a76a129ba91f7c41fd0be1225_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:64bad8b3369eeac99384b41984e32c85e8fdee2ae32282ca2d8e4df8b9d36df5_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:74b4b594ffab3b29043c45163245df4f47aa0dea982dcac7474f09a0f6329f24_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:a97741941ab1688bec159eef3918cfceaab47263a1ff0871588cde2a16f39c27_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:c0fdf2c449051a44ffbdd7794c4fd6c3d6892ad7d1e30ec9e72c97ae34053127_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:d86d94c67d42f5ca58f0ea102f74499cbbd0abd0f0d4bab039557981c8c18363_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-bundle@sha256:76db6178b69a489a215a5aeb295530fe6dd35210d353103139b4c5a4bfc05565_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:cb10c70bfb9d8dc3f7bc75506901cd84af0cd11e21883f78d651838eaa83c16c_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:f5047f7dea7825a5d0ad7323f433af0ce17fea83d1d3861372edd682584bb30e_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:f8c677a9fc5a608bc6c1848db7e3ff906ea93cb9cbc92af3d574c3158b2af668_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:fe48d48bb338329da213a0a21d2ac706b4b731593f154d554bfd420ad21a2912_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-45337"
},
{
"category": "external",
"summary": "RHBZ#2331720",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331720"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-45337",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-45337"
},
{
"category": "external",
"summary": "https://github.com/golang/crypto/commit/b4f1988a35dee11ec3e05d6bf3e90b695fbd8909",
"url": "https://github.com/golang/crypto/commit/b4f1988a35dee11ec3e05d6bf3e90b695fbd8909"
},
{
"category": "external",
"summary": "https://go.dev/cl/635315",
"url": "https://go.dev/cl/635315"
},
{
"category": "external",
"summary": "https://go.dev/issue/70779",
"url": "https://go.dev/issue/70779"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/-nPEi39gI4Q/m/cGVPJCqdAQAJ",
"url": "https://groups.google.com/g/golang-announce/c/-nPEi39gI4Q/m/cGVPJCqdAQAJ"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2024-3321",
"url": "https://pkg.go.dev/vuln/GO-2024-3321"
}
],
"release_date": "2024-12-11T18:55:58.506000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-11-26T14:52:57+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:073d670f841132b02663a58c8eca5f6dce09f3233d8d3a6d2d55de2e78374b6c_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:2837c7bcbf44311879e67be1642b3e4e3c328da0ff138ae7def975cb169f4e03_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:98918dfb471d2c25a93a31830e308d32ba84057021c4b9312346b3f534ea0ec8_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:9dd90fe106a4c25b245ef65a66d082d3addb28a06606f7a38cb12e7e35b00ce8_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:22182"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:4d10cbc5518e4e6d5d2a8fc6a15afe3526865df26eaa95e265a3ece624b31e90_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:7541bf72daac1e784b5194b9c564fbc66831c6633aa7dd8eae3a7bd0c358c27e_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:9eab1ead869fc65a1d3e0dd482f409f954d68361be09b230aff8d399970790de_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:fb19f8197c0b403cb25287b23e19230d986f0bd45c920672dea1bf532cabe52d_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:8b475114a5f77f7c041509a30246769a5f9064510724c8fc99ac29164dc3a0bb_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:892bee6e3214a69b8924f840b69a55ac0c8d66443bf042cfa88c13766bd8dce3_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa126c3f4865a2a62cba2734110418c865aa2d32f38147c056732e53fc593715_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b9889747f06f6fe48cd1a79aaf6dcafcf6a9cdd2d2ad986fb10da3f2a51c103b_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f55014b7e95512e2dcad9ebde4d36a39e136093ed22fc3436e66cf9b34091999_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:086f08c9878414065d1ccd65caaf2609aba4d6aa9656f4a0387134ffda0b231d_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:27cd6dee034e7eaafa86c955d119b86b8454b8721131ba870a534dacae48653e_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:69a3b67246d2fe32b1a1a6d726086ebd5a5f37c1ccc3c0e0021562d83caea21a_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:a4cb517edd5c5a6bf9766e1fdbd9226ffce969000dc6a8070dba193299f467a9_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:55679b420af4e99bffa2ac83979bfaeb18fa2e88999be01dbb00b5912dad6f57_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:826d18a3ecd4df0c8a8d67844677b394d1f86f365141c08cda8ce0eda78f3132_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:d007cac747d974c476392a703abe053dcee0603dfc0836d180175a1e2180c02b_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:f5e49246468aeaf92745e513e66224698e6a280a76a129ba91f7c41fd0be1225_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:64bad8b3369eeac99384b41984e32c85e8fdee2ae32282ca2d8e4df8b9d36df5_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:74b4b594ffab3b29043c45163245df4f47aa0dea982dcac7474f09a0f6329f24_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:a97741941ab1688bec159eef3918cfceaab47263a1ff0871588cde2a16f39c27_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:c0fdf2c449051a44ffbdd7794c4fd6c3d6892ad7d1e30ec9e72c97ae34053127_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:d86d94c67d42f5ca58f0ea102f74499cbbd0abd0f0d4bab039557981c8c18363_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-bundle@sha256:76db6178b69a489a215a5aeb295530fe6dd35210d353103139b4c5a4bfc05565_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:073d670f841132b02663a58c8eca5f6dce09f3233d8d3a6d2d55de2e78374b6c_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:2837c7bcbf44311879e67be1642b3e4e3c328da0ff138ae7def975cb169f4e03_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:98918dfb471d2c25a93a31830e308d32ba84057021c4b9312346b3f534ea0ec8_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:9dd90fe106a4c25b245ef65a66d082d3addb28a06606f7a38cb12e7e35b00ce8_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:cb10c70bfb9d8dc3f7bc75506901cd84af0cd11e21883f78d651838eaa83c16c_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:f5047f7dea7825a5d0ad7323f433af0ce17fea83d1d3861372edd682584bb30e_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:f8c677a9fc5a608bc6c1848db7e3ff906ea93cb9cbc92af3d574c3158b2af668_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:fe48d48bb338329da213a0a21d2ac706b4b731593f154d554bfd420ad21a2912_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:4d10cbc5518e4e6d5d2a8fc6a15afe3526865df26eaa95e265a3ece624b31e90_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:7541bf72daac1e784b5194b9c564fbc66831c6633aa7dd8eae3a7bd0c358c27e_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:9eab1ead869fc65a1d3e0dd482f409f954d68361be09b230aff8d399970790de_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:fb19f8197c0b403cb25287b23e19230d986f0bd45c920672dea1bf532cabe52d_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:8b475114a5f77f7c041509a30246769a5f9064510724c8fc99ac29164dc3a0bb_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:892bee6e3214a69b8924f840b69a55ac0c8d66443bf042cfa88c13766bd8dce3_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa126c3f4865a2a62cba2734110418c865aa2d32f38147c056732e53fc593715_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b9889747f06f6fe48cd1a79aaf6dcafcf6a9cdd2d2ad986fb10da3f2a51c103b_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f55014b7e95512e2dcad9ebde4d36a39e136093ed22fc3436e66cf9b34091999_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:086f08c9878414065d1ccd65caaf2609aba4d6aa9656f4a0387134ffda0b231d_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:27cd6dee034e7eaafa86c955d119b86b8454b8721131ba870a534dacae48653e_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:69a3b67246d2fe32b1a1a6d726086ebd5a5f37c1ccc3c0e0021562d83caea21a_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:a4cb517edd5c5a6bf9766e1fdbd9226ffce969000dc6a8070dba193299f467a9_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:55679b420af4e99bffa2ac83979bfaeb18fa2e88999be01dbb00b5912dad6f57_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:826d18a3ecd4df0c8a8d67844677b394d1f86f365141c08cda8ce0eda78f3132_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:d007cac747d974c476392a703abe053dcee0603dfc0836d180175a1e2180c02b_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:f5e49246468aeaf92745e513e66224698e6a280a76a129ba91f7c41fd0be1225_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:64bad8b3369eeac99384b41984e32c85e8fdee2ae32282ca2d8e4df8b9d36df5_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:74b4b594ffab3b29043c45163245df4f47aa0dea982dcac7474f09a0f6329f24_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:a97741941ab1688bec159eef3918cfceaab47263a1ff0871588cde2a16f39c27_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:c0fdf2c449051a44ffbdd7794c4fd6c3d6892ad7d1e30ec9e72c97ae34053127_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:d86d94c67d42f5ca58f0ea102f74499cbbd0abd0f0d4bab039557981c8c18363_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-bundle@sha256:76db6178b69a489a215a5aeb295530fe6dd35210d353103139b4c5a4bfc05565_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:073d670f841132b02663a58c8eca5f6dce09f3233d8d3a6d2d55de2e78374b6c_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:2837c7bcbf44311879e67be1642b3e4e3c328da0ff138ae7def975cb169f4e03_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:98918dfb471d2c25a93a31830e308d32ba84057021c4b9312346b3f534ea0ec8_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:9dd90fe106a4c25b245ef65a66d082d3addb28a06606f7a38cb12e7e35b00ce8_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:cb10c70bfb9d8dc3f7bc75506901cd84af0cd11e21883f78d651838eaa83c16c_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:f5047f7dea7825a5d0ad7323f433af0ce17fea83d1d3861372edd682584bb30e_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:f8c677a9fc5a608bc6c1848db7e3ff906ea93cb9cbc92af3d574c3158b2af668_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:fe48d48bb338329da213a0a21d2ac706b4b731593f154d554bfd420ad21a2912_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang.org/x/crypto/ssh: Misuse of ServerConfig.PublicKeyCallback may cause authorization bypass in golang.org/x/crypto"
},
{
"cve": "CVE-2024-45338",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2024-12-18T21:00:59.938173+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:4d10cbc5518e4e6d5d2a8fc6a15afe3526865df26eaa95e265a3ece624b31e90_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:7541bf72daac1e784b5194b9c564fbc66831c6633aa7dd8eae3a7bd0c358c27e_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:9eab1ead869fc65a1d3e0dd482f409f954d68361be09b230aff8d399970790de_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:fb19f8197c0b403cb25287b23e19230d986f0bd45c920672dea1bf532cabe52d_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:8b475114a5f77f7c041509a30246769a5f9064510724c8fc99ac29164dc3a0bb_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:892bee6e3214a69b8924f840b69a55ac0c8d66443bf042cfa88c13766bd8dce3_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa126c3f4865a2a62cba2734110418c865aa2d32f38147c056732e53fc593715_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b9889747f06f6fe48cd1a79aaf6dcafcf6a9cdd2d2ad986fb10da3f2a51c103b_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f55014b7e95512e2dcad9ebde4d36a39e136093ed22fc3436e66cf9b34091999_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:086f08c9878414065d1ccd65caaf2609aba4d6aa9656f4a0387134ffda0b231d_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:27cd6dee034e7eaafa86c955d119b86b8454b8721131ba870a534dacae48653e_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:69a3b67246d2fe32b1a1a6d726086ebd5a5f37c1ccc3c0e0021562d83caea21a_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:a4cb517edd5c5a6bf9766e1fdbd9226ffce969000dc6a8070dba193299f467a9_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:55679b420af4e99bffa2ac83979bfaeb18fa2e88999be01dbb00b5912dad6f57_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:826d18a3ecd4df0c8a8d67844677b394d1f86f365141c08cda8ce0eda78f3132_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:d007cac747d974c476392a703abe053dcee0603dfc0836d180175a1e2180c02b_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:f5e49246468aeaf92745e513e66224698e6a280a76a129ba91f7c41fd0be1225_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:64bad8b3369eeac99384b41984e32c85e8fdee2ae32282ca2d8e4df8b9d36df5_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:74b4b594ffab3b29043c45163245df4f47aa0dea982dcac7474f09a0f6329f24_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:a97741941ab1688bec159eef3918cfceaab47263a1ff0871588cde2a16f39c27_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:c0fdf2c449051a44ffbdd7794c4fd6c3d6892ad7d1e30ec9e72c97ae34053127_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:d86d94c67d42f5ca58f0ea102f74499cbbd0abd0f0d4bab039557981c8c18363_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-bundle@sha256:76db6178b69a489a215a5aeb295530fe6dd35210d353103139b4c5a4bfc05565_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:cb10c70bfb9d8dc3f7bc75506901cd84af0cd11e21883f78d651838eaa83c16c_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:f5047f7dea7825a5d0ad7323f433af0ce17fea83d1d3861372edd682584bb30e_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:f8c677a9fc5a608bc6c1848db7e3ff906ea93cb9cbc92af3d574c3158b2af668_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:fe48d48bb338329da213a0a21d2ac706b4b731593f154d554bfd420ad21a2912_arm64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2333122"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang.org/x/net/html. This flaw allows an attacker to craft input to the parse functions that would be processed non-linearly with respect to its length, resulting in extremely slow parsing. This issue can cause a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated as an Important severity because an attacker can craft malicious input that causes the parsing functions to process data non-linearly, resulting in significant delays which leads to a denial of service by exhausting system resources.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:073d670f841132b02663a58c8eca5f6dce09f3233d8d3a6d2d55de2e78374b6c_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:2837c7bcbf44311879e67be1642b3e4e3c328da0ff138ae7def975cb169f4e03_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:98918dfb471d2c25a93a31830e308d32ba84057021c4b9312346b3f534ea0ec8_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:9dd90fe106a4c25b245ef65a66d082d3addb28a06606f7a38cb12e7e35b00ce8_s390x"
],
"known_not_affected": [
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:4d10cbc5518e4e6d5d2a8fc6a15afe3526865df26eaa95e265a3ece624b31e90_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:7541bf72daac1e784b5194b9c564fbc66831c6633aa7dd8eae3a7bd0c358c27e_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:9eab1ead869fc65a1d3e0dd482f409f954d68361be09b230aff8d399970790de_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:fb19f8197c0b403cb25287b23e19230d986f0bd45c920672dea1bf532cabe52d_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:8b475114a5f77f7c041509a30246769a5f9064510724c8fc99ac29164dc3a0bb_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:892bee6e3214a69b8924f840b69a55ac0c8d66443bf042cfa88c13766bd8dce3_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa126c3f4865a2a62cba2734110418c865aa2d32f38147c056732e53fc593715_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b9889747f06f6fe48cd1a79aaf6dcafcf6a9cdd2d2ad986fb10da3f2a51c103b_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f55014b7e95512e2dcad9ebde4d36a39e136093ed22fc3436e66cf9b34091999_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:086f08c9878414065d1ccd65caaf2609aba4d6aa9656f4a0387134ffda0b231d_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:27cd6dee034e7eaafa86c955d119b86b8454b8721131ba870a534dacae48653e_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:69a3b67246d2fe32b1a1a6d726086ebd5a5f37c1ccc3c0e0021562d83caea21a_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:a4cb517edd5c5a6bf9766e1fdbd9226ffce969000dc6a8070dba193299f467a9_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:55679b420af4e99bffa2ac83979bfaeb18fa2e88999be01dbb00b5912dad6f57_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:826d18a3ecd4df0c8a8d67844677b394d1f86f365141c08cda8ce0eda78f3132_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:d007cac747d974c476392a703abe053dcee0603dfc0836d180175a1e2180c02b_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:f5e49246468aeaf92745e513e66224698e6a280a76a129ba91f7c41fd0be1225_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:64bad8b3369eeac99384b41984e32c85e8fdee2ae32282ca2d8e4df8b9d36df5_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:74b4b594ffab3b29043c45163245df4f47aa0dea982dcac7474f09a0f6329f24_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:a97741941ab1688bec159eef3918cfceaab47263a1ff0871588cde2a16f39c27_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:c0fdf2c449051a44ffbdd7794c4fd6c3d6892ad7d1e30ec9e72c97ae34053127_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:d86d94c67d42f5ca58f0ea102f74499cbbd0abd0f0d4bab039557981c8c18363_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-bundle@sha256:76db6178b69a489a215a5aeb295530fe6dd35210d353103139b4c5a4bfc05565_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:cb10c70bfb9d8dc3f7bc75506901cd84af0cd11e21883f78d651838eaa83c16c_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:f5047f7dea7825a5d0ad7323f433af0ce17fea83d1d3861372edd682584bb30e_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:f8c677a9fc5a608bc6c1848db7e3ff906ea93cb9cbc92af3d574c3158b2af668_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:fe48d48bb338329da213a0a21d2ac706b4b731593f154d554bfd420ad21a2912_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-45338"
},
{
"category": "external",
"summary": "RHBZ#2333122",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333122"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-45338",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45338"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-45338",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-45338"
},
{
"category": "external",
"summary": "https://go.dev/cl/637536",
"url": "https://go.dev/cl/637536"
},
{
"category": "external",
"summary": "https://go.dev/issue/70906",
"url": "https://go.dev/issue/70906"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/wSCRmFnNmPA/m/Lvcd0mRMAwAJ",
"url": "https://groups.google.com/g/golang-announce/c/wSCRmFnNmPA/m/Lvcd0mRMAwAJ"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2024-3333",
"url": "https://pkg.go.dev/vuln/GO-2024-3333"
}
],
"release_date": "2024-12-18T20:38:22.660000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-11-26T14:52:57+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:073d670f841132b02663a58c8eca5f6dce09f3233d8d3a6d2d55de2e78374b6c_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:2837c7bcbf44311879e67be1642b3e4e3c328da0ff138ae7def975cb169f4e03_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:98918dfb471d2c25a93a31830e308d32ba84057021c4b9312346b3f534ea0ec8_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:9dd90fe106a4c25b245ef65a66d082d3addb28a06606f7a38cb12e7e35b00ce8_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:22182"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:4d10cbc5518e4e6d5d2a8fc6a15afe3526865df26eaa95e265a3ece624b31e90_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:7541bf72daac1e784b5194b9c564fbc66831c6633aa7dd8eae3a7bd0c358c27e_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:9eab1ead869fc65a1d3e0dd482f409f954d68361be09b230aff8d399970790de_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:fb19f8197c0b403cb25287b23e19230d986f0bd45c920672dea1bf532cabe52d_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:8b475114a5f77f7c041509a30246769a5f9064510724c8fc99ac29164dc3a0bb_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:892bee6e3214a69b8924f840b69a55ac0c8d66443bf042cfa88c13766bd8dce3_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa126c3f4865a2a62cba2734110418c865aa2d32f38147c056732e53fc593715_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b9889747f06f6fe48cd1a79aaf6dcafcf6a9cdd2d2ad986fb10da3f2a51c103b_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f55014b7e95512e2dcad9ebde4d36a39e136093ed22fc3436e66cf9b34091999_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:086f08c9878414065d1ccd65caaf2609aba4d6aa9656f4a0387134ffda0b231d_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:27cd6dee034e7eaafa86c955d119b86b8454b8721131ba870a534dacae48653e_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:69a3b67246d2fe32b1a1a6d726086ebd5a5f37c1ccc3c0e0021562d83caea21a_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:a4cb517edd5c5a6bf9766e1fdbd9226ffce969000dc6a8070dba193299f467a9_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:55679b420af4e99bffa2ac83979bfaeb18fa2e88999be01dbb00b5912dad6f57_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:826d18a3ecd4df0c8a8d67844677b394d1f86f365141c08cda8ce0eda78f3132_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:d007cac747d974c476392a703abe053dcee0603dfc0836d180175a1e2180c02b_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:f5e49246468aeaf92745e513e66224698e6a280a76a129ba91f7c41fd0be1225_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:64bad8b3369eeac99384b41984e32c85e8fdee2ae32282ca2d8e4df8b9d36df5_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:74b4b594ffab3b29043c45163245df4f47aa0dea982dcac7474f09a0f6329f24_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:a97741941ab1688bec159eef3918cfceaab47263a1ff0871588cde2a16f39c27_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:c0fdf2c449051a44ffbdd7794c4fd6c3d6892ad7d1e30ec9e72c97ae34053127_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:d86d94c67d42f5ca58f0ea102f74499cbbd0abd0f0d4bab039557981c8c18363_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-bundle@sha256:76db6178b69a489a215a5aeb295530fe6dd35210d353103139b4c5a4bfc05565_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:073d670f841132b02663a58c8eca5f6dce09f3233d8d3a6d2d55de2e78374b6c_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:2837c7bcbf44311879e67be1642b3e4e3c328da0ff138ae7def975cb169f4e03_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:98918dfb471d2c25a93a31830e308d32ba84057021c4b9312346b3f534ea0ec8_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:9dd90fe106a4c25b245ef65a66d082d3addb28a06606f7a38cb12e7e35b00ce8_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:cb10c70bfb9d8dc3f7bc75506901cd84af0cd11e21883f78d651838eaa83c16c_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:f5047f7dea7825a5d0ad7323f433af0ce17fea83d1d3861372edd682584bb30e_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:f8c677a9fc5a608bc6c1848db7e3ff906ea93cb9cbc92af3d574c3158b2af668_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:fe48d48bb338329da213a0a21d2ac706b4b731593f154d554bfd420ad21a2912_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html"
},
{
"cve": "CVE-2025-59420",
"cwe": {
"id": "CWE-440",
"name": "Expected Behavior Violation"
},
"discovery_date": "2025-09-22T18:01:35.379361+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:4d10cbc5518e4e6d5d2a8fc6a15afe3526865df26eaa95e265a3ece624b31e90_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:7541bf72daac1e784b5194b9c564fbc66831c6633aa7dd8eae3a7bd0c358c27e_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:9eab1ead869fc65a1d3e0dd482f409f954d68361be09b230aff8d399970790de_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:fb19f8197c0b403cb25287b23e19230d986f0bd45c920672dea1bf532cabe52d_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:8b475114a5f77f7c041509a30246769a5f9064510724c8fc99ac29164dc3a0bb_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:892bee6e3214a69b8924f840b69a55ac0c8d66443bf042cfa88c13766bd8dce3_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa126c3f4865a2a62cba2734110418c865aa2d32f38147c056732e53fc593715_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b9889747f06f6fe48cd1a79aaf6dcafcf6a9cdd2d2ad986fb10da3f2a51c103b_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f55014b7e95512e2dcad9ebde4d36a39e136093ed22fc3436e66cf9b34091999_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:086f08c9878414065d1ccd65caaf2609aba4d6aa9656f4a0387134ffda0b231d_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:27cd6dee034e7eaafa86c955d119b86b8454b8721131ba870a534dacae48653e_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:69a3b67246d2fe32b1a1a6d726086ebd5a5f37c1ccc3c0e0021562d83caea21a_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:a4cb517edd5c5a6bf9766e1fdbd9226ffce969000dc6a8070dba193299f467a9_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:55679b420af4e99bffa2ac83979bfaeb18fa2e88999be01dbb00b5912dad6f57_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:826d18a3ecd4df0c8a8d67844677b394d1f86f365141c08cda8ce0eda78f3132_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:d007cac747d974c476392a703abe053dcee0603dfc0836d180175a1e2180c02b_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:f5e49246468aeaf92745e513e66224698e6a280a76a129ba91f7c41fd0be1225_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:64bad8b3369eeac99384b41984e32c85e8fdee2ae32282ca2d8e4df8b9d36df5_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:74b4b594ffab3b29043c45163245df4f47aa0dea982dcac7474f09a0f6329f24_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:a97741941ab1688bec159eef3918cfceaab47263a1ff0871588cde2a16f39c27_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:c0fdf2c449051a44ffbdd7794c4fd6c3d6892ad7d1e30ec9e72c97ae34053127_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:d86d94c67d42f5ca58f0ea102f74499cbbd0abd0f0d4bab039557981c8c18363_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-bundle@sha256:76db6178b69a489a215a5aeb295530fe6dd35210d353103139b4c5a4bfc05565_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:073d670f841132b02663a58c8eca5f6dce09f3233d8d3a6d2d55de2e78374b6c_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:2837c7bcbf44311879e67be1642b3e4e3c328da0ff138ae7def975cb169f4e03_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:98918dfb471d2c25a93a31830e308d32ba84057021c4b9312346b3f534ea0ec8_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:9dd90fe106a4c25b245ef65a66d082d3addb28a06606f7a38cb12e7e35b00ce8_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2397460"
}
],
"notes": [
{
"category": "description",
"text": "Authlib\u2019s JWS verification accepts tokens that declare unknown critical header parameters (crit), violating RFC 7515 \u201cmust\u2011understand\u201d semantics. An attacker can craft a signed token with a critical header (for example, bork or cnf) that strict verifiers reject but Authlib accepts. In mixed\u2011language fleets, this enables split\u2011brain verification and can lead to policy bypass, replay, or privilege escalation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "authlib: Authlib RFC violation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:cb10c70bfb9d8dc3f7bc75506901cd84af0cd11e21883f78d651838eaa83c16c_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:f5047f7dea7825a5d0ad7323f433af0ce17fea83d1d3861372edd682584bb30e_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:f8c677a9fc5a608bc6c1848db7e3ff906ea93cb9cbc92af3d574c3158b2af668_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:fe48d48bb338329da213a0a21d2ac706b4b731593f154d554bfd420ad21a2912_arm64"
],
"known_not_affected": [
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:4d10cbc5518e4e6d5d2a8fc6a15afe3526865df26eaa95e265a3ece624b31e90_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:7541bf72daac1e784b5194b9c564fbc66831c6633aa7dd8eae3a7bd0c358c27e_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:9eab1ead869fc65a1d3e0dd482f409f954d68361be09b230aff8d399970790de_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:fb19f8197c0b403cb25287b23e19230d986f0bd45c920672dea1bf532cabe52d_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:8b475114a5f77f7c041509a30246769a5f9064510724c8fc99ac29164dc3a0bb_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:892bee6e3214a69b8924f840b69a55ac0c8d66443bf042cfa88c13766bd8dce3_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa126c3f4865a2a62cba2734110418c865aa2d32f38147c056732e53fc593715_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b9889747f06f6fe48cd1a79aaf6dcafcf6a9cdd2d2ad986fb10da3f2a51c103b_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f55014b7e95512e2dcad9ebde4d36a39e136093ed22fc3436e66cf9b34091999_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:086f08c9878414065d1ccd65caaf2609aba4d6aa9656f4a0387134ffda0b231d_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:27cd6dee034e7eaafa86c955d119b86b8454b8721131ba870a534dacae48653e_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:69a3b67246d2fe32b1a1a6d726086ebd5a5f37c1ccc3c0e0021562d83caea21a_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:a4cb517edd5c5a6bf9766e1fdbd9226ffce969000dc6a8070dba193299f467a9_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:55679b420af4e99bffa2ac83979bfaeb18fa2e88999be01dbb00b5912dad6f57_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:826d18a3ecd4df0c8a8d67844677b394d1f86f365141c08cda8ce0eda78f3132_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:d007cac747d974c476392a703abe053dcee0603dfc0836d180175a1e2180c02b_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:f5e49246468aeaf92745e513e66224698e6a280a76a129ba91f7c41fd0be1225_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:64bad8b3369eeac99384b41984e32c85e8fdee2ae32282ca2d8e4df8b9d36df5_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:74b4b594ffab3b29043c45163245df4f47aa0dea982dcac7474f09a0f6329f24_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:a97741941ab1688bec159eef3918cfceaab47263a1ff0871588cde2a16f39c27_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:c0fdf2c449051a44ffbdd7794c4fd6c3d6892ad7d1e30ec9e72c97ae34053127_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:d86d94c67d42f5ca58f0ea102f74499cbbd0abd0f0d4bab039557981c8c18363_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-bundle@sha256:76db6178b69a489a215a5aeb295530fe6dd35210d353103139b4c5a4bfc05565_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:073d670f841132b02663a58c8eca5f6dce09f3233d8d3a6d2d55de2e78374b6c_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:2837c7bcbf44311879e67be1642b3e4e3c328da0ff138ae7def975cb169f4e03_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:98918dfb471d2c25a93a31830e308d32ba84057021c4b9312346b3f534ea0ec8_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:9dd90fe106a4c25b245ef65a66d082d3addb28a06606f7a38cb12e7e35b00ce8_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-59420"
},
{
"category": "external",
"summary": "RHBZ#2397460",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2397460"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-59420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59420"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-59420",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-59420"
},
{
"category": "external",
"summary": "https://github.com/authlib/authlib/commit/6b1813e4392eb7c168c276099ff7783b176479df",
"url": "https://github.com/authlib/authlib/commit/6b1813e4392eb7c168c276099ff7783b176479df"
},
{
"category": "external",
"summary": "https://github.com/authlib/authlib/security/advisories/GHSA-9ggr-2464-2j32",
"url": "https://github.com/authlib/authlib/security/advisories/GHSA-9ggr-2464-2j32"
}
],
"release_date": "2025-09-22T17:28:53.869000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-11-26T14:52:57+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:cb10c70bfb9d8dc3f7bc75506901cd84af0cd11e21883f78d651838eaa83c16c_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:f5047f7dea7825a5d0ad7323f433af0ce17fea83d1d3861372edd682584bb30e_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:f8c677a9fc5a608bc6c1848db7e3ff906ea93cb9cbc92af3d574c3158b2af668_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:fe48d48bb338329da213a0a21d2ac706b4b731593f154d554bfd420ad21a2912_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:22182"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:4d10cbc5518e4e6d5d2a8fc6a15afe3526865df26eaa95e265a3ece624b31e90_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:7541bf72daac1e784b5194b9c564fbc66831c6633aa7dd8eae3a7bd0c358c27e_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:9eab1ead869fc65a1d3e0dd482f409f954d68361be09b230aff8d399970790de_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:fb19f8197c0b403cb25287b23e19230d986f0bd45c920672dea1bf532cabe52d_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:8b475114a5f77f7c041509a30246769a5f9064510724c8fc99ac29164dc3a0bb_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:892bee6e3214a69b8924f840b69a55ac0c8d66443bf042cfa88c13766bd8dce3_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa126c3f4865a2a62cba2734110418c865aa2d32f38147c056732e53fc593715_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b9889747f06f6fe48cd1a79aaf6dcafcf6a9cdd2d2ad986fb10da3f2a51c103b_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f55014b7e95512e2dcad9ebde4d36a39e136093ed22fc3436e66cf9b34091999_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:086f08c9878414065d1ccd65caaf2609aba4d6aa9656f4a0387134ffda0b231d_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:27cd6dee034e7eaafa86c955d119b86b8454b8721131ba870a534dacae48653e_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:69a3b67246d2fe32b1a1a6d726086ebd5a5f37c1ccc3c0e0021562d83caea21a_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:a4cb517edd5c5a6bf9766e1fdbd9226ffce969000dc6a8070dba193299f467a9_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:55679b420af4e99bffa2ac83979bfaeb18fa2e88999be01dbb00b5912dad6f57_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:826d18a3ecd4df0c8a8d67844677b394d1f86f365141c08cda8ce0eda78f3132_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:d007cac747d974c476392a703abe053dcee0603dfc0836d180175a1e2180c02b_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:f5e49246468aeaf92745e513e66224698e6a280a76a129ba91f7c41fd0be1225_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:64bad8b3369eeac99384b41984e32c85e8fdee2ae32282ca2d8e4df8b9d36df5_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:74b4b594ffab3b29043c45163245df4f47aa0dea982dcac7474f09a0f6329f24_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:a97741941ab1688bec159eef3918cfceaab47263a1ff0871588cde2a16f39c27_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:c0fdf2c449051a44ffbdd7794c4fd6c3d6892ad7d1e30ec9e72c97ae34053127_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:d86d94c67d42f5ca58f0ea102f74499cbbd0abd0f0d4bab039557981c8c18363_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-bundle@sha256:76db6178b69a489a215a5aeb295530fe6dd35210d353103139b4c5a4bfc05565_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:073d670f841132b02663a58c8eca5f6dce09f3233d8d3a6d2d55de2e78374b6c_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:2837c7bcbf44311879e67be1642b3e4e3c328da0ff138ae7def975cb169f4e03_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:98918dfb471d2c25a93a31830e308d32ba84057021c4b9312346b3f534ea0ec8_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:9dd90fe106a4c25b245ef65a66d082d3addb28a06606f7a38cb12e7e35b00ce8_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:cb10c70bfb9d8dc3f7bc75506901cd84af0cd11e21883f78d651838eaa83c16c_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:f5047f7dea7825a5d0ad7323f433af0ce17fea83d1d3861372edd682584bb30e_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:f8c677a9fc5a608bc6c1848db7e3ff906ea93cb9cbc92af3d574c3158b2af668_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:fe48d48bb338329da213a0a21d2ac706b4b731593f154d554bfd420ad21a2912_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:4d10cbc5518e4e6d5d2a8fc6a15afe3526865df26eaa95e265a3ece624b31e90_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:7541bf72daac1e784b5194b9c564fbc66831c6633aa7dd8eae3a7bd0c358c27e_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:9eab1ead869fc65a1d3e0dd482f409f954d68361be09b230aff8d399970790de_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:fb19f8197c0b403cb25287b23e19230d986f0bd45c920672dea1bf532cabe52d_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:8b475114a5f77f7c041509a30246769a5f9064510724c8fc99ac29164dc3a0bb_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:892bee6e3214a69b8924f840b69a55ac0c8d66443bf042cfa88c13766bd8dce3_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa126c3f4865a2a62cba2734110418c865aa2d32f38147c056732e53fc593715_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b9889747f06f6fe48cd1a79aaf6dcafcf6a9cdd2d2ad986fb10da3f2a51c103b_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f55014b7e95512e2dcad9ebde4d36a39e136093ed22fc3436e66cf9b34091999_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:086f08c9878414065d1ccd65caaf2609aba4d6aa9656f4a0387134ffda0b231d_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:27cd6dee034e7eaafa86c955d119b86b8454b8721131ba870a534dacae48653e_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:69a3b67246d2fe32b1a1a6d726086ebd5a5f37c1ccc3c0e0021562d83caea21a_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:a4cb517edd5c5a6bf9766e1fdbd9226ffce969000dc6a8070dba193299f467a9_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:55679b420af4e99bffa2ac83979bfaeb18fa2e88999be01dbb00b5912dad6f57_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:826d18a3ecd4df0c8a8d67844677b394d1f86f365141c08cda8ce0eda78f3132_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:d007cac747d974c476392a703abe053dcee0603dfc0836d180175a1e2180c02b_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:f5e49246468aeaf92745e513e66224698e6a280a76a129ba91f7c41fd0be1225_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:64bad8b3369eeac99384b41984e32c85e8fdee2ae32282ca2d8e4df8b9d36df5_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:74b4b594ffab3b29043c45163245df4f47aa0dea982dcac7474f09a0f6329f24_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:a97741941ab1688bec159eef3918cfceaab47263a1ff0871588cde2a16f39c27_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:c0fdf2c449051a44ffbdd7794c4fd6c3d6892ad7d1e30ec9e72c97ae34053127_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:d86d94c67d42f5ca58f0ea102f74499cbbd0abd0f0d4bab039557981c8c18363_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-bundle@sha256:76db6178b69a489a215a5aeb295530fe6dd35210d353103139b4c5a4bfc05565_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:073d670f841132b02663a58c8eca5f6dce09f3233d8d3a6d2d55de2e78374b6c_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:2837c7bcbf44311879e67be1642b3e4e3c328da0ff138ae7def975cb169f4e03_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:98918dfb471d2c25a93a31830e308d32ba84057021c4b9312346b3f534ea0ec8_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:9dd90fe106a4c25b245ef65a66d082d3addb28a06606f7a38cb12e7e35b00ce8_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:cb10c70bfb9d8dc3f7bc75506901cd84af0cd11e21883f78d651838eaa83c16c_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:f5047f7dea7825a5d0ad7323f433af0ce17fea83d1d3861372edd682584bb30e_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:f8c677a9fc5a608bc6c1848db7e3ff906ea93cb9cbc92af3d574c3158b2af668_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:fe48d48bb338329da213a0a21d2ac706b4b731593f154d554bfd420ad21a2912_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "authlib: Authlib RFC violation"
},
{
"cve": "CVE-2025-61920",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2025-10-10T20:01:12.833962+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:4d10cbc5518e4e6d5d2a8fc6a15afe3526865df26eaa95e265a3ece624b31e90_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:7541bf72daac1e784b5194b9c564fbc66831c6633aa7dd8eae3a7bd0c358c27e_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:9eab1ead869fc65a1d3e0dd482f409f954d68361be09b230aff8d399970790de_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:fb19f8197c0b403cb25287b23e19230d986f0bd45c920672dea1bf532cabe52d_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:8b475114a5f77f7c041509a30246769a5f9064510724c8fc99ac29164dc3a0bb_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:892bee6e3214a69b8924f840b69a55ac0c8d66443bf042cfa88c13766bd8dce3_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa126c3f4865a2a62cba2734110418c865aa2d32f38147c056732e53fc593715_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b9889747f06f6fe48cd1a79aaf6dcafcf6a9cdd2d2ad986fb10da3f2a51c103b_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f55014b7e95512e2dcad9ebde4d36a39e136093ed22fc3436e66cf9b34091999_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:086f08c9878414065d1ccd65caaf2609aba4d6aa9656f4a0387134ffda0b231d_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:27cd6dee034e7eaafa86c955d119b86b8454b8721131ba870a534dacae48653e_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:69a3b67246d2fe32b1a1a6d726086ebd5a5f37c1ccc3c0e0021562d83caea21a_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:a4cb517edd5c5a6bf9766e1fdbd9226ffce969000dc6a8070dba193299f467a9_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:55679b420af4e99bffa2ac83979bfaeb18fa2e88999be01dbb00b5912dad6f57_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:826d18a3ecd4df0c8a8d67844677b394d1f86f365141c08cda8ce0eda78f3132_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:d007cac747d974c476392a703abe053dcee0603dfc0836d180175a1e2180c02b_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:f5e49246468aeaf92745e513e66224698e6a280a76a129ba91f7c41fd0be1225_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:64bad8b3369eeac99384b41984e32c85e8fdee2ae32282ca2d8e4df8b9d36df5_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:74b4b594ffab3b29043c45163245df4f47aa0dea982dcac7474f09a0f6329f24_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:a97741941ab1688bec159eef3918cfceaab47263a1ff0871588cde2a16f39c27_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:c0fdf2c449051a44ffbdd7794c4fd6c3d6892ad7d1e30ec9e72c97ae34053127_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:d86d94c67d42f5ca58f0ea102f74499cbbd0abd0f0d4bab039557981c8c18363_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-bundle@sha256:76db6178b69a489a215a5aeb295530fe6dd35210d353103139b4c5a4bfc05565_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:073d670f841132b02663a58c8eca5f6dce09f3233d8d3a6d2d55de2e78374b6c_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:2837c7bcbf44311879e67be1642b3e4e3c328da0ff138ae7def975cb169f4e03_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:98918dfb471d2c25a93a31830e308d32ba84057021c4b9312346b3f534ea0ec8_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:9dd90fe106a4c25b245ef65a66d082d3addb28a06606f7a38cb12e7e35b00ce8_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2403179"
}
],
"notes": [
{
"category": "description",
"text": "A denial of service flaw has been discovered in the python Authlib package. Authlib\u2019s JOSE implementation accepts unbounded JWS/JWT header and signature segments. A remote attacker can craft a token whose base64url\u2011encoded header or signature spans hundreds of megabytes. During verification, Authlib decodes and parses the full input before it is rejected, driving CPU and memory consumption to hostile levels and enabling denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "authlib: Authlib Denial of Service",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:cb10c70bfb9d8dc3f7bc75506901cd84af0cd11e21883f78d651838eaa83c16c_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:f5047f7dea7825a5d0ad7323f433af0ce17fea83d1d3861372edd682584bb30e_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:f8c677a9fc5a608bc6c1848db7e3ff906ea93cb9cbc92af3d574c3158b2af668_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:fe48d48bb338329da213a0a21d2ac706b4b731593f154d554bfd420ad21a2912_arm64"
],
"known_not_affected": [
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:4d10cbc5518e4e6d5d2a8fc6a15afe3526865df26eaa95e265a3ece624b31e90_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:7541bf72daac1e784b5194b9c564fbc66831c6633aa7dd8eae3a7bd0c358c27e_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:9eab1ead869fc65a1d3e0dd482f409f954d68361be09b230aff8d399970790de_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:fb19f8197c0b403cb25287b23e19230d986f0bd45c920672dea1bf532cabe52d_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:8b475114a5f77f7c041509a30246769a5f9064510724c8fc99ac29164dc3a0bb_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:892bee6e3214a69b8924f840b69a55ac0c8d66443bf042cfa88c13766bd8dce3_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa126c3f4865a2a62cba2734110418c865aa2d32f38147c056732e53fc593715_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b9889747f06f6fe48cd1a79aaf6dcafcf6a9cdd2d2ad986fb10da3f2a51c103b_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f55014b7e95512e2dcad9ebde4d36a39e136093ed22fc3436e66cf9b34091999_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:086f08c9878414065d1ccd65caaf2609aba4d6aa9656f4a0387134ffda0b231d_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:27cd6dee034e7eaafa86c955d119b86b8454b8721131ba870a534dacae48653e_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:69a3b67246d2fe32b1a1a6d726086ebd5a5f37c1ccc3c0e0021562d83caea21a_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:a4cb517edd5c5a6bf9766e1fdbd9226ffce969000dc6a8070dba193299f467a9_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:55679b420af4e99bffa2ac83979bfaeb18fa2e88999be01dbb00b5912dad6f57_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:826d18a3ecd4df0c8a8d67844677b394d1f86f365141c08cda8ce0eda78f3132_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:d007cac747d974c476392a703abe053dcee0603dfc0836d180175a1e2180c02b_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:f5e49246468aeaf92745e513e66224698e6a280a76a129ba91f7c41fd0be1225_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:64bad8b3369eeac99384b41984e32c85e8fdee2ae32282ca2d8e4df8b9d36df5_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:74b4b594ffab3b29043c45163245df4f47aa0dea982dcac7474f09a0f6329f24_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:a97741941ab1688bec159eef3918cfceaab47263a1ff0871588cde2a16f39c27_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:c0fdf2c449051a44ffbdd7794c4fd6c3d6892ad7d1e30ec9e72c97ae34053127_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:d86d94c67d42f5ca58f0ea102f74499cbbd0abd0f0d4bab039557981c8c18363_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-bundle@sha256:76db6178b69a489a215a5aeb295530fe6dd35210d353103139b4c5a4bfc05565_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:073d670f841132b02663a58c8eca5f6dce09f3233d8d3a6d2d55de2e78374b6c_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:2837c7bcbf44311879e67be1642b3e4e3c328da0ff138ae7def975cb169f4e03_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:98918dfb471d2c25a93a31830e308d32ba84057021c4b9312346b3f534ea0ec8_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:9dd90fe106a4c25b245ef65a66d082d3addb28a06606f7a38cb12e7e35b00ce8_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61920"
},
{
"category": "external",
"summary": "RHBZ#2403179",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2403179"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61920",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61920"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61920",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61920"
},
{
"category": "external",
"summary": "https://github.com/authlib/authlib/commit/867e3f87b072347a1ae9cf6983cc8bbf88447e5e",
"url": "https://github.com/authlib/authlib/commit/867e3f87b072347a1ae9cf6983cc8bbf88447e5e"
},
{
"category": "external",
"summary": "https://github.com/authlib/authlib/security/advisories/GHSA-pq5p-34cr-23v9",
"url": "https://github.com/authlib/authlib/security/advisories/GHSA-pq5p-34cr-23v9"
}
],
"release_date": "2025-10-10T19:25:07.679000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-11-26T14:52:57+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:cb10c70bfb9d8dc3f7bc75506901cd84af0cd11e21883f78d651838eaa83c16c_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:f5047f7dea7825a5d0ad7323f433af0ce17fea83d1d3861372edd682584bb30e_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:f8c677a9fc5a608bc6c1848db7e3ff906ea93cb9cbc92af3d574c3158b2af668_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:fe48d48bb338329da213a0a21d2ac706b4b731593f154d554bfd420ad21a2912_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:22182"
},
{
"category": "workaround",
"details": "Users unable to upgrade may manually enforce input size limits before handing tokens to Authlib and/or use application-level throttling to reduce amplification risk.",
"product_ids": [
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:4d10cbc5518e4e6d5d2a8fc6a15afe3526865df26eaa95e265a3ece624b31e90_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:7541bf72daac1e784b5194b9c564fbc66831c6633aa7dd8eae3a7bd0c358c27e_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:9eab1ead869fc65a1d3e0dd482f409f954d68361be09b230aff8d399970790de_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:fb19f8197c0b403cb25287b23e19230d986f0bd45c920672dea1bf532cabe52d_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:8b475114a5f77f7c041509a30246769a5f9064510724c8fc99ac29164dc3a0bb_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:892bee6e3214a69b8924f840b69a55ac0c8d66443bf042cfa88c13766bd8dce3_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa126c3f4865a2a62cba2734110418c865aa2d32f38147c056732e53fc593715_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b9889747f06f6fe48cd1a79aaf6dcafcf6a9cdd2d2ad986fb10da3f2a51c103b_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f55014b7e95512e2dcad9ebde4d36a39e136093ed22fc3436e66cf9b34091999_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:086f08c9878414065d1ccd65caaf2609aba4d6aa9656f4a0387134ffda0b231d_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:27cd6dee034e7eaafa86c955d119b86b8454b8721131ba870a534dacae48653e_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:69a3b67246d2fe32b1a1a6d726086ebd5a5f37c1ccc3c0e0021562d83caea21a_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:a4cb517edd5c5a6bf9766e1fdbd9226ffce969000dc6a8070dba193299f467a9_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:55679b420af4e99bffa2ac83979bfaeb18fa2e88999be01dbb00b5912dad6f57_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:826d18a3ecd4df0c8a8d67844677b394d1f86f365141c08cda8ce0eda78f3132_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:d007cac747d974c476392a703abe053dcee0603dfc0836d180175a1e2180c02b_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:f5e49246468aeaf92745e513e66224698e6a280a76a129ba91f7c41fd0be1225_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:64bad8b3369eeac99384b41984e32c85e8fdee2ae32282ca2d8e4df8b9d36df5_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:74b4b594ffab3b29043c45163245df4f47aa0dea982dcac7474f09a0f6329f24_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:a97741941ab1688bec159eef3918cfceaab47263a1ff0871588cde2a16f39c27_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:c0fdf2c449051a44ffbdd7794c4fd6c3d6892ad7d1e30ec9e72c97ae34053127_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:d86d94c67d42f5ca58f0ea102f74499cbbd0abd0f0d4bab039557981c8c18363_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-bundle@sha256:76db6178b69a489a215a5aeb295530fe6dd35210d353103139b4c5a4bfc05565_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:073d670f841132b02663a58c8eca5f6dce09f3233d8d3a6d2d55de2e78374b6c_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:2837c7bcbf44311879e67be1642b3e4e3c328da0ff138ae7def975cb169f4e03_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:98918dfb471d2c25a93a31830e308d32ba84057021c4b9312346b3f534ea0ec8_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:9dd90fe106a4c25b245ef65a66d082d3addb28a06606f7a38cb12e7e35b00ce8_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:cb10c70bfb9d8dc3f7bc75506901cd84af0cd11e21883f78d651838eaa83c16c_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:f5047f7dea7825a5d0ad7323f433af0ce17fea83d1d3861372edd682584bb30e_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:f8c677a9fc5a608bc6c1848db7e3ff906ea93cb9cbc92af3d574c3158b2af668_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:fe48d48bb338329da213a0a21d2ac706b4b731593f154d554bfd420ad21a2912_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:4d10cbc5518e4e6d5d2a8fc6a15afe3526865df26eaa95e265a3ece624b31e90_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:7541bf72daac1e784b5194b9c564fbc66831c6633aa7dd8eae3a7bd0c358c27e_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:9eab1ead869fc65a1d3e0dd482f409f954d68361be09b230aff8d399970790de_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:fb19f8197c0b403cb25287b23e19230d986f0bd45c920672dea1bf532cabe52d_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:8b475114a5f77f7c041509a30246769a5f9064510724c8fc99ac29164dc3a0bb_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:892bee6e3214a69b8924f840b69a55ac0c8d66443bf042cfa88c13766bd8dce3_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa126c3f4865a2a62cba2734110418c865aa2d32f38147c056732e53fc593715_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b9889747f06f6fe48cd1a79aaf6dcafcf6a9cdd2d2ad986fb10da3f2a51c103b_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f55014b7e95512e2dcad9ebde4d36a39e136093ed22fc3436e66cf9b34091999_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:086f08c9878414065d1ccd65caaf2609aba4d6aa9656f4a0387134ffda0b231d_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:27cd6dee034e7eaafa86c955d119b86b8454b8721131ba870a534dacae48653e_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:69a3b67246d2fe32b1a1a6d726086ebd5a5f37c1ccc3c0e0021562d83caea21a_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:a4cb517edd5c5a6bf9766e1fdbd9226ffce969000dc6a8070dba193299f467a9_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:55679b420af4e99bffa2ac83979bfaeb18fa2e88999be01dbb00b5912dad6f57_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:826d18a3ecd4df0c8a8d67844677b394d1f86f365141c08cda8ce0eda78f3132_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:d007cac747d974c476392a703abe053dcee0603dfc0836d180175a1e2180c02b_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:f5e49246468aeaf92745e513e66224698e6a280a76a129ba91f7c41fd0be1225_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:64bad8b3369eeac99384b41984e32c85e8fdee2ae32282ca2d8e4df8b9d36df5_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:74b4b594ffab3b29043c45163245df4f47aa0dea982dcac7474f09a0f6329f24_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:a97741941ab1688bec159eef3918cfceaab47263a1ff0871588cde2a16f39c27_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:c0fdf2c449051a44ffbdd7794c4fd6c3d6892ad7d1e30ec9e72c97ae34053127_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:d86d94c67d42f5ca58f0ea102f74499cbbd0abd0f0d4bab039557981c8c18363_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-bundle@sha256:76db6178b69a489a215a5aeb295530fe6dd35210d353103139b4c5a4bfc05565_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:073d670f841132b02663a58c8eca5f6dce09f3233d8d3a6d2d55de2e78374b6c_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:2837c7bcbf44311879e67be1642b3e4e3c328da0ff138ae7def975cb169f4e03_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:98918dfb471d2c25a93a31830e308d32ba84057021c4b9312346b3f534ea0ec8_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:9dd90fe106a4c25b245ef65a66d082d3addb28a06606f7a38cb12e7e35b00ce8_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:cb10c70bfb9d8dc3f7bc75506901cd84af0cd11e21883f78d651838eaa83c16c_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:f5047f7dea7825a5d0ad7323f433af0ce17fea83d1d3861372edd682584bb30e_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:f8c677a9fc5a608bc6c1848db7e3ff906ea93cb9cbc92af3d574c3158b2af668_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:fe48d48bb338329da213a0a21d2ac706b4b731593f154d554bfd420ad21a2912_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "authlib: Authlib Denial of Service"
}
]
}
RHSA-2025:23028
Vulnerability from csaf_redhat - Published: 2025-12-10 10:20 - Updated: 2026-03-16 06:38Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat Quay 3.12 is now available with bug fixes.",
"title": "Topic"
},
{
"category": "general",
"text": "Quay 3.12",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:23028",
"url": "https://access.redhat.com/errata/RHSA-2025:23028"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2024-34156",
"url": "https://access.redhat.com/security/cve/CVE-2024-34156"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-47913",
"url": "https://access.redhat.com/security/cve/CVE-2025-47913"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-59420",
"url": "https://access.redhat.com/security/cve/CVE-2025-59420"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61920",
"url": "https://access.redhat.com/security/cve/CVE-2025-61920"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_23028.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Quay 3.12",
"tracking": {
"current_release_date": "2026-03-16T06:38:42+00:00",
"generator": {
"date": "2026-03-16T06:38:42+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.3"
}
},
"id": "RHSA-2025:23028",
"initial_release_date": "2025-12-10T10:20:44+00:00",
"revision_history": [
{
"date": "2025-12-10T10:20:44+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-12-10T10:20:51+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-16T06:38:42+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Quay 3.12",
"product": {
"name": "Red Hat Quay 3.12",
"product_id": "Red Hat Quay 3.12",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:quay:3.12::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat Quay"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:53c387293b92691eb66ea73b1d29781cf275f01b4254c38e21620c0502987272_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:53c387293b92691eb66ea73b1d29781cf275f01b4254c38e21620c0502987272_amd64",
"product_id": "registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:53c387293b92691eb66ea73b1d29781cf275f01b4254c38e21620c0502987272_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-container-security-operator-bundle@sha256%3A53c387293b92691eb66ea73b1d29781cf275f01b4254c38e21620c0502987272?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=3.12.13-1765361593"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7814f04947e8e98d3c4870894e320b12c557976495bdf28a89b55bf061bacf79_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7814f04947e8e98d3c4870894e320b12c557976495bdf28a89b55bf061bacf79_amd64",
"product_id": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7814f04947e8e98d3c4870894e320b12c557976495bdf28a89b55bf061bacf79_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-container-security-operator-rhel8@sha256%3A7814f04947e8e98d3c4870894e320b12c557976495bdf28a89b55bf061bacf79?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=3.12.13-1765361593"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:0a978bbe91e0e0b8bab6862522f8a0aa8e974b778cc36b83f0781081621c8e23_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:0a978bbe91e0e0b8bab6862522f8a0aa8e974b778cc36b83f0781081621c8e23_amd64",
"product_id": "registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:0a978bbe91e0e0b8bab6862522f8a0aa8e974b778cc36b83f0781081621c8e23_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-bridge-operator-bundle@sha256%3A0a978bbe91e0e0b8bab6862522f8a0aa8e974b778cc36b83f0781081621c8e23?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=3.12.13-1765361593"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:ad2119941c2e8db1691a9bfee085425c7203ab00c2cdf0a6441b1102109cfd21_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:ad2119941c2e8db1691a9bfee085425c7203ab00c2cdf0a6441b1102109cfd21_amd64",
"product_id": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:ad2119941c2e8db1691a9bfee085425c7203ab00c2cdf0a6441b1102109cfd21_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-bridge-operator-rhel8@sha256%3Aad2119941c2e8db1691a9bfee085425c7203ab00c2cdf0a6441b1102109cfd21?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=3.12.13-1765361593"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:1f769259f2b91d47f4d4fbf92414903a62380a358737e7100a1166ccd8c89b85_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:1f769259f2b91d47f4d4fbf92414903a62380a358737e7100a1166ccd8c89b85_amd64",
"product_id": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:1f769259f2b91d47f4d4fbf92414903a62380a358737e7100a1166ccd8c89b85_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-builder-qemu-rhcos-rhel8@sha256%3A1f769259f2b91d47f4d4fbf92414903a62380a358737e7100a1166ccd8c89b85?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=3.14-1765361593"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:7a338bb18181535a2644bf70cae05042e1ef2af5a80e70a6cab6516e8f054896_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:7a338bb18181535a2644bf70cae05042e1ef2af5a80e70a6cab6516e8f054896_amd64",
"product_id": "registry.redhat.io/quay/quay-builder-rhel8@sha256:7a338bb18181535a2644bf70cae05042e1ef2af5a80e70a6cab6516e8f054896_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-builder-rhel8@sha256%3A7a338bb18181535a2644bf70cae05042e1ef2af5a80e70a6cab6516e8f054896?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=8.10-1765361593"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/clair-rhel8@sha256:c5cb9d3d0f970ad36005f2d376547e967e4a89574cca1cf8806bb92d05199d70_amd64",
"product": {
"name": "registry.redhat.io/quay/clair-rhel8@sha256:c5cb9d3d0f970ad36005f2d376547e967e4a89574cca1cf8806bb92d05199d70_amd64",
"product_id": "registry.redhat.io/quay/clair-rhel8@sha256:c5cb9d3d0f970ad36005f2d376547e967e4a89574cca1cf8806bb92d05199d70_amd64",
"product_identification_helper": {
"purl": "pkg:oci/clair-rhel8@sha256%3Ac5cb9d3d0f970ad36005f2d376547e967e4a89574cca1cf8806bb92d05199d70?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=v3.12.0-1765361593"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-operator-bundle@sha256:1c915a6f813564b9bf8062ea5c6a83097a8dd78a38fda0171fae9cc8d81299c7_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-operator-bundle@sha256:1c915a6f813564b9bf8062ea5c6a83097a8dd78a38fda0171fae9cc8d81299c7_amd64",
"product_id": "registry.redhat.io/quay/quay-operator-bundle@sha256:1c915a6f813564b9bf8062ea5c6a83097a8dd78a38fda0171fae9cc8d81299c7_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-operator-bundle@sha256%3A1c915a6f813564b9bf8062ea5c6a83097a8dd78a38fda0171fae9cc8d81299c7?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=3.12.13-1765361593"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:f960e1816f8babb590a55ccab9f2db1b567df749e73c70067269d32f6200bca6_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:f960e1816f8babb590a55ccab9f2db1b567df749e73c70067269d32f6200bca6_amd64",
"product_id": "registry.redhat.io/quay/quay-operator-rhel8@sha256:f960e1816f8babb590a55ccab9f2db1b567df749e73c70067269d32f6200bca6_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-operator-rhel8@sha256%3Af960e1816f8babb590a55ccab9f2db1b567df749e73c70067269d32f6200bca6?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=3.12.13-1765361593"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-rhel8@sha256:a40309477f7286b6c00381012eec8d3ececb557a4b8db38e5b4ea7f321a17c79_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-rhel8@sha256:a40309477f7286b6c00381012eec8d3ececb557a4b8db38e5b4ea7f321a17c79_amd64",
"product_id": "registry.redhat.io/quay/quay-rhel8@sha256:a40309477f7286b6c00381012eec8d3ececb557a4b8db38e5b4ea7f321a17c79_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-rhel8@sha256%3Aa40309477f7286b6c00381012eec8d3ececb557a4b8db38e5b4ea7f321a17c79?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=3.12-1765361593"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:b2a263d3cbf303d0dffb2c36ee2a4187c29902ce96ca1ded6f33b2edcc68fda9_arm64",
"product": {
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:b2a263d3cbf303d0dffb2c36ee2a4187c29902ce96ca1ded6f33b2edcc68fda9_arm64",
"product_id": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:b2a263d3cbf303d0dffb2c36ee2a4187c29902ce96ca1ded6f33b2edcc68fda9_arm64",
"product_identification_helper": {
"purl": "pkg:oci/quay-container-security-operator-rhel8@sha256%3Ab2a263d3cbf303d0dffb2c36ee2a4187c29902ce96ca1ded6f33b2edcc68fda9?arch=arm64\u0026repository_url=registry.redhat.io/quay\u0026tag=3.12.13-1765361593"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8b3684c92affc7acadcd5dc8eb80e5727081c7ecf4cc6eeafe5ecc5ea60970bb_arm64",
"product": {
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8b3684c92affc7acadcd5dc8eb80e5727081c7ecf4cc6eeafe5ecc5ea60970bb_arm64",
"product_id": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8b3684c92affc7acadcd5dc8eb80e5727081c7ecf4cc6eeafe5ecc5ea60970bb_arm64",
"product_identification_helper": {
"purl": "pkg:oci/quay-bridge-operator-rhel8@sha256%3A8b3684c92affc7acadcd5dc8eb80e5727081c7ecf4cc6eeafe5ecc5ea60970bb?arch=arm64\u0026repository_url=registry.redhat.io/quay\u0026tag=3.12.13-1765361593"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0c7a94928e8ef89aebdd9b30a47aaf0fe4dfb3a716603362b5c7d52255c4e842_arm64",
"product": {
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0c7a94928e8ef89aebdd9b30a47aaf0fe4dfb3a716603362b5c7d52255c4e842_arm64",
"product_id": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0c7a94928e8ef89aebdd9b30a47aaf0fe4dfb3a716603362b5c7d52255c4e842_arm64",
"product_identification_helper": {
"purl": "pkg:oci/quay-builder-qemu-rhcos-rhel8@sha256%3A0c7a94928e8ef89aebdd9b30a47aaf0fe4dfb3a716603362b5c7d52255c4e842?arch=arm64\u0026repository_url=registry.redhat.io/quay\u0026tag=3.14-1765361593"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:00eb13b3cccf326292589a680a964160c58f83391d0036c4ebcb34fad32b6189_arm64",
"product": {
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:00eb13b3cccf326292589a680a964160c58f83391d0036c4ebcb34fad32b6189_arm64",
"product_id": "registry.redhat.io/quay/quay-builder-rhel8@sha256:00eb13b3cccf326292589a680a964160c58f83391d0036c4ebcb34fad32b6189_arm64",
"product_identification_helper": {
"purl": "pkg:oci/quay-builder-rhel8@sha256%3A00eb13b3cccf326292589a680a964160c58f83391d0036c4ebcb34fad32b6189?arch=arm64\u0026repository_url=registry.redhat.io/quay\u0026tag=8.10-1765361593"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/clair-rhel8@sha256:11091b652f65868606c3d4d3e30a04cea7396f06f119bcd0a4cf664db2aa790e_arm64",
"product": {
"name": "registry.redhat.io/quay/clair-rhel8@sha256:11091b652f65868606c3d4d3e30a04cea7396f06f119bcd0a4cf664db2aa790e_arm64",
"product_id": "registry.redhat.io/quay/clair-rhel8@sha256:11091b652f65868606c3d4d3e30a04cea7396f06f119bcd0a4cf664db2aa790e_arm64",
"product_identification_helper": {
"purl": "pkg:oci/clair-rhel8@sha256%3A11091b652f65868606c3d4d3e30a04cea7396f06f119bcd0a4cf664db2aa790e?arch=arm64\u0026repository_url=registry.redhat.io/quay\u0026tag=v3.12.0-1765361593"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:b2e2d245c7ba3d1528e73b59bad428f023eeb17a1983d61edcf6a22db58911cf_arm64",
"product": {
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:b2e2d245c7ba3d1528e73b59bad428f023eeb17a1983d61edcf6a22db58911cf_arm64",
"product_id": "registry.redhat.io/quay/quay-operator-rhel8@sha256:b2e2d245c7ba3d1528e73b59bad428f023eeb17a1983d61edcf6a22db58911cf_arm64",
"product_identification_helper": {
"purl": "pkg:oci/quay-operator-rhel8@sha256%3Ab2e2d245c7ba3d1528e73b59bad428f023eeb17a1983d61edcf6a22db58911cf?arch=arm64\u0026repository_url=registry.redhat.io/quay\u0026tag=3.12.13-1765361593"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-rhel8@sha256:30152d31da209c034ec39b52a32063437097eec9a4fac2eaf4a4110fea97cb70_arm64",
"product": {
"name": "registry.redhat.io/quay/quay-rhel8@sha256:30152d31da209c034ec39b52a32063437097eec9a4fac2eaf4a4110fea97cb70_arm64",
"product_id": "registry.redhat.io/quay/quay-rhel8@sha256:30152d31da209c034ec39b52a32063437097eec9a4fac2eaf4a4110fea97cb70_arm64",
"product_identification_helper": {
"purl": "pkg:oci/quay-rhel8@sha256%3A30152d31da209c034ec39b52a32063437097eec9a4fac2eaf4a4110fea97cb70?arch=arm64\u0026repository_url=registry.redhat.io/quay\u0026tag=3.12-1765361593"
}
}
}
],
"category": "architecture",
"name": "arm64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:33d0912dbad0b1702fd91abf87e38910d2b983334062044c292a0cb1714187a0_ppc64le",
"product": {
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:33d0912dbad0b1702fd91abf87e38910d2b983334062044c292a0cb1714187a0_ppc64le",
"product_id": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:33d0912dbad0b1702fd91abf87e38910d2b983334062044c292a0cb1714187a0_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/quay-container-security-operator-rhel8@sha256%3A33d0912dbad0b1702fd91abf87e38910d2b983334062044c292a0cb1714187a0?arch=ppc64le\u0026repository_url=registry.redhat.io/quay\u0026tag=3.12.13-1765361593"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8d474498354d438fc9deeceb3bc89649f35d4e382e930ee721059bfeaf0f8279_ppc64le",
"product": {
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8d474498354d438fc9deeceb3bc89649f35d4e382e930ee721059bfeaf0f8279_ppc64le",
"product_id": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8d474498354d438fc9deeceb3bc89649f35d4e382e930ee721059bfeaf0f8279_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/quay-bridge-operator-rhel8@sha256%3A8d474498354d438fc9deeceb3bc89649f35d4e382e930ee721059bfeaf0f8279?arch=ppc64le\u0026repository_url=registry.redhat.io/quay\u0026tag=3.12.13-1765361593"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bd796d2de4d02f63adc767aa22b9a388b3adea40c12b0d8f158ebffabed6fee9_ppc64le",
"product": {
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bd796d2de4d02f63adc767aa22b9a388b3adea40c12b0d8f158ebffabed6fee9_ppc64le",
"product_id": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bd796d2de4d02f63adc767aa22b9a388b3adea40c12b0d8f158ebffabed6fee9_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/quay-builder-qemu-rhcos-rhel8@sha256%3Abd796d2de4d02f63adc767aa22b9a388b3adea40c12b0d8f158ebffabed6fee9?arch=ppc64le\u0026repository_url=registry.redhat.io/quay\u0026tag=3.14-1765361593"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:3facbc804376b505181c2f52f0c7a433111bcedcb5699a0fcdffd7e9a2bdfbbe_ppc64le",
"product": {
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:3facbc804376b505181c2f52f0c7a433111bcedcb5699a0fcdffd7e9a2bdfbbe_ppc64le",
"product_id": "registry.redhat.io/quay/quay-builder-rhel8@sha256:3facbc804376b505181c2f52f0c7a433111bcedcb5699a0fcdffd7e9a2bdfbbe_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/quay-builder-rhel8@sha256%3A3facbc804376b505181c2f52f0c7a433111bcedcb5699a0fcdffd7e9a2bdfbbe?arch=ppc64le\u0026repository_url=registry.redhat.io/quay\u0026tag=8.10-1765361593"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/clair-rhel8@sha256:212ceac279067567409c47acf7792e0c4d1955395f045e3b717040321dc1b88f_ppc64le",
"product": {
"name": "registry.redhat.io/quay/clair-rhel8@sha256:212ceac279067567409c47acf7792e0c4d1955395f045e3b717040321dc1b88f_ppc64le",
"product_id": "registry.redhat.io/quay/clair-rhel8@sha256:212ceac279067567409c47acf7792e0c4d1955395f045e3b717040321dc1b88f_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/clair-rhel8@sha256%3A212ceac279067567409c47acf7792e0c4d1955395f045e3b717040321dc1b88f?arch=ppc64le\u0026repository_url=registry.redhat.io/quay\u0026tag=v3.12.0-1765361593"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:37039569fe73c3975468ffb8640c42becdd9b5304fb5e54789bf59dc67c52c9b_ppc64le",
"product": {
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:37039569fe73c3975468ffb8640c42becdd9b5304fb5e54789bf59dc67c52c9b_ppc64le",
"product_id": "registry.redhat.io/quay/quay-operator-rhel8@sha256:37039569fe73c3975468ffb8640c42becdd9b5304fb5e54789bf59dc67c52c9b_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/quay-operator-rhel8@sha256%3A37039569fe73c3975468ffb8640c42becdd9b5304fb5e54789bf59dc67c52c9b?arch=ppc64le\u0026repository_url=registry.redhat.io/quay\u0026tag=3.12.13-1765361593"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-rhel8@sha256:38f094f62eed92d88eae0e7a9be410ef908bd0194b30240d49087ae76250e0ee_ppc64le",
"product": {
"name": "registry.redhat.io/quay/quay-rhel8@sha256:38f094f62eed92d88eae0e7a9be410ef908bd0194b30240d49087ae76250e0ee_ppc64le",
"product_id": "registry.redhat.io/quay/quay-rhel8@sha256:38f094f62eed92d88eae0e7a9be410ef908bd0194b30240d49087ae76250e0ee_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/quay-rhel8@sha256%3A38f094f62eed92d88eae0e7a9be410ef908bd0194b30240d49087ae76250e0ee?arch=ppc64le\u0026repository_url=registry.redhat.io/quay\u0026tag=3.12-1765361593"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:1b0a31b5f6d1e1493974efb8c7ca5112e6e4d8f0b8e1de8e55b7b8c1184b2293_s390x",
"product": {
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:1b0a31b5f6d1e1493974efb8c7ca5112e6e4d8f0b8e1de8e55b7b8c1184b2293_s390x",
"product_id": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:1b0a31b5f6d1e1493974efb8c7ca5112e6e4d8f0b8e1de8e55b7b8c1184b2293_s390x",
"product_identification_helper": {
"purl": "pkg:oci/quay-container-security-operator-rhel8@sha256%3A1b0a31b5f6d1e1493974efb8c7ca5112e6e4d8f0b8e1de8e55b7b8c1184b2293?arch=s390x\u0026repository_url=registry.redhat.io/quay\u0026tag=3.12.13-1765361593"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:cdf96fe7a1ad4c192b4313e804d40d5c656c3f0ced498bae2427e449f0b2df02_s390x",
"product": {
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:cdf96fe7a1ad4c192b4313e804d40d5c656c3f0ced498bae2427e449f0b2df02_s390x",
"product_id": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:cdf96fe7a1ad4c192b4313e804d40d5c656c3f0ced498bae2427e449f0b2df02_s390x",
"product_identification_helper": {
"purl": "pkg:oci/quay-bridge-operator-rhel8@sha256%3Acdf96fe7a1ad4c192b4313e804d40d5c656c3f0ced498bae2427e449f0b2df02?arch=s390x\u0026repository_url=registry.redhat.io/quay\u0026tag=3.12.13-1765361593"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:a71b5493009863c4f1e9ae9393ff236dc262d84ee028482ee58840fbfe392c83_s390x",
"product": {
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:a71b5493009863c4f1e9ae9393ff236dc262d84ee028482ee58840fbfe392c83_s390x",
"product_id": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:a71b5493009863c4f1e9ae9393ff236dc262d84ee028482ee58840fbfe392c83_s390x",
"product_identification_helper": {
"purl": "pkg:oci/quay-builder-qemu-rhcos-rhel8@sha256%3Aa71b5493009863c4f1e9ae9393ff236dc262d84ee028482ee58840fbfe392c83?arch=s390x\u0026repository_url=registry.redhat.io/quay\u0026tag=3.14-1765361593"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:0ca5a583ca7ff0161ed35deeae94be78adc74100d0343b778f1edf5b77e90925_s390x",
"product": {
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:0ca5a583ca7ff0161ed35deeae94be78adc74100d0343b778f1edf5b77e90925_s390x",
"product_id": "registry.redhat.io/quay/quay-builder-rhel8@sha256:0ca5a583ca7ff0161ed35deeae94be78adc74100d0343b778f1edf5b77e90925_s390x",
"product_identification_helper": {
"purl": "pkg:oci/quay-builder-rhel8@sha256%3A0ca5a583ca7ff0161ed35deeae94be78adc74100d0343b778f1edf5b77e90925?arch=s390x\u0026repository_url=registry.redhat.io/quay\u0026tag=8.10-1765361593"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/clair-rhel8@sha256:451da4b858587adcef52b5f1c9b7c92985bd7cc7c90f651b9e38825b81b38fb0_s390x",
"product": {
"name": "registry.redhat.io/quay/clair-rhel8@sha256:451da4b858587adcef52b5f1c9b7c92985bd7cc7c90f651b9e38825b81b38fb0_s390x",
"product_id": "registry.redhat.io/quay/clair-rhel8@sha256:451da4b858587adcef52b5f1c9b7c92985bd7cc7c90f651b9e38825b81b38fb0_s390x",
"product_identification_helper": {
"purl": "pkg:oci/clair-rhel8@sha256%3A451da4b858587adcef52b5f1c9b7c92985bd7cc7c90f651b9e38825b81b38fb0?arch=s390x\u0026repository_url=registry.redhat.io/quay\u0026tag=v3.12.0-1765361593"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:4e2ef7cca978574e1715c24b9874c7a0a1a46a6319884a91fe54df06efe97df1_s390x",
"product": {
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:4e2ef7cca978574e1715c24b9874c7a0a1a46a6319884a91fe54df06efe97df1_s390x",
"product_id": "registry.redhat.io/quay/quay-operator-rhel8@sha256:4e2ef7cca978574e1715c24b9874c7a0a1a46a6319884a91fe54df06efe97df1_s390x",
"product_identification_helper": {
"purl": "pkg:oci/quay-operator-rhel8@sha256%3A4e2ef7cca978574e1715c24b9874c7a0a1a46a6319884a91fe54df06efe97df1?arch=s390x\u0026repository_url=registry.redhat.io/quay\u0026tag=3.12.13-1765361593"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-rhel8@sha256:4d0a86e557e93eb8e7d70d538f181c2d33176b3537fb8d9e3a1e76a16ee2eed5_s390x",
"product": {
"name": "registry.redhat.io/quay/quay-rhel8@sha256:4d0a86e557e93eb8e7d70d538f181c2d33176b3537fb8d9e3a1e76a16ee2eed5_s390x",
"product_id": "registry.redhat.io/quay/quay-rhel8@sha256:4d0a86e557e93eb8e7d70d538f181c2d33176b3537fb8d9e3a1e76a16ee2eed5_s390x",
"product_identification_helper": {
"purl": "pkg:oci/quay-rhel8@sha256%3A4d0a86e557e93eb8e7d70d538f181c2d33176b3537fb8d9e3a1e76a16ee2eed5?arch=s390x\u0026repository_url=registry.redhat.io/quay\u0026tag=3.12-1765361593"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/clair-rhel8@sha256:11091b652f65868606c3d4d3e30a04cea7396f06f119bcd0a4cf664db2aa790e_arm64 as a component of Red Hat Quay 3.12",
"product_id": "Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:11091b652f65868606c3d4d3e30a04cea7396f06f119bcd0a4cf664db2aa790e_arm64"
},
"product_reference": "registry.redhat.io/quay/clair-rhel8@sha256:11091b652f65868606c3d4d3e30a04cea7396f06f119bcd0a4cf664db2aa790e_arm64",
"relates_to_product_reference": "Red Hat Quay 3.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/clair-rhel8@sha256:212ceac279067567409c47acf7792e0c4d1955395f045e3b717040321dc1b88f_ppc64le as a component of Red Hat Quay 3.12",
"product_id": "Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:212ceac279067567409c47acf7792e0c4d1955395f045e3b717040321dc1b88f_ppc64le"
},
"product_reference": "registry.redhat.io/quay/clair-rhel8@sha256:212ceac279067567409c47acf7792e0c4d1955395f045e3b717040321dc1b88f_ppc64le",
"relates_to_product_reference": "Red Hat Quay 3.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/clair-rhel8@sha256:451da4b858587adcef52b5f1c9b7c92985bd7cc7c90f651b9e38825b81b38fb0_s390x as a component of Red Hat Quay 3.12",
"product_id": "Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:451da4b858587adcef52b5f1c9b7c92985bd7cc7c90f651b9e38825b81b38fb0_s390x"
},
"product_reference": "registry.redhat.io/quay/clair-rhel8@sha256:451da4b858587adcef52b5f1c9b7c92985bd7cc7c90f651b9e38825b81b38fb0_s390x",
"relates_to_product_reference": "Red Hat Quay 3.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/clair-rhel8@sha256:c5cb9d3d0f970ad36005f2d376547e967e4a89574cca1cf8806bb92d05199d70_amd64 as a component of Red Hat Quay 3.12",
"product_id": "Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:c5cb9d3d0f970ad36005f2d376547e967e4a89574cca1cf8806bb92d05199d70_amd64"
},
"product_reference": "registry.redhat.io/quay/clair-rhel8@sha256:c5cb9d3d0f970ad36005f2d376547e967e4a89574cca1cf8806bb92d05199d70_amd64",
"relates_to_product_reference": "Red Hat Quay 3.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:0a978bbe91e0e0b8bab6862522f8a0aa8e974b778cc36b83f0781081621c8e23_amd64 as a component of Red Hat Quay 3.12",
"product_id": "Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:0a978bbe91e0e0b8bab6862522f8a0aa8e974b778cc36b83f0781081621c8e23_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:0a978bbe91e0e0b8bab6862522f8a0aa8e974b778cc36b83f0781081621c8e23_amd64",
"relates_to_product_reference": "Red Hat Quay 3.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8b3684c92affc7acadcd5dc8eb80e5727081c7ecf4cc6eeafe5ecc5ea60970bb_arm64 as a component of Red Hat Quay 3.12",
"product_id": "Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8b3684c92affc7acadcd5dc8eb80e5727081c7ecf4cc6eeafe5ecc5ea60970bb_arm64"
},
"product_reference": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8b3684c92affc7acadcd5dc8eb80e5727081c7ecf4cc6eeafe5ecc5ea60970bb_arm64",
"relates_to_product_reference": "Red Hat Quay 3.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8d474498354d438fc9deeceb3bc89649f35d4e382e930ee721059bfeaf0f8279_ppc64le as a component of Red Hat Quay 3.12",
"product_id": "Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8d474498354d438fc9deeceb3bc89649f35d4e382e930ee721059bfeaf0f8279_ppc64le"
},
"product_reference": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8d474498354d438fc9deeceb3bc89649f35d4e382e930ee721059bfeaf0f8279_ppc64le",
"relates_to_product_reference": "Red Hat Quay 3.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:ad2119941c2e8db1691a9bfee085425c7203ab00c2cdf0a6441b1102109cfd21_amd64 as a component of Red Hat Quay 3.12",
"product_id": "Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:ad2119941c2e8db1691a9bfee085425c7203ab00c2cdf0a6441b1102109cfd21_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:ad2119941c2e8db1691a9bfee085425c7203ab00c2cdf0a6441b1102109cfd21_amd64",
"relates_to_product_reference": "Red Hat Quay 3.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:cdf96fe7a1ad4c192b4313e804d40d5c656c3f0ced498bae2427e449f0b2df02_s390x as a component of Red Hat Quay 3.12",
"product_id": "Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:cdf96fe7a1ad4c192b4313e804d40d5c656c3f0ced498bae2427e449f0b2df02_s390x"
},
"product_reference": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:cdf96fe7a1ad4c192b4313e804d40d5c656c3f0ced498bae2427e449f0b2df02_s390x",
"relates_to_product_reference": "Red Hat Quay 3.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0c7a94928e8ef89aebdd9b30a47aaf0fe4dfb3a716603362b5c7d52255c4e842_arm64 as a component of Red Hat Quay 3.12",
"product_id": "Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0c7a94928e8ef89aebdd9b30a47aaf0fe4dfb3a716603362b5c7d52255c4e842_arm64"
},
"product_reference": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0c7a94928e8ef89aebdd9b30a47aaf0fe4dfb3a716603362b5c7d52255c4e842_arm64",
"relates_to_product_reference": "Red Hat Quay 3.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:1f769259f2b91d47f4d4fbf92414903a62380a358737e7100a1166ccd8c89b85_amd64 as a component of Red Hat Quay 3.12",
"product_id": "Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:1f769259f2b91d47f4d4fbf92414903a62380a358737e7100a1166ccd8c89b85_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:1f769259f2b91d47f4d4fbf92414903a62380a358737e7100a1166ccd8c89b85_amd64",
"relates_to_product_reference": "Red Hat Quay 3.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:a71b5493009863c4f1e9ae9393ff236dc262d84ee028482ee58840fbfe392c83_s390x as a component of Red Hat Quay 3.12",
"product_id": "Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:a71b5493009863c4f1e9ae9393ff236dc262d84ee028482ee58840fbfe392c83_s390x"
},
"product_reference": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:a71b5493009863c4f1e9ae9393ff236dc262d84ee028482ee58840fbfe392c83_s390x",
"relates_to_product_reference": "Red Hat Quay 3.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bd796d2de4d02f63adc767aa22b9a388b3adea40c12b0d8f158ebffabed6fee9_ppc64le as a component of Red Hat Quay 3.12",
"product_id": "Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bd796d2de4d02f63adc767aa22b9a388b3adea40c12b0d8f158ebffabed6fee9_ppc64le"
},
"product_reference": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bd796d2de4d02f63adc767aa22b9a388b3adea40c12b0d8f158ebffabed6fee9_ppc64le",
"relates_to_product_reference": "Red Hat Quay 3.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:00eb13b3cccf326292589a680a964160c58f83391d0036c4ebcb34fad32b6189_arm64 as a component of Red Hat Quay 3.12",
"product_id": "Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:00eb13b3cccf326292589a680a964160c58f83391d0036c4ebcb34fad32b6189_arm64"
},
"product_reference": "registry.redhat.io/quay/quay-builder-rhel8@sha256:00eb13b3cccf326292589a680a964160c58f83391d0036c4ebcb34fad32b6189_arm64",
"relates_to_product_reference": "Red Hat Quay 3.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:0ca5a583ca7ff0161ed35deeae94be78adc74100d0343b778f1edf5b77e90925_s390x as a component of Red Hat Quay 3.12",
"product_id": "Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:0ca5a583ca7ff0161ed35deeae94be78adc74100d0343b778f1edf5b77e90925_s390x"
},
"product_reference": "registry.redhat.io/quay/quay-builder-rhel8@sha256:0ca5a583ca7ff0161ed35deeae94be78adc74100d0343b778f1edf5b77e90925_s390x",
"relates_to_product_reference": "Red Hat Quay 3.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:3facbc804376b505181c2f52f0c7a433111bcedcb5699a0fcdffd7e9a2bdfbbe_ppc64le as a component of Red Hat Quay 3.12",
"product_id": "Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:3facbc804376b505181c2f52f0c7a433111bcedcb5699a0fcdffd7e9a2bdfbbe_ppc64le"
},
"product_reference": "registry.redhat.io/quay/quay-builder-rhel8@sha256:3facbc804376b505181c2f52f0c7a433111bcedcb5699a0fcdffd7e9a2bdfbbe_ppc64le",
"relates_to_product_reference": "Red Hat Quay 3.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:7a338bb18181535a2644bf70cae05042e1ef2af5a80e70a6cab6516e8f054896_amd64 as a component of Red Hat Quay 3.12",
"product_id": "Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:7a338bb18181535a2644bf70cae05042e1ef2af5a80e70a6cab6516e8f054896_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-builder-rhel8@sha256:7a338bb18181535a2644bf70cae05042e1ef2af5a80e70a6cab6516e8f054896_amd64",
"relates_to_product_reference": "Red Hat Quay 3.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:53c387293b92691eb66ea73b1d29781cf275f01b4254c38e21620c0502987272_amd64 as a component of Red Hat Quay 3.12",
"product_id": "Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:53c387293b92691eb66ea73b1d29781cf275f01b4254c38e21620c0502987272_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:53c387293b92691eb66ea73b1d29781cf275f01b4254c38e21620c0502987272_amd64",
"relates_to_product_reference": "Red Hat Quay 3.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:1b0a31b5f6d1e1493974efb8c7ca5112e6e4d8f0b8e1de8e55b7b8c1184b2293_s390x as a component of Red Hat Quay 3.12",
"product_id": "Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:1b0a31b5f6d1e1493974efb8c7ca5112e6e4d8f0b8e1de8e55b7b8c1184b2293_s390x"
},
"product_reference": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:1b0a31b5f6d1e1493974efb8c7ca5112e6e4d8f0b8e1de8e55b7b8c1184b2293_s390x",
"relates_to_product_reference": "Red Hat Quay 3.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:33d0912dbad0b1702fd91abf87e38910d2b983334062044c292a0cb1714187a0_ppc64le as a component of Red Hat Quay 3.12",
"product_id": "Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:33d0912dbad0b1702fd91abf87e38910d2b983334062044c292a0cb1714187a0_ppc64le"
},
"product_reference": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:33d0912dbad0b1702fd91abf87e38910d2b983334062044c292a0cb1714187a0_ppc64le",
"relates_to_product_reference": "Red Hat Quay 3.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7814f04947e8e98d3c4870894e320b12c557976495bdf28a89b55bf061bacf79_amd64 as a component of Red Hat Quay 3.12",
"product_id": "Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7814f04947e8e98d3c4870894e320b12c557976495bdf28a89b55bf061bacf79_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7814f04947e8e98d3c4870894e320b12c557976495bdf28a89b55bf061bacf79_amd64",
"relates_to_product_reference": "Red Hat Quay 3.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:b2a263d3cbf303d0dffb2c36ee2a4187c29902ce96ca1ded6f33b2edcc68fda9_arm64 as a component of Red Hat Quay 3.12",
"product_id": "Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:b2a263d3cbf303d0dffb2c36ee2a4187c29902ce96ca1ded6f33b2edcc68fda9_arm64"
},
"product_reference": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:b2a263d3cbf303d0dffb2c36ee2a4187c29902ce96ca1ded6f33b2edcc68fda9_arm64",
"relates_to_product_reference": "Red Hat Quay 3.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-operator-bundle@sha256:1c915a6f813564b9bf8062ea5c6a83097a8dd78a38fda0171fae9cc8d81299c7_amd64 as a component of Red Hat Quay 3.12",
"product_id": "Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-bundle@sha256:1c915a6f813564b9bf8062ea5c6a83097a8dd78a38fda0171fae9cc8d81299c7_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-operator-bundle@sha256:1c915a6f813564b9bf8062ea5c6a83097a8dd78a38fda0171fae9cc8d81299c7_amd64",
"relates_to_product_reference": "Red Hat Quay 3.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:37039569fe73c3975468ffb8640c42becdd9b5304fb5e54789bf59dc67c52c9b_ppc64le as a component of Red Hat Quay 3.12",
"product_id": "Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:37039569fe73c3975468ffb8640c42becdd9b5304fb5e54789bf59dc67c52c9b_ppc64le"
},
"product_reference": "registry.redhat.io/quay/quay-operator-rhel8@sha256:37039569fe73c3975468ffb8640c42becdd9b5304fb5e54789bf59dc67c52c9b_ppc64le",
"relates_to_product_reference": "Red Hat Quay 3.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:4e2ef7cca978574e1715c24b9874c7a0a1a46a6319884a91fe54df06efe97df1_s390x as a component of Red Hat Quay 3.12",
"product_id": "Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:4e2ef7cca978574e1715c24b9874c7a0a1a46a6319884a91fe54df06efe97df1_s390x"
},
"product_reference": "registry.redhat.io/quay/quay-operator-rhel8@sha256:4e2ef7cca978574e1715c24b9874c7a0a1a46a6319884a91fe54df06efe97df1_s390x",
"relates_to_product_reference": "Red Hat Quay 3.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:b2e2d245c7ba3d1528e73b59bad428f023eeb17a1983d61edcf6a22db58911cf_arm64 as a component of Red Hat Quay 3.12",
"product_id": "Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:b2e2d245c7ba3d1528e73b59bad428f023eeb17a1983d61edcf6a22db58911cf_arm64"
},
"product_reference": "registry.redhat.io/quay/quay-operator-rhel8@sha256:b2e2d245c7ba3d1528e73b59bad428f023eeb17a1983d61edcf6a22db58911cf_arm64",
"relates_to_product_reference": "Red Hat Quay 3.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:f960e1816f8babb590a55ccab9f2db1b567df749e73c70067269d32f6200bca6_amd64 as a component of Red Hat Quay 3.12",
"product_id": "Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:f960e1816f8babb590a55ccab9f2db1b567df749e73c70067269d32f6200bca6_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-operator-rhel8@sha256:f960e1816f8babb590a55ccab9f2db1b567df749e73c70067269d32f6200bca6_amd64",
"relates_to_product_reference": "Red Hat Quay 3.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-rhel8@sha256:30152d31da209c034ec39b52a32063437097eec9a4fac2eaf4a4110fea97cb70_arm64 as a component of Red Hat Quay 3.12",
"product_id": "Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:30152d31da209c034ec39b52a32063437097eec9a4fac2eaf4a4110fea97cb70_arm64"
},
"product_reference": "registry.redhat.io/quay/quay-rhel8@sha256:30152d31da209c034ec39b52a32063437097eec9a4fac2eaf4a4110fea97cb70_arm64",
"relates_to_product_reference": "Red Hat Quay 3.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-rhel8@sha256:38f094f62eed92d88eae0e7a9be410ef908bd0194b30240d49087ae76250e0ee_ppc64le as a component of Red Hat Quay 3.12",
"product_id": "Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:38f094f62eed92d88eae0e7a9be410ef908bd0194b30240d49087ae76250e0ee_ppc64le"
},
"product_reference": "registry.redhat.io/quay/quay-rhel8@sha256:38f094f62eed92d88eae0e7a9be410ef908bd0194b30240d49087ae76250e0ee_ppc64le",
"relates_to_product_reference": "Red Hat Quay 3.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-rhel8@sha256:4d0a86e557e93eb8e7d70d538f181c2d33176b3537fb8d9e3a1e76a16ee2eed5_s390x as a component of Red Hat Quay 3.12",
"product_id": "Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:4d0a86e557e93eb8e7d70d538f181c2d33176b3537fb8d9e3a1e76a16ee2eed5_s390x"
},
"product_reference": "registry.redhat.io/quay/quay-rhel8@sha256:4d0a86e557e93eb8e7d70d538f181c2d33176b3537fb8d9e3a1e76a16ee2eed5_s390x",
"relates_to_product_reference": "Red Hat Quay 3.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-rhel8@sha256:a40309477f7286b6c00381012eec8d3ececb557a4b8db38e5b4ea7f321a17c79_amd64 as a component of Red Hat Quay 3.12",
"product_id": "Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:a40309477f7286b6c00381012eec8d3ececb557a4b8db38e5b4ea7f321a17c79_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-rhel8@sha256:a40309477f7286b6c00381012eec8d3ececb557a4b8db38e5b4ea7f321a17c79_amd64",
"relates_to_product_reference": "Red Hat Quay 3.12"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-34156",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"discovery_date": "2024-09-06T21:20:09.377905+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:11091b652f65868606c3d4d3e30a04cea7396f06f119bcd0a4cf664db2aa790e_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:212ceac279067567409c47acf7792e0c4d1955395f045e3b717040321dc1b88f_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:451da4b858587adcef52b5f1c9b7c92985bd7cc7c90f651b9e38825b81b38fb0_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:c5cb9d3d0f970ad36005f2d376547e967e4a89574cca1cf8806bb92d05199d70_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:0a978bbe91e0e0b8bab6862522f8a0aa8e974b778cc36b83f0781081621c8e23_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8b3684c92affc7acadcd5dc8eb80e5727081c7ecf4cc6eeafe5ecc5ea60970bb_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8d474498354d438fc9deeceb3bc89649f35d4e382e930ee721059bfeaf0f8279_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:ad2119941c2e8db1691a9bfee085425c7203ab00c2cdf0a6441b1102109cfd21_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:cdf96fe7a1ad4c192b4313e804d40d5c656c3f0ced498bae2427e449f0b2df02_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0c7a94928e8ef89aebdd9b30a47aaf0fe4dfb3a716603362b5c7d52255c4e842_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:1f769259f2b91d47f4d4fbf92414903a62380a358737e7100a1166ccd8c89b85_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:a71b5493009863c4f1e9ae9393ff236dc262d84ee028482ee58840fbfe392c83_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bd796d2de4d02f63adc767aa22b9a388b3adea40c12b0d8f158ebffabed6fee9_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:00eb13b3cccf326292589a680a964160c58f83391d0036c4ebcb34fad32b6189_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:0ca5a583ca7ff0161ed35deeae94be78adc74100d0343b778f1edf5b77e90925_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:3facbc804376b505181c2f52f0c7a433111bcedcb5699a0fcdffd7e9a2bdfbbe_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:7a338bb18181535a2644bf70cae05042e1ef2af5a80e70a6cab6516e8f054896_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:53c387293b92691eb66ea73b1d29781cf275f01b4254c38e21620c0502987272_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-bundle@sha256:1c915a6f813564b9bf8062ea5c6a83097a8dd78a38fda0171fae9cc8d81299c7_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:37039569fe73c3975468ffb8640c42becdd9b5304fb5e54789bf59dc67c52c9b_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:4e2ef7cca978574e1715c24b9874c7a0a1a46a6319884a91fe54df06efe97df1_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:b2e2d245c7ba3d1528e73b59bad428f023eeb17a1983d61edcf6a22db58911cf_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:f960e1816f8babb590a55ccab9f2db1b567df749e73c70067269d32f6200bca6_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:30152d31da209c034ec39b52a32063437097eec9a4fac2eaf4a4110fea97cb70_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:38f094f62eed92d88eae0e7a9be410ef908bd0194b30240d49087ae76250e0ee_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:4d0a86e557e93eb8e7d70d538f181c2d33176b3537fb8d9e3a1e76a16ee2eed5_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:a40309477f7286b6c00381012eec8d3ececb557a4b8db38e5b4ea7f321a17c79_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2310528"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the encoding/gob package of the Golang standard library. Calling Decoder.Decoding, a message that contains deeply nested structures, can cause a panic due to stack exhaustion. This is a follow-up to CVE-2022-30635.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability in Go\u0027s `encoding/gob` package is of high severity because it exposes applications to potential Denial of Service (DoS) attacks through stack exhaustion. Since `gob` relies on recursive function calls to decode nested structures, an attacker could exploit this by sending crafted messages with excessively deep nesting, causing the application to panic due to stack overflow. This risk is particularly important in scenarios where untrusted or external input is processed, as it can lead to system unavailability or crashes, undermining the reliability and availability of services.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:1b0a31b5f6d1e1493974efb8c7ca5112e6e4d8f0b8e1de8e55b7b8c1184b2293_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:33d0912dbad0b1702fd91abf87e38910d2b983334062044c292a0cb1714187a0_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7814f04947e8e98d3c4870894e320b12c557976495bdf28a89b55bf061bacf79_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:b2a263d3cbf303d0dffb2c36ee2a4187c29902ce96ca1ded6f33b2edcc68fda9_arm64"
],
"known_not_affected": [
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:11091b652f65868606c3d4d3e30a04cea7396f06f119bcd0a4cf664db2aa790e_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:212ceac279067567409c47acf7792e0c4d1955395f045e3b717040321dc1b88f_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:451da4b858587adcef52b5f1c9b7c92985bd7cc7c90f651b9e38825b81b38fb0_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:c5cb9d3d0f970ad36005f2d376547e967e4a89574cca1cf8806bb92d05199d70_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:0a978bbe91e0e0b8bab6862522f8a0aa8e974b778cc36b83f0781081621c8e23_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8b3684c92affc7acadcd5dc8eb80e5727081c7ecf4cc6eeafe5ecc5ea60970bb_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8d474498354d438fc9deeceb3bc89649f35d4e382e930ee721059bfeaf0f8279_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:ad2119941c2e8db1691a9bfee085425c7203ab00c2cdf0a6441b1102109cfd21_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:cdf96fe7a1ad4c192b4313e804d40d5c656c3f0ced498bae2427e449f0b2df02_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0c7a94928e8ef89aebdd9b30a47aaf0fe4dfb3a716603362b5c7d52255c4e842_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:1f769259f2b91d47f4d4fbf92414903a62380a358737e7100a1166ccd8c89b85_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:a71b5493009863c4f1e9ae9393ff236dc262d84ee028482ee58840fbfe392c83_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bd796d2de4d02f63adc767aa22b9a388b3adea40c12b0d8f158ebffabed6fee9_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:00eb13b3cccf326292589a680a964160c58f83391d0036c4ebcb34fad32b6189_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:0ca5a583ca7ff0161ed35deeae94be78adc74100d0343b778f1edf5b77e90925_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:3facbc804376b505181c2f52f0c7a433111bcedcb5699a0fcdffd7e9a2bdfbbe_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:7a338bb18181535a2644bf70cae05042e1ef2af5a80e70a6cab6516e8f054896_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:53c387293b92691eb66ea73b1d29781cf275f01b4254c38e21620c0502987272_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-bundle@sha256:1c915a6f813564b9bf8062ea5c6a83097a8dd78a38fda0171fae9cc8d81299c7_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:37039569fe73c3975468ffb8640c42becdd9b5304fb5e54789bf59dc67c52c9b_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:4e2ef7cca978574e1715c24b9874c7a0a1a46a6319884a91fe54df06efe97df1_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:b2e2d245c7ba3d1528e73b59bad428f023eeb17a1983d61edcf6a22db58911cf_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:f960e1816f8babb590a55ccab9f2db1b567df749e73c70067269d32f6200bca6_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:30152d31da209c034ec39b52a32063437097eec9a4fac2eaf4a4110fea97cb70_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:38f094f62eed92d88eae0e7a9be410ef908bd0194b30240d49087ae76250e0ee_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:4d0a86e557e93eb8e7d70d538f181c2d33176b3537fb8d9e3a1e76a16ee2eed5_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:a40309477f7286b6c00381012eec8d3ececb557a4b8db38e5b4ea7f321a17c79_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-34156"
},
{
"category": "external",
"summary": "RHBZ#2310528",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2310528"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-34156",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34156"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-34156",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-34156"
},
{
"category": "external",
"summary": "https://go.dev/cl/611239",
"url": "https://go.dev/cl/611239"
},
{
"category": "external",
"summary": "https://go.dev/issue/69139",
"url": "https://go.dev/issue/69139"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-dev/c/S9POB9NCTdk",
"url": "https://groups.google.com/g/golang-dev/c/S9POB9NCTdk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2024-3106",
"url": "https://pkg.go.dev/vuln/GO-2024-3106"
}
],
"release_date": "2024-09-06T21:15:12.020000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-12-10T10:20:44+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:1b0a31b5f6d1e1493974efb8c7ca5112e6e4d8f0b8e1de8e55b7b8c1184b2293_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:33d0912dbad0b1702fd91abf87e38910d2b983334062044c292a0cb1714187a0_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7814f04947e8e98d3c4870894e320b12c557976495bdf28a89b55bf061bacf79_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:b2a263d3cbf303d0dffb2c36ee2a4187c29902ce96ca1ded6f33b2edcc68fda9_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:23028"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:11091b652f65868606c3d4d3e30a04cea7396f06f119bcd0a4cf664db2aa790e_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:212ceac279067567409c47acf7792e0c4d1955395f045e3b717040321dc1b88f_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:451da4b858587adcef52b5f1c9b7c92985bd7cc7c90f651b9e38825b81b38fb0_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:c5cb9d3d0f970ad36005f2d376547e967e4a89574cca1cf8806bb92d05199d70_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:0a978bbe91e0e0b8bab6862522f8a0aa8e974b778cc36b83f0781081621c8e23_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8b3684c92affc7acadcd5dc8eb80e5727081c7ecf4cc6eeafe5ecc5ea60970bb_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8d474498354d438fc9deeceb3bc89649f35d4e382e930ee721059bfeaf0f8279_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:ad2119941c2e8db1691a9bfee085425c7203ab00c2cdf0a6441b1102109cfd21_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:cdf96fe7a1ad4c192b4313e804d40d5c656c3f0ced498bae2427e449f0b2df02_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0c7a94928e8ef89aebdd9b30a47aaf0fe4dfb3a716603362b5c7d52255c4e842_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:1f769259f2b91d47f4d4fbf92414903a62380a358737e7100a1166ccd8c89b85_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:a71b5493009863c4f1e9ae9393ff236dc262d84ee028482ee58840fbfe392c83_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bd796d2de4d02f63adc767aa22b9a388b3adea40c12b0d8f158ebffabed6fee9_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:00eb13b3cccf326292589a680a964160c58f83391d0036c4ebcb34fad32b6189_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:0ca5a583ca7ff0161ed35deeae94be78adc74100d0343b778f1edf5b77e90925_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:3facbc804376b505181c2f52f0c7a433111bcedcb5699a0fcdffd7e9a2bdfbbe_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:7a338bb18181535a2644bf70cae05042e1ef2af5a80e70a6cab6516e8f054896_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:53c387293b92691eb66ea73b1d29781cf275f01b4254c38e21620c0502987272_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:1b0a31b5f6d1e1493974efb8c7ca5112e6e4d8f0b8e1de8e55b7b8c1184b2293_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:33d0912dbad0b1702fd91abf87e38910d2b983334062044c292a0cb1714187a0_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7814f04947e8e98d3c4870894e320b12c557976495bdf28a89b55bf061bacf79_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:b2a263d3cbf303d0dffb2c36ee2a4187c29902ce96ca1ded6f33b2edcc68fda9_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-bundle@sha256:1c915a6f813564b9bf8062ea5c6a83097a8dd78a38fda0171fae9cc8d81299c7_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:37039569fe73c3975468ffb8640c42becdd9b5304fb5e54789bf59dc67c52c9b_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:4e2ef7cca978574e1715c24b9874c7a0a1a46a6319884a91fe54df06efe97df1_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:b2e2d245c7ba3d1528e73b59bad428f023eeb17a1983d61edcf6a22db58911cf_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:f960e1816f8babb590a55ccab9f2db1b567df749e73c70067269d32f6200bca6_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:30152d31da209c034ec39b52a32063437097eec9a4fac2eaf4a4110fea97cb70_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:38f094f62eed92d88eae0e7a9be410ef908bd0194b30240d49087ae76250e0ee_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:4d0a86e557e93eb8e7d70d538f181c2d33176b3537fb8d9e3a1e76a16ee2eed5_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:a40309477f7286b6c00381012eec8d3ececb557a4b8db38e5b4ea7f321a17c79_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:11091b652f65868606c3d4d3e30a04cea7396f06f119bcd0a4cf664db2aa790e_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:212ceac279067567409c47acf7792e0c4d1955395f045e3b717040321dc1b88f_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:451da4b858587adcef52b5f1c9b7c92985bd7cc7c90f651b9e38825b81b38fb0_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:c5cb9d3d0f970ad36005f2d376547e967e4a89574cca1cf8806bb92d05199d70_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:0a978bbe91e0e0b8bab6862522f8a0aa8e974b778cc36b83f0781081621c8e23_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8b3684c92affc7acadcd5dc8eb80e5727081c7ecf4cc6eeafe5ecc5ea60970bb_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8d474498354d438fc9deeceb3bc89649f35d4e382e930ee721059bfeaf0f8279_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:ad2119941c2e8db1691a9bfee085425c7203ab00c2cdf0a6441b1102109cfd21_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:cdf96fe7a1ad4c192b4313e804d40d5c656c3f0ced498bae2427e449f0b2df02_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0c7a94928e8ef89aebdd9b30a47aaf0fe4dfb3a716603362b5c7d52255c4e842_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:1f769259f2b91d47f4d4fbf92414903a62380a358737e7100a1166ccd8c89b85_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:a71b5493009863c4f1e9ae9393ff236dc262d84ee028482ee58840fbfe392c83_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bd796d2de4d02f63adc767aa22b9a388b3adea40c12b0d8f158ebffabed6fee9_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:00eb13b3cccf326292589a680a964160c58f83391d0036c4ebcb34fad32b6189_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:0ca5a583ca7ff0161ed35deeae94be78adc74100d0343b778f1edf5b77e90925_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:3facbc804376b505181c2f52f0c7a433111bcedcb5699a0fcdffd7e9a2bdfbbe_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:7a338bb18181535a2644bf70cae05042e1ef2af5a80e70a6cab6516e8f054896_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:53c387293b92691eb66ea73b1d29781cf275f01b4254c38e21620c0502987272_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:1b0a31b5f6d1e1493974efb8c7ca5112e6e4d8f0b8e1de8e55b7b8c1184b2293_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:33d0912dbad0b1702fd91abf87e38910d2b983334062044c292a0cb1714187a0_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7814f04947e8e98d3c4870894e320b12c557976495bdf28a89b55bf061bacf79_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:b2a263d3cbf303d0dffb2c36ee2a4187c29902ce96ca1ded6f33b2edcc68fda9_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-bundle@sha256:1c915a6f813564b9bf8062ea5c6a83097a8dd78a38fda0171fae9cc8d81299c7_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:37039569fe73c3975468ffb8640c42becdd9b5304fb5e54789bf59dc67c52c9b_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:4e2ef7cca978574e1715c24b9874c7a0a1a46a6319884a91fe54df06efe97df1_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:b2e2d245c7ba3d1528e73b59bad428f023eeb17a1983d61edcf6a22db58911cf_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:f960e1816f8babb590a55ccab9f2db1b567df749e73c70067269d32f6200bca6_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:30152d31da209c034ec39b52a32063437097eec9a4fac2eaf4a4110fea97cb70_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:38f094f62eed92d88eae0e7a9be410ef908bd0194b30240d49087ae76250e0ee_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:4d0a86e557e93eb8e7d70d538f181c2d33176b3537fb8d9e3a1e76a16ee2eed5_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:a40309477f7286b6c00381012eec8d3ececb557a4b8db38e5b4ea7f321a17c79_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion"
},
{
"cve": "CVE-2025-47913",
"discovery_date": "2025-11-13T22:01:26.092452+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:11091b652f65868606c3d4d3e30a04cea7396f06f119bcd0a4cf664db2aa790e_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:212ceac279067567409c47acf7792e0c4d1955395f045e3b717040321dc1b88f_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:451da4b858587adcef52b5f1c9b7c92985bd7cc7c90f651b9e38825b81b38fb0_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:c5cb9d3d0f970ad36005f2d376547e967e4a89574cca1cf8806bb92d05199d70_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:0a978bbe91e0e0b8bab6862522f8a0aa8e974b778cc36b83f0781081621c8e23_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8b3684c92affc7acadcd5dc8eb80e5727081c7ecf4cc6eeafe5ecc5ea60970bb_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8d474498354d438fc9deeceb3bc89649f35d4e382e930ee721059bfeaf0f8279_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:ad2119941c2e8db1691a9bfee085425c7203ab00c2cdf0a6441b1102109cfd21_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:cdf96fe7a1ad4c192b4313e804d40d5c656c3f0ced498bae2427e449f0b2df02_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0c7a94928e8ef89aebdd9b30a47aaf0fe4dfb3a716603362b5c7d52255c4e842_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:1f769259f2b91d47f4d4fbf92414903a62380a358737e7100a1166ccd8c89b85_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:a71b5493009863c4f1e9ae9393ff236dc262d84ee028482ee58840fbfe392c83_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bd796d2de4d02f63adc767aa22b9a388b3adea40c12b0d8f158ebffabed6fee9_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:53c387293b92691eb66ea73b1d29781cf275f01b4254c38e21620c0502987272_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:1b0a31b5f6d1e1493974efb8c7ca5112e6e4d8f0b8e1de8e55b7b8c1184b2293_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:33d0912dbad0b1702fd91abf87e38910d2b983334062044c292a0cb1714187a0_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7814f04947e8e98d3c4870894e320b12c557976495bdf28a89b55bf061bacf79_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:b2a263d3cbf303d0dffb2c36ee2a4187c29902ce96ca1ded6f33b2edcc68fda9_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-bundle@sha256:1c915a6f813564b9bf8062ea5c6a83097a8dd78a38fda0171fae9cc8d81299c7_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:37039569fe73c3975468ffb8640c42becdd9b5304fb5e54789bf59dc67c52c9b_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:4e2ef7cca978574e1715c24b9874c7a0a1a46a6319884a91fe54df06efe97df1_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:b2e2d245c7ba3d1528e73b59bad428f023eeb17a1983d61edcf6a22db58911cf_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:f960e1816f8babb590a55ccab9f2db1b567df749e73c70067269d32f6200bca6_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:30152d31da209c034ec39b52a32063437097eec9a4fac2eaf4a4110fea97cb70_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:38f094f62eed92d88eae0e7a9be410ef908bd0194b30240d49087ae76250e0ee_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:4d0a86e557e93eb8e7d70d538f181c2d33176b3537fb8d9e3a1e76a16ee2eed5_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:a40309477f7286b6c00381012eec8d3ececb557a4b8db38e5b4ea7f321a17c79_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2414943"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in golang.org/x/crypto/ssh/agent causes the SSH agent client to panic when a peer responds with the generic SSH_AGENT_SUCCESS (0x06) message to requests expecting typed replies (e.g., List, Sign). The unmarshal layer produces an unexpected message type, which the client code does not handle, leading to panic(\"unreachable\") or a nil-pointer dereference. A malicious agent or forwarded connection can exploit this to terminate the client process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang.org/x/crypto/ssh/agent: golang.org/x/crypto/ssh/agent: SSH client panic due to unexpected SSH_AGENT_SUCCESS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability was marked as Important because it allows any malicious or misbehaving SSH agent to force a crash in the client process using a single valid protocol byte. The panic occurs before the client has a chance to validate message structure or recover, which means an attacker controlling\u2014or intercepting\u2014SSH agent traffic can reliably terminate processes that rely on agent interactions. In environments where SSH agents operate over forwarded sockets, shared workspaces, or CI/CD runners, this turns into a reliable, unauthenticated remote denial of service against critical automation or developer tooling. The flaw also stems from unsafe assumptions in the unmarshalling logic, where unexpected but protocol-legal message types drop into \u201cunreachable\u201d code paths instead of being handled gracefully\u2014making it a design-level reliability break rather than a simple error-handling bug. For this reason, it is rated as an important availability-impacting vulnerability rather than a moderate issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:00eb13b3cccf326292589a680a964160c58f83391d0036c4ebcb34fad32b6189_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:0ca5a583ca7ff0161ed35deeae94be78adc74100d0343b778f1edf5b77e90925_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:3facbc804376b505181c2f52f0c7a433111bcedcb5699a0fcdffd7e9a2bdfbbe_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:7a338bb18181535a2644bf70cae05042e1ef2af5a80e70a6cab6516e8f054896_amd64"
],
"known_not_affected": [
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:11091b652f65868606c3d4d3e30a04cea7396f06f119bcd0a4cf664db2aa790e_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:212ceac279067567409c47acf7792e0c4d1955395f045e3b717040321dc1b88f_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:451da4b858587adcef52b5f1c9b7c92985bd7cc7c90f651b9e38825b81b38fb0_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:c5cb9d3d0f970ad36005f2d376547e967e4a89574cca1cf8806bb92d05199d70_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:0a978bbe91e0e0b8bab6862522f8a0aa8e974b778cc36b83f0781081621c8e23_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8b3684c92affc7acadcd5dc8eb80e5727081c7ecf4cc6eeafe5ecc5ea60970bb_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8d474498354d438fc9deeceb3bc89649f35d4e382e930ee721059bfeaf0f8279_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:ad2119941c2e8db1691a9bfee085425c7203ab00c2cdf0a6441b1102109cfd21_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:cdf96fe7a1ad4c192b4313e804d40d5c656c3f0ced498bae2427e449f0b2df02_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0c7a94928e8ef89aebdd9b30a47aaf0fe4dfb3a716603362b5c7d52255c4e842_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:1f769259f2b91d47f4d4fbf92414903a62380a358737e7100a1166ccd8c89b85_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:a71b5493009863c4f1e9ae9393ff236dc262d84ee028482ee58840fbfe392c83_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bd796d2de4d02f63adc767aa22b9a388b3adea40c12b0d8f158ebffabed6fee9_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:53c387293b92691eb66ea73b1d29781cf275f01b4254c38e21620c0502987272_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:1b0a31b5f6d1e1493974efb8c7ca5112e6e4d8f0b8e1de8e55b7b8c1184b2293_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:33d0912dbad0b1702fd91abf87e38910d2b983334062044c292a0cb1714187a0_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7814f04947e8e98d3c4870894e320b12c557976495bdf28a89b55bf061bacf79_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:b2a263d3cbf303d0dffb2c36ee2a4187c29902ce96ca1ded6f33b2edcc68fda9_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-bundle@sha256:1c915a6f813564b9bf8062ea5c6a83097a8dd78a38fda0171fae9cc8d81299c7_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:37039569fe73c3975468ffb8640c42becdd9b5304fb5e54789bf59dc67c52c9b_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:4e2ef7cca978574e1715c24b9874c7a0a1a46a6319884a91fe54df06efe97df1_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:b2e2d245c7ba3d1528e73b59bad428f023eeb17a1983d61edcf6a22db58911cf_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:f960e1816f8babb590a55ccab9f2db1b567df749e73c70067269d32f6200bca6_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:30152d31da209c034ec39b52a32063437097eec9a4fac2eaf4a4110fea97cb70_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:38f094f62eed92d88eae0e7a9be410ef908bd0194b30240d49087ae76250e0ee_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:4d0a86e557e93eb8e7d70d538f181c2d33176b3537fb8d9e3a1e76a16ee2eed5_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:a40309477f7286b6c00381012eec8d3ececb557a4b8db38e5b4ea7f321a17c79_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-47913"
},
{
"category": "external",
"summary": "RHBZ#2414943",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2414943"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-47913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47913"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-47913",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47913"
},
{
"category": "external",
"summary": "https://github.com/advisories/GHSA-hcg3-q754-cr77",
"url": "https://github.com/advisories/GHSA-hcg3-q754-cr77"
},
{
"category": "external",
"summary": "https://go.dev/cl/700295",
"url": "https://go.dev/cl/700295"
},
{
"category": "external",
"summary": "https://go.dev/issue/75178",
"url": "https://go.dev/issue/75178"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4116",
"url": "https://pkg.go.dev/vuln/GO-2025-4116"
}
],
"release_date": "2025-11-13T21:29:39.907000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-12-10T10:20:44+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:00eb13b3cccf326292589a680a964160c58f83391d0036c4ebcb34fad32b6189_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:0ca5a583ca7ff0161ed35deeae94be78adc74100d0343b778f1edf5b77e90925_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:3facbc804376b505181c2f52f0c7a433111bcedcb5699a0fcdffd7e9a2bdfbbe_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:7a338bb18181535a2644bf70cae05042e1ef2af5a80e70a6cab6516e8f054896_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:23028"
},
{
"category": "workaround",
"details": "No mitigation is currently available that meets Red Hat Product Security\u2019s standards for usability, deployment, applicability, or stability.",
"product_ids": [
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:11091b652f65868606c3d4d3e30a04cea7396f06f119bcd0a4cf664db2aa790e_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:212ceac279067567409c47acf7792e0c4d1955395f045e3b717040321dc1b88f_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:451da4b858587adcef52b5f1c9b7c92985bd7cc7c90f651b9e38825b81b38fb0_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:c5cb9d3d0f970ad36005f2d376547e967e4a89574cca1cf8806bb92d05199d70_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:0a978bbe91e0e0b8bab6862522f8a0aa8e974b778cc36b83f0781081621c8e23_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8b3684c92affc7acadcd5dc8eb80e5727081c7ecf4cc6eeafe5ecc5ea60970bb_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8d474498354d438fc9deeceb3bc89649f35d4e382e930ee721059bfeaf0f8279_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:ad2119941c2e8db1691a9bfee085425c7203ab00c2cdf0a6441b1102109cfd21_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:cdf96fe7a1ad4c192b4313e804d40d5c656c3f0ced498bae2427e449f0b2df02_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0c7a94928e8ef89aebdd9b30a47aaf0fe4dfb3a716603362b5c7d52255c4e842_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:1f769259f2b91d47f4d4fbf92414903a62380a358737e7100a1166ccd8c89b85_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:a71b5493009863c4f1e9ae9393ff236dc262d84ee028482ee58840fbfe392c83_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bd796d2de4d02f63adc767aa22b9a388b3adea40c12b0d8f158ebffabed6fee9_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:00eb13b3cccf326292589a680a964160c58f83391d0036c4ebcb34fad32b6189_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:0ca5a583ca7ff0161ed35deeae94be78adc74100d0343b778f1edf5b77e90925_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:3facbc804376b505181c2f52f0c7a433111bcedcb5699a0fcdffd7e9a2bdfbbe_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:7a338bb18181535a2644bf70cae05042e1ef2af5a80e70a6cab6516e8f054896_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:53c387293b92691eb66ea73b1d29781cf275f01b4254c38e21620c0502987272_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:1b0a31b5f6d1e1493974efb8c7ca5112e6e4d8f0b8e1de8e55b7b8c1184b2293_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:33d0912dbad0b1702fd91abf87e38910d2b983334062044c292a0cb1714187a0_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7814f04947e8e98d3c4870894e320b12c557976495bdf28a89b55bf061bacf79_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:b2a263d3cbf303d0dffb2c36ee2a4187c29902ce96ca1ded6f33b2edcc68fda9_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-bundle@sha256:1c915a6f813564b9bf8062ea5c6a83097a8dd78a38fda0171fae9cc8d81299c7_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:37039569fe73c3975468ffb8640c42becdd9b5304fb5e54789bf59dc67c52c9b_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:4e2ef7cca978574e1715c24b9874c7a0a1a46a6319884a91fe54df06efe97df1_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:b2e2d245c7ba3d1528e73b59bad428f023eeb17a1983d61edcf6a22db58911cf_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:f960e1816f8babb590a55ccab9f2db1b567df749e73c70067269d32f6200bca6_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:30152d31da209c034ec39b52a32063437097eec9a4fac2eaf4a4110fea97cb70_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:38f094f62eed92d88eae0e7a9be410ef908bd0194b30240d49087ae76250e0ee_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:4d0a86e557e93eb8e7d70d538f181c2d33176b3537fb8d9e3a1e76a16ee2eed5_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:a40309477f7286b6c00381012eec8d3ececb557a4b8db38e5b4ea7f321a17c79_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:11091b652f65868606c3d4d3e30a04cea7396f06f119bcd0a4cf664db2aa790e_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:212ceac279067567409c47acf7792e0c4d1955395f045e3b717040321dc1b88f_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:451da4b858587adcef52b5f1c9b7c92985bd7cc7c90f651b9e38825b81b38fb0_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:c5cb9d3d0f970ad36005f2d376547e967e4a89574cca1cf8806bb92d05199d70_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:0a978bbe91e0e0b8bab6862522f8a0aa8e974b778cc36b83f0781081621c8e23_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8b3684c92affc7acadcd5dc8eb80e5727081c7ecf4cc6eeafe5ecc5ea60970bb_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8d474498354d438fc9deeceb3bc89649f35d4e382e930ee721059bfeaf0f8279_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:ad2119941c2e8db1691a9bfee085425c7203ab00c2cdf0a6441b1102109cfd21_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:cdf96fe7a1ad4c192b4313e804d40d5c656c3f0ced498bae2427e449f0b2df02_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0c7a94928e8ef89aebdd9b30a47aaf0fe4dfb3a716603362b5c7d52255c4e842_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:1f769259f2b91d47f4d4fbf92414903a62380a358737e7100a1166ccd8c89b85_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:a71b5493009863c4f1e9ae9393ff236dc262d84ee028482ee58840fbfe392c83_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bd796d2de4d02f63adc767aa22b9a388b3adea40c12b0d8f158ebffabed6fee9_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:00eb13b3cccf326292589a680a964160c58f83391d0036c4ebcb34fad32b6189_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:0ca5a583ca7ff0161ed35deeae94be78adc74100d0343b778f1edf5b77e90925_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:3facbc804376b505181c2f52f0c7a433111bcedcb5699a0fcdffd7e9a2bdfbbe_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:7a338bb18181535a2644bf70cae05042e1ef2af5a80e70a6cab6516e8f054896_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:53c387293b92691eb66ea73b1d29781cf275f01b4254c38e21620c0502987272_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:1b0a31b5f6d1e1493974efb8c7ca5112e6e4d8f0b8e1de8e55b7b8c1184b2293_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:33d0912dbad0b1702fd91abf87e38910d2b983334062044c292a0cb1714187a0_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7814f04947e8e98d3c4870894e320b12c557976495bdf28a89b55bf061bacf79_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:b2a263d3cbf303d0dffb2c36ee2a4187c29902ce96ca1ded6f33b2edcc68fda9_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-bundle@sha256:1c915a6f813564b9bf8062ea5c6a83097a8dd78a38fda0171fae9cc8d81299c7_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:37039569fe73c3975468ffb8640c42becdd9b5304fb5e54789bf59dc67c52c9b_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:4e2ef7cca978574e1715c24b9874c7a0a1a46a6319884a91fe54df06efe97df1_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:b2e2d245c7ba3d1528e73b59bad428f023eeb17a1983d61edcf6a22db58911cf_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:f960e1816f8babb590a55ccab9f2db1b567df749e73c70067269d32f6200bca6_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:30152d31da209c034ec39b52a32063437097eec9a4fac2eaf4a4110fea97cb70_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:38f094f62eed92d88eae0e7a9be410ef908bd0194b30240d49087ae76250e0ee_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:4d0a86e557e93eb8e7d70d538f181c2d33176b3537fb8d9e3a1e76a16ee2eed5_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:a40309477f7286b6c00381012eec8d3ececb557a4b8db38e5b4ea7f321a17c79_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang.org/x/crypto/ssh/agent: golang.org/x/crypto/ssh/agent: SSH client panic due to unexpected SSH_AGENT_SUCCESS"
},
{
"cve": "CVE-2025-59420",
"cwe": {
"id": "CWE-440",
"name": "Expected Behavior Violation"
},
"discovery_date": "2025-09-22T18:01:35.379361+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:11091b652f65868606c3d4d3e30a04cea7396f06f119bcd0a4cf664db2aa790e_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:212ceac279067567409c47acf7792e0c4d1955395f045e3b717040321dc1b88f_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:451da4b858587adcef52b5f1c9b7c92985bd7cc7c90f651b9e38825b81b38fb0_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:c5cb9d3d0f970ad36005f2d376547e967e4a89574cca1cf8806bb92d05199d70_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:0a978bbe91e0e0b8bab6862522f8a0aa8e974b778cc36b83f0781081621c8e23_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8b3684c92affc7acadcd5dc8eb80e5727081c7ecf4cc6eeafe5ecc5ea60970bb_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8d474498354d438fc9deeceb3bc89649f35d4e382e930ee721059bfeaf0f8279_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:ad2119941c2e8db1691a9bfee085425c7203ab00c2cdf0a6441b1102109cfd21_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:cdf96fe7a1ad4c192b4313e804d40d5c656c3f0ced498bae2427e449f0b2df02_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0c7a94928e8ef89aebdd9b30a47aaf0fe4dfb3a716603362b5c7d52255c4e842_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:1f769259f2b91d47f4d4fbf92414903a62380a358737e7100a1166ccd8c89b85_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:a71b5493009863c4f1e9ae9393ff236dc262d84ee028482ee58840fbfe392c83_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bd796d2de4d02f63adc767aa22b9a388b3adea40c12b0d8f158ebffabed6fee9_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:00eb13b3cccf326292589a680a964160c58f83391d0036c4ebcb34fad32b6189_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:0ca5a583ca7ff0161ed35deeae94be78adc74100d0343b778f1edf5b77e90925_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:3facbc804376b505181c2f52f0c7a433111bcedcb5699a0fcdffd7e9a2bdfbbe_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:7a338bb18181535a2644bf70cae05042e1ef2af5a80e70a6cab6516e8f054896_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:53c387293b92691eb66ea73b1d29781cf275f01b4254c38e21620c0502987272_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:1b0a31b5f6d1e1493974efb8c7ca5112e6e4d8f0b8e1de8e55b7b8c1184b2293_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:33d0912dbad0b1702fd91abf87e38910d2b983334062044c292a0cb1714187a0_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7814f04947e8e98d3c4870894e320b12c557976495bdf28a89b55bf061bacf79_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:b2a263d3cbf303d0dffb2c36ee2a4187c29902ce96ca1ded6f33b2edcc68fda9_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-bundle@sha256:1c915a6f813564b9bf8062ea5c6a83097a8dd78a38fda0171fae9cc8d81299c7_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:37039569fe73c3975468ffb8640c42becdd9b5304fb5e54789bf59dc67c52c9b_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:4e2ef7cca978574e1715c24b9874c7a0a1a46a6319884a91fe54df06efe97df1_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:b2e2d245c7ba3d1528e73b59bad428f023eeb17a1983d61edcf6a22db58911cf_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:f960e1816f8babb590a55ccab9f2db1b567df749e73c70067269d32f6200bca6_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2397460"
}
],
"notes": [
{
"category": "description",
"text": "Authlib\u2019s JWS verification accepts tokens that declare unknown critical header parameters (crit), violating RFC 7515 \u201cmust\u2011understand\u201d semantics. An attacker can craft a signed token with a critical header (for example, bork or cnf) that strict verifiers reject but Authlib accepts. In mixed\u2011language fleets, this enables split\u2011brain verification and can lead to policy bypass, replay, or privilege escalation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "authlib: Authlib RFC violation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:30152d31da209c034ec39b52a32063437097eec9a4fac2eaf4a4110fea97cb70_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:38f094f62eed92d88eae0e7a9be410ef908bd0194b30240d49087ae76250e0ee_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:4d0a86e557e93eb8e7d70d538f181c2d33176b3537fb8d9e3a1e76a16ee2eed5_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:a40309477f7286b6c00381012eec8d3ececb557a4b8db38e5b4ea7f321a17c79_amd64"
],
"known_not_affected": [
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:11091b652f65868606c3d4d3e30a04cea7396f06f119bcd0a4cf664db2aa790e_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:212ceac279067567409c47acf7792e0c4d1955395f045e3b717040321dc1b88f_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:451da4b858587adcef52b5f1c9b7c92985bd7cc7c90f651b9e38825b81b38fb0_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:c5cb9d3d0f970ad36005f2d376547e967e4a89574cca1cf8806bb92d05199d70_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:0a978bbe91e0e0b8bab6862522f8a0aa8e974b778cc36b83f0781081621c8e23_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8b3684c92affc7acadcd5dc8eb80e5727081c7ecf4cc6eeafe5ecc5ea60970bb_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8d474498354d438fc9deeceb3bc89649f35d4e382e930ee721059bfeaf0f8279_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:ad2119941c2e8db1691a9bfee085425c7203ab00c2cdf0a6441b1102109cfd21_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:cdf96fe7a1ad4c192b4313e804d40d5c656c3f0ced498bae2427e449f0b2df02_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0c7a94928e8ef89aebdd9b30a47aaf0fe4dfb3a716603362b5c7d52255c4e842_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:1f769259f2b91d47f4d4fbf92414903a62380a358737e7100a1166ccd8c89b85_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:a71b5493009863c4f1e9ae9393ff236dc262d84ee028482ee58840fbfe392c83_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bd796d2de4d02f63adc767aa22b9a388b3adea40c12b0d8f158ebffabed6fee9_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:00eb13b3cccf326292589a680a964160c58f83391d0036c4ebcb34fad32b6189_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:0ca5a583ca7ff0161ed35deeae94be78adc74100d0343b778f1edf5b77e90925_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:3facbc804376b505181c2f52f0c7a433111bcedcb5699a0fcdffd7e9a2bdfbbe_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:7a338bb18181535a2644bf70cae05042e1ef2af5a80e70a6cab6516e8f054896_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:53c387293b92691eb66ea73b1d29781cf275f01b4254c38e21620c0502987272_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:1b0a31b5f6d1e1493974efb8c7ca5112e6e4d8f0b8e1de8e55b7b8c1184b2293_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:33d0912dbad0b1702fd91abf87e38910d2b983334062044c292a0cb1714187a0_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7814f04947e8e98d3c4870894e320b12c557976495bdf28a89b55bf061bacf79_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:b2a263d3cbf303d0dffb2c36ee2a4187c29902ce96ca1ded6f33b2edcc68fda9_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-bundle@sha256:1c915a6f813564b9bf8062ea5c6a83097a8dd78a38fda0171fae9cc8d81299c7_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:37039569fe73c3975468ffb8640c42becdd9b5304fb5e54789bf59dc67c52c9b_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:4e2ef7cca978574e1715c24b9874c7a0a1a46a6319884a91fe54df06efe97df1_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:b2e2d245c7ba3d1528e73b59bad428f023eeb17a1983d61edcf6a22db58911cf_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:f960e1816f8babb590a55ccab9f2db1b567df749e73c70067269d32f6200bca6_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-59420"
},
{
"category": "external",
"summary": "RHBZ#2397460",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2397460"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-59420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59420"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-59420",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-59420"
},
{
"category": "external",
"summary": "https://github.com/authlib/authlib/commit/6b1813e4392eb7c168c276099ff7783b176479df",
"url": "https://github.com/authlib/authlib/commit/6b1813e4392eb7c168c276099ff7783b176479df"
},
{
"category": "external",
"summary": "https://github.com/authlib/authlib/security/advisories/GHSA-9ggr-2464-2j32",
"url": "https://github.com/authlib/authlib/security/advisories/GHSA-9ggr-2464-2j32"
}
],
"release_date": "2025-09-22T17:28:53.869000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-12-10T10:20:44+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:30152d31da209c034ec39b52a32063437097eec9a4fac2eaf4a4110fea97cb70_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:38f094f62eed92d88eae0e7a9be410ef908bd0194b30240d49087ae76250e0ee_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:4d0a86e557e93eb8e7d70d538f181c2d33176b3537fb8d9e3a1e76a16ee2eed5_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:a40309477f7286b6c00381012eec8d3ececb557a4b8db38e5b4ea7f321a17c79_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:23028"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:11091b652f65868606c3d4d3e30a04cea7396f06f119bcd0a4cf664db2aa790e_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:212ceac279067567409c47acf7792e0c4d1955395f045e3b717040321dc1b88f_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:451da4b858587adcef52b5f1c9b7c92985bd7cc7c90f651b9e38825b81b38fb0_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:c5cb9d3d0f970ad36005f2d376547e967e4a89574cca1cf8806bb92d05199d70_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:0a978bbe91e0e0b8bab6862522f8a0aa8e974b778cc36b83f0781081621c8e23_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8b3684c92affc7acadcd5dc8eb80e5727081c7ecf4cc6eeafe5ecc5ea60970bb_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8d474498354d438fc9deeceb3bc89649f35d4e382e930ee721059bfeaf0f8279_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:ad2119941c2e8db1691a9bfee085425c7203ab00c2cdf0a6441b1102109cfd21_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:cdf96fe7a1ad4c192b4313e804d40d5c656c3f0ced498bae2427e449f0b2df02_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0c7a94928e8ef89aebdd9b30a47aaf0fe4dfb3a716603362b5c7d52255c4e842_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:1f769259f2b91d47f4d4fbf92414903a62380a358737e7100a1166ccd8c89b85_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:a71b5493009863c4f1e9ae9393ff236dc262d84ee028482ee58840fbfe392c83_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bd796d2de4d02f63adc767aa22b9a388b3adea40c12b0d8f158ebffabed6fee9_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:00eb13b3cccf326292589a680a964160c58f83391d0036c4ebcb34fad32b6189_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:0ca5a583ca7ff0161ed35deeae94be78adc74100d0343b778f1edf5b77e90925_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:3facbc804376b505181c2f52f0c7a433111bcedcb5699a0fcdffd7e9a2bdfbbe_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:7a338bb18181535a2644bf70cae05042e1ef2af5a80e70a6cab6516e8f054896_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:53c387293b92691eb66ea73b1d29781cf275f01b4254c38e21620c0502987272_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:1b0a31b5f6d1e1493974efb8c7ca5112e6e4d8f0b8e1de8e55b7b8c1184b2293_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:33d0912dbad0b1702fd91abf87e38910d2b983334062044c292a0cb1714187a0_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7814f04947e8e98d3c4870894e320b12c557976495bdf28a89b55bf061bacf79_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:b2a263d3cbf303d0dffb2c36ee2a4187c29902ce96ca1ded6f33b2edcc68fda9_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-bundle@sha256:1c915a6f813564b9bf8062ea5c6a83097a8dd78a38fda0171fae9cc8d81299c7_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:37039569fe73c3975468ffb8640c42becdd9b5304fb5e54789bf59dc67c52c9b_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:4e2ef7cca978574e1715c24b9874c7a0a1a46a6319884a91fe54df06efe97df1_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:b2e2d245c7ba3d1528e73b59bad428f023eeb17a1983d61edcf6a22db58911cf_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:f960e1816f8babb590a55ccab9f2db1b567df749e73c70067269d32f6200bca6_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:30152d31da209c034ec39b52a32063437097eec9a4fac2eaf4a4110fea97cb70_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:38f094f62eed92d88eae0e7a9be410ef908bd0194b30240d49087ae76250e0ee_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:4d0a86e557e93eb8e7d70d538f181c2d33176b3537fb8d9e3a1e76a16ee2eed5_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:a40309477f7286b6c00381012eec8d3ececb557a4b8db38e5b4ea7f321a17c79_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:11091b652f65868606c3d4d3e30a04cea7396f06f119bcd0a4cf664db2aa790e_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:212ceac279067567409c47acf7792e0c4d1955395f045e3b717040321dc1b88f_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:451da4b858587adcef52b5f1c9b7c92985bd7cc7c90f651b9e38825b81b38fb0_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:c5cb9d3d0f970ad36005f2d376547e967e4a89574cca1cf8806bb92d05199d70_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:0a978bbe91e0e0b8bab6862522f8a0aa8e974b778cc36b83f0781081621c8e23_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8b3684c92affc7acadcd5dc8eb80e5727081c7ecf4cc6eeafe5ecc5ea60970bb_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8d474498354d438fc9deeceb3bc89649f35d4e382e930ee721059bfeaf0f8279_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:ad2119941c2e8db1691a9bfee085425c7203ab00c2cdf0a6441b1102109cfd21_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:cdf96fe7a1ad4c192b4313e804d40d5c656c3f0ced498bae2427e449f0b2df02_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0c7a94928e8ef89aebdd9b30a47aaf0fe4dfb3a716603362b5c7d52255c4e842_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:1f769259f2b91d47f4d4fbf92414903a62380a358737e7100a1166ccd8c89b85_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:a71b5493009863c4f1e9ae9393ff236dc262d84ee028482ee58840fbfe392c83_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bd796d2de4d02f63adc767aa22b9a388b3adea40c12b0d8f158ebffabed6fee9_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:00eb13b3cccf326292589a680a964160c58f83391d0036c4ebcb34fad32b6189_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:0ca5a583ca7ff0161ed35deeae94be78adc74100d0343b778f1edf5b77e90925_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:3facbc804376b505181c2f52f0c7a433111bcedcb5699a0fcdffd7e9a2bdfbbe_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:7a338bb18181535a2644bf70cae05042e1ef2af5a80e70a6cab6516e8f054896_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:53c387293b92691eb66ea73b1d29781cf275f01b4254c38e21620c0502987272_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:1b0a31b5f6d1e1493974efb8c7ca5112e6e4d8f0b8e1de8e55b7b8c1184b2293_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:33d0912dbad0b1702fd91abf87e38910d2b983334062044c292a0cb1714187a0_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7814f04947e8e98d3c4870894e320b12c557976495bdf28a89b55bf061bacf79_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:b2a263d3cbf303d0dffb2c36ee2a4187c29902ce96ca1ded6f33b2edcc68fda9_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-bundle@sha256:1c915a6f813564b9bf8062ea5c6a83097a8dd78a38fda0171fae9cc8d81299c7_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:37039569fe73c3975468ffb8640c42becdd9b5304fb5e54789bf59dc67c52c9b_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:4e2ef7cca978574e1715c24b9874c7a0a1a46a6319884a91fe54df06efe97df1_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:b2e2d245c7ba3d1528e73b59bad428f023eeb17a1983d61edcf6a22db58911cf_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:f960e1816f8babb590a55ccab9f2db1b567df749e73c70067269d32f6200bca6_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:30152d31da209c034ec39b52a32063437097eec9a4fac2eaf4a4110fea97cb70_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:38f094f62eed92d88eae0e7a9be410ef908bd0194b30240d49087ae76250e0ee_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:4d0a86e557e93eb8e7d70d538f181c2d33176b3537fb8d9e3a1e76a16ee2eed5_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:a40309477f7286b6c00381012eec8d3ececb557a4b8db38e5b4ea7f321a17c79_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "authlib: Authlib RFC violation"
},
{
"cve": "CVE-2025-61920",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2025-10-10T20:01:12.833962+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:11091b652f65868606c3d4d3e30a04cea7396f06f119bcd0a4cf664db2aa790e_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:212ceac279067567409c47acf7792e0c4d1955395f045e3b717040321dc1b88f_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:451da4b858587adcef52b5f1c9b7c92985bd7cc7c90f651b9e38825b81b38fb0_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:c5cb9d3d0f970ad36005f2d376547e967e4a89574cca1cf8806bb92d05199d70_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:0a978bbe91e0e0b8bab6862522f8a0aa8e974b778cc36b83f0781081621c8e23_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8b3684c92affc7acadcd5dc8eb80e5727081c7ecf4cc6eeafe5ecc5ea60970bb_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8d474498354d438fc9deeceb3bc89649f35d4e382e930ee721059bfeaf0f8279_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:ad2119941c2e8db1691a9bfee085425c7203ab00c2cdf0a6441b1102109cfd21_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:cdf96fe7a1ad4c192b4313e804d40d5c656c3f0ced498bae2427e449f0b2df02_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0c7a94928e8ef89aebdd9b30a47aaf0fe4dfb3a716603362b5c7d52255c4e842_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:1f769259f2b91d47f4d4fbf92414903a62380a358737e7100a1166ccd8c89b85_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:a71b5493009863c4f1e9ae9393ff236dc262d84ee028482ee58840fbfe392c83_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bd796d2de4d02f63adc767aa22b9a388b3adea40c12b0d8f158ebffabed6fee9_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:00eb13b3cccf326292589a680a964160c58f83391d0036c4ebcb34fad32b6189_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:0ca5a583ca7ff0161ed35deeae94be78adc74100d0343b778f1edf5b77e90925_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:3facbc804376b505181c2f52f0c7a433111bcedcb5699a0fcdffd7e9a2bdfbbe_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:7a338bb18181535a2644bf70cae05042e1ef2af5a80e70a6cab6516e8f054896_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:53c387293b92691eb66ea73b1d29781cf275f01b4254c38e21620c0502987272_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:1b0a31b5f6d1e1493974efb8c7ca5112e6e4d8f0b8e1de8e55b7b8c1184b2293_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:33d0912dbad0b1702fd91abf87e38910d2b983334062044c292a0cb1714187a0_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7814f04947e8e98d3c4870894e320b12c557976495bdf28a89b55bf061bacf79_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:b2a263d3cbf303d0dffb2c36ee2a4187c29902ce96ca1ded6f33b2edcc68fda9_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-bundle@sha256:1c915a6f813564b9bf8062ea5c6a83097a8dd78a38fda0171fae9cc8d81299c7_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:37039569fe73c3975468ffb8640c42becdd9b5304fb5e54789bf59dc67c52c9b_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:4e2ef7cca978574e1715c24b9874c7a0a1a46a6319884a91fe54df06efe97df1_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:b2e2d245c7ba3d1528e73b59bad428f023eeb17a1983d61edcf6a22db58911cf_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:f960e1816f8babb590a55ccab9f2db1b567df749e73c70067269d32f6200bca6_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2403179"
}
],
"notes": [
{
"category": "description",
"text": "A denial of service flaw has been discovered in the python Authlib package. Authlib\u2019s JOSE implementation accepts unbounded JWS/JWT header and signature segments. A remote attacker can craft a token whose base64url\u2011encoded header or signature spans hundreds of megabytes. During verification, Authlib decodes and parses the full input before it is rejected, driving CPU and memory consumption to hostile levels and enabling denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "authlib: Authlib Denial of Service",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:30152d31da209c034ec39b52a32063437097eec9a4fac2eaf4a4110fea97cb70_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:38f094f62eed92d88eae0e7a9be410ef908bd0194b30240d49087ae76250e0ee_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:4d0a86e557e93eb8e7d70d538f181c2d33176b3537fb8d9e3a1e76a16ee2eed5_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:a40309477f7286b6c00381012eec8d3ececb557a4b8db38e5b4ea7f321a17c79_amd64"
],
"known_not_affected": [
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:11091b652f65868606c3d4d3e30a04cea7396f06f119bcd0a4cf664db2aa790e_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:212ceac279067567409c47acf7792e0c4d1955395f045e3b717040321dc1b88f_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:451da4b858587adcef52b5f1c9b7c92985bd7cc7c90f651b9e38825b81b38fb0_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:c5cb9d3d0f970ad36005f2d376547e967e4a89574cca1cf8806bb92d05199d70_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:0a978bbe91e0e0b8bab6862522f8a0aa8e974b778cc36b83f0781081621c8e23_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8b3684c92affc7acadcd5dc8eb80e5727081c7ecf4cc6eeafe5ecc5ea60970bb_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8d474498354d438fc9deeceb3bc89649f35d4e382e930ee721059bfeaf0f8279_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:ad2119941c2e8db1691a9bfee085425c7203ab00c2cdf0a6441b1102109cfd21_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:cdf96fe7a1ad4c192b4313e804d40d5c656c3f0ced498bae2427e449f0b2df02_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0c7a94928e8ef89aebdd9b30a47aaf0fe4dfb3a716603362b5c7d52255c4e842_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:1f769259f2b91d47f4d4fbf92414903a62380a358737e7100a1166ccd8c89b85_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:a71b5493009863c4f1e9ae9393ff236dc262d84ee028482ee58840fbfe392c83_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bd796d2de4d02f63adc767aa22b9a388b3adea40c12b0d8f158ebffabed6fee9_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:00eb13b3cccf326292589a680a964160c58f83391d0036c4ebcb34fad32b6189_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:0ca5a583ca7ff0161ed35deeae94be78adc74100d0343b778f1edf5b77e90925_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:3facbc804376b505181c2f52f0c7a433111bcedcb5699a0fcdffd7e9a2bdfbbe_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:7a338bb18181535a2644bf70cae05042e1ef2af5a80e70a6cab6516e8f054896_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:53c387293b92691eb66ea73b1d29781cf275f01b4254c38e21620c0502987272_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:1b0a31b5f6d1e1493974efb8c7ca5112e6e4d8f0b8e1de8e55b7b8c1184b2293_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:33d0912dbad0b1702fd91abf87e38910d2b983334062044c292a0cb1714187a0_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7814f04947e8e98d3c4870894e320b12c557976495bdf28a89b55bf061bacf79_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:b2a263d3cbf303d0dffb2c36ee2a4187c29902ce96ca1ded6f33b2edcc68fda9_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-bundle@sha256:1c915a6f813564b9bf8062ea5c6a83097a8dd78a38fda0171fae9cc8d81299c7_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:37039569fe73c3975468ffb8640c42becdd9b5304fb5e54789bf59dc67c52c9b_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:4e2ef7cca978574e1715c24b9874c7a0a1a46a6319884a91fe54df06efe97df1_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:b2e2d245c7ba3d1528e73b59bad428f023eeb17a1983d61edcf6a22db58911cf_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:f960e1816f8babb590a55ccab9f2db1b567df749e73c70067269d32f6200bca6_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61920"
},
{
"category": "external",
"summary": "RHBZ#2403179",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2403179"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61920",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61920"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61920",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61920"
},
{
"category": "external",
"summary": "https://github.com/authlib/authlib/commit/867e3f87b072347a1ae9cf6983cc8bbf88447e5e",
"url": "https://github.com/authlib/authlib/commit/867e3f87b072347a1ae9cf6983cc8bbf88447e5e"
},
{
"category": "external",
"summary": "https://github.com/authlib/authlib/security/advisories/GHSA-pq5p-34cr-23v9",
"url": "https://github.com/authlib/authlib/security/advisories/GHSA-pq5p-34cr-23v9"
}
],
"release_date": "2025-10-10T19:25:07.679000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-12-10T10:20:44+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:30152d31da209c034ec39b52a32063437097eec9a4fac2eaf4a4110fea97cb70_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:38f094f62eed92d88eae0e7a9be410ef908bd0194b30240d49087ae76250e0ee_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:4d0a86e557e93eb8e7d70d538f181c2d33176b3537fb8d9e3a1e76a16ee2eed5_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:a40309477f7286b6c00381012eec8d3ececb557a4b8db38e5b4ea7f321a17c79_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:23028"
},
{
"category": "workaround",
"details": "Users unable to upgrade may manually enforce input size limits before handing tokens to Authlib and/or use application-level throttling to reduce amplification risk.",
"product_ids": [
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:11091b652f65868606c3d4d3e30a04cea7396f06f119bcd0a4cf664db2aa790e_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:212ceac279067567409c47acf7792e0c4d1955395f045e3b717040321dc1b88f_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:451da4b858587adcef52b5f1c9b7c92985bd7cc7c90f651b9e38825b81b38fb0_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:c5cb9d3d0f970ad36005f2d376547e967e4a89574cca1cf8806bb92d05199d70_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:0a978bbe91e0e0b8bab6862522f8a0aa8e974b778cc36b83f0781081621c8e23_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8b3684c92affc7acadcd5dc8eb80e5727081c7ecf4cc6eeafe5ecc5ea60970bb_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8d474498354d438fc9deeceb3bc89649f35d4e382e930ee721059bfeaf0f8279_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:ad2119941c2e8db1691a9bfee085425c7203ab00c2cdf0a6441b1102109cfd21_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:cdf96fe7a1ad4c192b4313e804d40d5c656c3f0ced498bae2427e449f0b2df02_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0c7a94928e8ef89aebdd9b30a47aaf0fe4dfb3a716603362b5c7d52255c4e842_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:1f769259f2b91d47f4d4fbf92414903a62380a358737e7100a1166ccd8c89b85_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:a71b5493009863c4f1e9ae9393ff236dc262d84ee028482ee58840fbfe392c83_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bd796d2de4d02f63adc767aa22b9a388b3adea40c12b0d8f158ebffabed6fee9_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:00eb13b3cccf326292589a680a964160c58f83391d0036c4ebcb34fad32b6189_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:0ca5a583ca7ff0161ed35deeae94be78adc74100d0343b778f1edf5b77e90925_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:3facbc804376b505181c2f52f0c7a433111bcedcb5699a0fcdffd7e9a2bdfbbe_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:7a338bb18181535a2644bf70cae05042e1ef2af5a80e70a6cab6516e8f054896_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:53c387293b92691eb66ea73b1d29781cf275f01b4254c38e21620c0502987272_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:1b0a31b5f6d1e1493974efb8c7ca5112e6e4d8f0b8e1de8e55b7b8c1184b2293_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:33d0912dbad0b1702fd91abf87e38910d2b983334062044c292a0cb1714187a0_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7814f04947e8e98d3c4870894e320b12c557976495bdf28a89b55bf061bacf79_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:b2a263d3cbf303d0dffb2c36ee2a4187c29902ce96ca1ded6f33b2edcc68fda9_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-bundle@sha256:1c915a6f813564b9bf8062ea5c6a83097a8dd78a38fda0171fae9cc8d81299c7_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:37039569fe73c3975468ffb8640c42becdd9b5304fb5e54789bf59dc67c52c9b_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:4e2ef7cca978574e1715c24b9874c7a0a1a46a6319884a91fe54df06efe97df1_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:b2e2d245c7ba3d1528e73b59bad428f023eeb17a1983d61edcf6a22db58911cf_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:f960e1816f8babb590a55ccab9f2db1b567df749e73c70067269d32f6200bca6_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:30152d31da209c034ec39b52a32063437097eec9a4fac2eaf4a4110fea97cb70_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:38f094f62eed92d88eae0e7a9be410ef908bd0194b30240d49087ae76250e0ee_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:4d0a86e557e93eb8e7d70d538f181c2d33176b3537fb8d9e3a1e76a16ee2eed5_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:a40309477f7286b6c00381012eec8d3ececb557a4b8db38e5b4ea7f321a17c79_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:11091b652f65868606c3d4d3e30a04cea7396f06f119bcd0a4cf664db2aa790e_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:212ceac279067567409c47acf7792e0c4d1955395f045e3b717040321dc1b88f_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:451da4b858587adcef52b5f1c9b7c92985bd7cc7c90f651b9e38825b81b38fb0_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:c5cb9d3d0f970ad36005f2d376547e967e4a89574cca1cf8806bb92d05199d70_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:0a978bbe91e0e0b8bab6862522f8a0aa8e974b778cc36b83f0781081621c8e23_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8b3684c92affc7acadcd5dc8eb80e5727081c7ecf4cc6eeafe5ecc5ea60970bb_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8d474498354d438fc9deeceb3bc89649f35d4e382e930ee721059bfeaf0f8279_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:ad2119941c2e8db1691a9bfee085425c7203ab00c2cdf0a6441b1102109cfd21_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:cdf96fe7a1ad4c192b4313e804d40d5c656c3f0ced498bae2427e449f0b2df02_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0c7a94928e8ef89aebdd9b30a47aaf0fe4dfb3a716603362b5c7d52255c4e842_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:1f769259f2b91d47f4d4fbf92414903a62380a358737e7100a1166ccd8c89b85_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:a71b5493009863c4f1e9ae9393ff236dc262d84ee028482ee58840fbfe392c83_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bd796d2de4d02f63adc767aa22b9a388b3adea40c12b0d8f158ebffabed6fee9_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:00eb13b3cccf326292589a680a964160c58f83391d0036c4ebcb34fad32b6189_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:0ca5a583ca7ff0161ed35deeae94be78adc74100d0343b778f1edf5b77e90925_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:3facbc804376b505181c2f52f0c7a433111bcedcb5699a0fcdffd7e9a2bdfbbe_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:7a338bb18181535a2644bf70cae05042e1ef2af5a80e70a6cab6516e8f054896_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:53c387293b92691eb66ea73b1d29781cf275f01b4254c38e21620c0502987272_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:1b0a31b5f6d1e1493974efb8c7ca5112e6e4d8f0b8e1de8e55b7b8c1184b2293_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:33d0912dbad0b1702fd91abf87e38910d2b983334062044c292a0cb1714187a0_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7814f04947e8e98d3c4870894e320b12c557976495bdf28a89b55bf061bacf79_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:b2a263d3cbf303d0dffb2c36ee2a4187c29902ce96ca1ded6f33b2edcc68fda9_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-bundle@sha256:1c915a6f813564b9bf8062ea5c6a83097a8dd78a38fda0171fae9cc8d81299c7_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:37039569fe73c3975468ffb8640c42becdd9b5304fb5e54789bf59dc67c52c9b_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:4e2ef7cca978574e1715c24b9874c7a0a1a46a6319884a91fe54df06efe97df1_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:b2e2d245c7ba3d1528e73b59bad428f023eeb17a1983d61edcf6a22db58911cf_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:f960e1816f8babb590a55ccab9f2db1b567df749e73c70067269d32f6200bca6_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:30152d31da209c034ec39b52a32063437097eec9a4fac2eaf4a4110fea97cb70_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:38f094f62eed92d88eae0e7a9be410ef908bd0194b30240d49087ae76250e0ee_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:4d0a86e557e93eb8e7d70d538f181c2d33176b3537fb8d9e3a1e76a16ee2eed5_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:a40309477f7286b6c00381012eec8d3ececb557a4b8db38e5b4ea7f321a17c79_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "authlib: Authlib Denial of Service"
}
]
}
RHSA-2025:22287
Vulnerability from csaf_redhat - Published: 2025-11-27 14:54 - Updated: 2026-03-16 12:13Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat Quay 3.9 is now available with bug fixes.",
"title": "Topic"
},
{
"category": "general",
"text": "Quay 3.9",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:22287",
"url": "https://access.redhat.com/errata/RHSA-2025:22287"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2024-34156",
"url": "https://access.redhat.com/security/cve/CVE-2024-34156"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2024-45337",
"url": "https://access.redhat.com/security/cve/CVE-2024-45337"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2024-45338",
"url": "https://access.redhat.com/security/cve/CVE-2024-45338"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-59420",
"url": "https://access.redhat.com/security/cve/CVE-2025-59420"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61920",
"url": "https://access.redhat.com/security/cve/CVE-2025-61920"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_22287.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Quay 3.9",
"tracking": {
"current_release_date": "2026-03-16T12:13:38+00:00",
"generator": {
"date": "2026-03-16T12:13:38+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.3"
}
},
"id": "RHSA-2025:22287",
"initial_release_date": "2025-11-27T14:54:51+00:00",
"revision_history": [
{
"date": "2025-11-27T14:54:51+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-11-27T14:54:59+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-16T12:13:38+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Quay 3.9",
"product": {
"name": "Red Hat Quay 3.9",
"product_id": "Red Hat Quay 3.9",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:quay:3.9::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat Quay"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:878b011b86512d01021feb10cdd54608a3ab68d2f3db5a1d53ce8feaa9e56878_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:878b011b86512d01021feb10cdd54608a3ab68d2f3db5a1d53ce8feaa9e56878_amd64",
"product_id": "registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:878b011b86512d01021feb10cdd54608a3ab68d2f3db5a1d53ce8feaa9e56878_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-container-security-operator-bundle@sha256%3A878b011b86512d01021feb10cdd54608a3ab68d2f3db5a1d53ce8feaa9e56878?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=3.9.17-1764254756"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:54003d9396862c6e3b675455ac8c0159662a6640bb889ffb34516d2d091275de_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:54003d9396862c6e3b675455ac8c0159662a6640bb889ffb34516d2d091275de_amd64",
"product_id": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:54003d9396862c6e3b675455ac8c0159662a6640bb889ffb34516d2d091275de_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-container-security-operator-rhel8@sha256%3A54003d9396862c6e3b675455ac8c0159662a6640bb889ffb34516d2d091275de?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=3.9.17-1764254756"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:49db4fa7375da6397c45b6c09e10e20f5855348e21812d64474c3adec7f1cbdd_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:49db4fa7375da6397c45b6c09e10e20f5855348e21812d64474c3adec7f1cbdd_amd64",
"product_id": "registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:49db4fa7375da6397c45b6c09e10e20f5855348e21812d64474c3adec7f1cbdd_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-bridge-operator-bundle@sha256%3A49db4fa7375da6397c45b6c09e10e20f5855348e21812d64474c3adec7f1cbdd?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=3.9.17-1764254756"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:235d66a1ef93f2ae13266709a30698d444d6e481b8edbdb252d49d9aea4b76ce_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:235d66a1ef93f2ae13266709a30698d444d6e481b8edbdb252d49d9aea4b76ce_amd64",
"product_id": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:235d66a1ef93f2ae13266709a30698d444d6e481b8edbdb252d49d9aea4b76ce_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-bridge-operator-rhel8@sha256%3A235d66a1ef93f2ae13266709a30698d444d6e481b8edbdb252d49d9aea4b76ce?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=3.9-1764254756"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:8ca3e5903314362c191c6acd1d3865436d85daf50e284760da21e28f473a8ee5_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:8ca3e5903314362c191c6acd1d3865436d85daf50e284760da21e28f473a8ee5_amd64",
"product_id": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:8ca3e5903314362c191c6acd1d3865436d85daf50e284760da21e28f473a8ee5_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-builder-qemu-rhcos-rhel8@sha256%3A8ca3e5903314362c191c6acd1d3865436d85daf50e284760da21e28f473a8ee5?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=3.14-1764254756"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:9b69aadfde5c4cbde98f496c54ce396d1daa5277b8f59577f22855345604442e_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:9b69aadfde5c4cbde98f496c54ce396d1daa5277b8f59577f22855345604442e_amd64",
"product_id": "registry.redhat.io/quay/quay-builder-rhel8@sha256:9b69aadfde5c4cbde98f496c54ce396d1daa5277b8f59577f22855345604442e_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-builder-rhel8@sha256%3A9b69aadfde5c4cbde98f496c54ce396d1daa5277b8f59577f22855345604442e?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=8.10-1764254756"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/clair-rhel8@sha256:02ced94ebfcce3e21bcc71af6aa1c11db50822c91dd05cec4fb41a34e6669112_amd64",
"product": {
"name": "registry.redhat.io/quay/clair-rhel8@sha256:02ced94ebfcce3e21bcc71af6aa1c11db50822c91dd05cec4fb41a34e6669112_amd64",
"product_id": "registry.redhat.io/quay/clair-rhel8@sha256:02ced94ebfcce3e21bcc71af6aa1c11db50822c91dd05cec4fb41a34e6669112_amd64",
"product_identification_helper": {
"purl": "pkg:oci/clair-rhel8@sha256%3A02ced94ebfcce3e21bcc71af6aa1c11db50822c91dd05cec4fb41a34e6669112?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=v3.9.0-1764254756"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-operator-bundle@sha256:ce217da657cabd3cf9beaff3a3b096309738c33932f2ad33d46b03870598f0c4_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-operator-bundle@sha256:ce217da657cabd3cf9beaff3a3b096309738c33932f2ad33d46b03870598f0c4_amd64",
"product_id": "registry.redhat.io/quay/quay-operator-bundle@sha256:ce217da657cabd3cf9beaff3a3b096309738c33932f2ad33d46b03870598f0c4_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-operator-bundle@sha256%3Ace217da657cabd3cf9beaff3a3b096309738c33932f2ad33d46b03870598f0c4?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=3.9.17-1764254756"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:f4ab11e6a09b983a4af87723877338a79b45c36b3848b0e8032963a330d98467_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:f4ab11e6a09b983a4af87723877338a79b45c36b3848b0e8032963a330d98467_amd64",
"product_id": "registry.redhat.io/quay/quay-operator-rhel8@sha256:f4ab11e6a09b983a4af87723877338a79b45c36b3848b0e8032963a330d98467_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-operator-rhel8@sha256%3Af4ab11e6a09b983a4af87723877338a79b45c36b3848b0e8032963a330d98467?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=3.9.17-1764254756"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-rhel8@sha256:a6813e5bf29916abf84b2d120a30cda07edf06f735c860ee4d0510ed0c59633b_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-rhel8@sha256:a6813e5bf29916abf84b2d120a30cda07edf06f735c860ee4d0510ed0c59633b_amd64",
"product_id": "registry.redhat.io/quay/quay-rhel8@sha256:a6813e5bf29916abf84b2d120a30cda07edf06f735c860ee4d0510ed0c59633b_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-rhel8@sha256%3Aa6813e5bf29916abf84b2d120a30cda07edf06f735c860ee4d0510ed0c59633b?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=3.9-1764254756"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8458e32483b897e156a5688ec6d96af2ff897e8c14dafb396c945f7c76b4c368_arm64",
"product": {
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8458e32483b897e156a5688ec6d96af2ff897e8c14dafb396c945f7c76b4c368_arm64",
"product_id": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8458e32483b897e156a5688ec6d96af2ff897e8c14dafb396c945f7c76b4c368_arm64",
"product_identification_helper": {
"purl": "pkg:oci/quay-container-security-operator-rhel8@sha256%3A8458e32483b897e156a5688ec6d96af2ff897e8c14dafb396c945f7c76b4c368?arch=arm64\u0026repository_url=registry.redhat.io/quay\u0026tag=3.9.17-1764254756"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:97dd28bc0b588ffc8fd9a171a946580c0572eb6fb34c85d5e1b799a12cf22574_arm64",
"product": {
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:97dd28bc0b588ffc8fd9a171a946580c0572eb6fb34c85d5e1b799a12cf22574_arm64",
"product_id": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:97dd28bc0b588ffc8fd9a171a946580c0572eb6fb34c85d5e1b799a12cf22574_arm64",
"product_identification_helper": {
"purl": "pkg:oci/quay-bridge-operator-rhel8@sha256%3A97dd28bc0b588ffc8fd9a171a946580c0572eb6fb34c85d5e1b799a12cf22574?arch=arm64\u0026repository_url=registry.redhat.io/quay\u0026tag=3.9-1764254756"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:60638663af472a24a79cc4a6ec7d4d78a3d10b0e09eec80f6da6855277ff139b_arm64",
"product": {
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:60638663af472a24a79cc4a6ec7d4d78a3d10b0e09eec80f6da6855277ff139b_arm64",
"product_id": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:60638663af472a24a79cc4a6ec7d4d78a3d10b0e09eec80f6da6855277ff139b_arm64",
"product_identification_helper": {
"purl": "pkg:oci/quay-builder-qemu-rhcos-rhel8@sha256%3A60638663af472a24a79cc4a6ec7d4d78a3d10b0e09eec80f6da6855277ff139b?arch=arm64\u0026repository_url=registry.redhat.io/quay\u0026tag=3.14-1764254756"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:76dd5f7b326afb6c72515daed8e65331f98cb7ad514612c06c85f14de6b525e4_arm64",
"product": {
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:76dd5f7b326afb6c72515daed8e65331f98cb7ad514612c06c85f14de6b525e4_arm64",
"product_id": "registry.redhat.io/quay/quay-builder-rhel8@sha256:76dd5f7b326afb6c72515daed8e65331f98cb7ad514612c06c85f14de6b525e4_arm64",
"product_identification_helper": {
"purl": "pkg:oci/quay-builder-rhel8@sha256%3A76dd5f7b326afb6c72515daed8e65331f98cb7ad514612c06c85f14de6b525e4?arch=arm64\u0026repository_url=registry.redhat.io/quay\u0026tag=8.10-1764254756"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/clair-rhel8@sha256:ad995b723102f4472e4190257b61582de5c6b058b908bcee7cebe683ae77be75_arm64",
"product": {
"name": "registry.redhat.io/quay/clair-rhel8@sha256:ad995b723102f4472e4190257b61582de5c6b058b908bcee7cebe683ae77be75_arm64",
"product_id": "registry.redhat.io/quay/clair-rhel8@sha256:ad995b723102f4472e4190257b61582de5c6b058b908bcee7cebe683ae77be75_arm64",
"product_identification_helper": {
"purl": "pkg:oci/clair-rhel8@sha256%3Aad995b723102f4472e4190257b61582de5c6b058b908bcee7cebe683ae77be75?arch=arm64\u0026repository_url=registry.redhat.io/quay\u0026tag=v3.9.0-1764254756"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:a6e6c1f865e6c3e237c36bbb58b3c0e533171303e21cbe4d829d05b497fcd5c7_arm64",
"product": {
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:a6e6c1f865e6c3e237c36bbb58b3c0e533171303e21cbe4d829d05b497fcd5c7_arm64",
"product_id": "registry.redhat.io/quay/quay-operator-rhel8@sha256:a6e6c1f865e6c3e237c36bbb58b3c0e533171303e21cbe4d829d05b497fcd5c7_arm64",
"product_identification_helper": {
"purl": "pkg:oci/quay-operator-rhel8@sha256%3Aa6e6c1f865e6c3e237c36bbb58b3c0e533171303e21cbe4d829d05b497fcd5c7?arch=arm64\u0026repository_url=registry.redhat.io/quay\u0026tag=3.9.17-1764254756"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-rhel8@sha256:f0814d33be7a101b6326fb8a536efc0fe66df764d1efa8ddda021e90e61afda9_arm64",
"product": {
"name": "registry.redhat.io/quay/quay-rhel8@sha256:f0814d33be7a101b6326fb8a536efc0fe66df764d1efa8ddda021e90e61afda9_arm64",
"product_id": "registry.redhat.io/quay/quay-rhel8@sha256:f0814d33be7a101b6326fb8a536efc0fe66df764d1efa8ddda021e90e61afda9_arm64",
"product_identification_helper": {
"purl": "pkg:oci/quay-rhel8@sha256%3Af0814d33be7a101b6326fb8a536efc0fe66df764d1efa8ddda021e90e61afda9?arch=arm64\u0026repository_url=registry.redhat.io/quay\u0026tag=3.9-1764254756"
}
}
}
],
"category": "architecture",
"name": "arm64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:ac042b538a7498bf3020c20234966fdbc9b6817aae343985f3bf8ba9fcfdb6d6_ppc64le",
"product": {
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:ac042b538a7498bf3020c20234966fdbc9b6817aae343985f3bf8ba9fcfdb6d6_ppc64le",
"product_id": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:ac042b538a7498bf3020c20234966fdbc9b6817aae343985f3bf8ba9fcfdb6d6_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/quay-container-security-operator-rhel8@sha256%3Aac042b538a7498bf3020c20234966fdbc9b6817aae343985f3bf8ba9fcfdb6d6?arch=ppc64le\u0026repository_url=registry.redhat.io/quay\u0026tag=3.9.17-1764254756"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:26a27da8aa0da9a6673907fe35de61cc93932386070dc3d7ad348e8c086b19d7_ppc64le",
"product": {
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:26a27da8aa0da9a6673907fe35de61cc93932386070dc3d7ad348e8c086b19d7_ppc64le",
"product_id": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:26a27da8aa0da9a6673907fe35de61cc93932386070dc3d7ad348e8c086b19d7_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/quay-bridge-operator-rhel8@sha256%3A26a27da8aa0da9a6673907fe35de61cc93932386070dc3d7ad348e8c086b19d7?arch=ppc64le\u0026repository_url=registry.redhat.io/quay\u0026tag=3.9-1764254756"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9a8d1b2e4b0497f96cbbdfa90d96239da9da8329917adca696ea6f0e20d2c2c0_ppc64le",
"product": {
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9a8d1b2e4b0497f96cbbdfa90d96239da9da8329917adca696ea6f0e20d2c2c0_ppc64le",
"product_id": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9a8d1b2e4b0497f96cbbdfa90d96239da9da8329917adca696ea6f0e20d2c2c0_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/quay-builder-qemu-rhcos-rhel8@sha256%3A9a8d1b2e4b0497f96cbbdfa90d96239da9da8329917adca696ea6f0e20d2c2c0?arch=ppc64le\u0026repository_url=registry.redhat.io/quay\u0026tag=3.14-1764254756"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:decf4b7e1917a2c551ea095c9798a65237879369e9f736a44b885e2589e5c05b_ppc64le",
"product": {
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:decf4b7e1917a2c551ea095c9798a65237879369e9f736a44b885e2589e5c05b_ppc64le",
"product_id": "registry.redhat.io/quay/quay-builder-rhel8@sha256:decf4b7e1917a2c551ea095c9798a65237879369e9f736a44b885e2589e5c05b_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/quay-builder-rhel8@sha256%3Adecf4b7e1917a2c551ea095c9798a65237879369e9f736a44b885e2589e5c05b?arch=ppc64le\u0026repository_url=registry.redhat.io/quay\u0026tag=8.10-1764254756"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/clair-rhel8@sha256:42a67bb2e5ab681eadc253b413f0bf557d63f282f270e6064f5768fecf6886e5_ppc64le",
"product": {
"name": "registry.redhat.io/quay/clair-rhel8@sha256:42a67bb2e5ab681eadc253b413f0bf557d63f282f270e6064f5768fecf6886e5_ppc64le",
"product_id": "registry.redhat.io/quay/clair-rhel8@sha256:42a67bb2e5ab681eadc253b413f0bf557d63f282f270e6064f5768fecf6886e5_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/clair-rhel8@sha256%3A42a67bb2e5ab681eadc253b413f0bf557d63f282f270e6064f5768fecf6886e5?arch=ppc64le\u0026repository_url=registry.redhat.io/quay\u0026tag=v3.9.0-1764254756"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:71a6e23a69d7c4723a2653f630c8b02057545c1be65e5f4401490f0364f0d43c_ppc64le",
"product": {
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:71a6e23a69d7c4723a2653f630c8b02057545c1be65e5f4401490f0364f0d43c_ppc64le",
"product_id": "registry.redhat.io/quay/quay-operator-rhel8@sha256:71a6e23a69d7c4723a2653f630c8b02057545c1be65e5f4401490f0364f0d43c_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/quay-operator-rhel8@sha256%3A71a6e23a69d7c4723a2653f630c8b02057545c1be65e5f4401490f0364f0d43c?arch=ppc64le\u0026repository_url=registry.redhat.io/quay\u0026tag=3.9.17-1764254756"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-rhel8@sha256:628dd4acfe11aef376cc6d75dc7c337c1e487113c2e78e003a3377472b22f488_ppc64le",
"product": {
"name": "registry.redhat.io/quay/quay-rhel8@sha256:628dd4acfe11aef376cc6d75dc7c337c1e487113c2e78e003a3377472b22f488_ppc64le",
"product_id": "registry.redhat.io/quay/quay-rhel8@sha256:628dd4acfe11aef376cc6d75dc7c337c1e487113c2e78e003a3377472b22f488_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/quay-rhel8@sha256%3A628dd4acfe11aef376cc6d75dc7c337c1e487113c2e78e003a3377472b22f488?arch=ppc64le\u0026repository_url=registry.redhat.io/quay\u0026tag=3.9-1764254756"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:5f2ba97f71eefadd2a84b031e536619dcf1a0b76ae9225592c05b99ec87ca9dc_s390x",
"product": {
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:5f2ba97f71eefadd2a84b031e536619dcf1a0b76ae9225592c05b99ec87ca9dc_s390x",
"product_id": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:5f2ba97f71eefadd2a84b031e536619dcf1a0b76ae9225592c05b99ec87ca9dc_s390x",
"product_identification_helper": {
"purl": "pkg:oci/quay-container-security-operator-rhel8@sha256%3A5f2ba97f71eefadd2a84b031e536619dcf1a0b76ae9225592c05b99ec87ca9dc?arch=s390x\u0026repository_url=registry.redhat.io/quay\u0026tag=3.9.17-1764254756"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b6179970b9060f74475ccd25cbb8f8a098ed5e71afb444058156e91e8a51d5a9_s390x",
"product": {
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b6179970b9060f74475ccd25cbb8f8a098ed5e71afb444058156e91e8a51d5a9_s390x",
"product_id": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b6179970b9060f74475ccd25cbb8f8a098ed5e71afb444058156e91e8a51d5a9_s390x",
"product_identification_helper": {
"purl": "pkg:oci/quay-bridge-operator-rhel8@sha256%3Ab6179970b9060f74475ccd25cbb8f8a098ed5e71afb444058156e91e8a51d5a9?arch=s390x\u0026repository_url=registry.redhat.io/quay\u0026tag=3.9-1764254756"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:c622550fb4630be48a1a6e1a8f9337718e4f934b5e5cd23bcc4300beb03eeeae_s390x",
"product": {
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:c622550fb4630be48a1a6e1a8f9337718e4f934b5e5cd23bcc4300beb03eeeae_s390x",
"product_id": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:c622550fb4630be48a1a6e1a8f9337718e4f934b5e5cd23bcc4300beb03eeeae_s390x",
"product_identification_helper": {
"purl": "pkg:oci/quay-builder-qemu-rhcos-rhel8@sha256%3Ac622550fb4630be48a1a6e1a8f9337718e4f934b5e5cd23bcc4300beb03eeeae?arch=s390x\u0026repository_url=registry.redhat.io/quay\u0026tag=3.14-1764254756"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:7cfa21df6e22c2157d2eb65b5e226863a121c8e661a1869b585ca0656fb6013a_s390x",
"product": {
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:7cfa21df6e22c2157d2eb65b5e226863a121c8e661a1869b585ca0656fb6013a_s390x",
"product_id": "registry.redhat.io/quay/quay-builder-rhel8@sha256:7cfa21df6e22c2157d2eb65b5e226863a121c8e661a1869b585ca0656fb6013a_s390x",
"product_identification_helper": {
"purl": "pkg:oci/quay-builder-rhel8@sha256%3A7cfa21df6e22c2157d2eb65b5e226863a121c8e661a1869b585ca0656fb6013a?arch=s390x\u0026repository_url=registry.redhat.io/quay\u0026tag=8.10-1764254756"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/clair-rhel8@sha256:880c746eb5822f68e41ca7b60d97799115c30f39bdc7e458f7a4101e2af36c8c_s390x",
"product": {
"name": "registry.redhat.io/quay/clair-rhel8@sha256:880c746eb5822f68e41ca7b60d97799115c30f39bdc7e458f7a4101e2af36c8c_s390x",
"product_id": "registry.redhat.io/quay/clair-rhel8@sha256:880c746eb5822f68e41ca7b60d97799115c30f39bdc7e458f7a4101e2af36c8c_s390x",
"product_identification_helper": {
"purl": "pkg:oci/clair-rhel8@sha256%3A880c746eb5822f68e41ca7b60d97799115c30f39bdc7e458f7a4101e2af36c8c?arch=s390x\u0026repository_url=registry.redhat.io/quay\u0026tag=v3.9.0-1764254756"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:278facca3eaf0c2091ad8575e85ac03aef6e8a52227511e7ee5f62bc2842dac8_s390x",
"product": {
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:278facca3eaf0c2091ad8575e85ac03aef6e8a52227511e7ee5f62bc2842dac8_s390x",
"product_id": "registry.redhat.io/quay/quay-operator-rhel8@sha256:278facca3eaf0c2091ad8575e85ac03aef6e8a52227511e7ee5f62bc2842dac8_s390x",
"product_identification_helper": {
"purl": "pkg:oci/quay-operator-rhel8@sha256%3A278facca3eaf0c2091ad8575e85ac03aef6e8a52227511e7ee5f62bc2842dac8?arch=s390x\u0026repository_url=registry.redhat.io/quay\u0026tag=3.9.17-1764254756"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-rhel8@sha256:c7c6fe7ff2592c0fdf51d6e3b0ce657dffcd131c60c00ce680acd89c5c286cee_s390x",
"product": {
"name": "registry.redhat.io/quay/quay-rhel8@sha256:c7c6fe7ff2592c0fdf51d6e3b0ce657dffcd131c60c00ce680acd89c5c286cee_s390x",
"product_id": "registry.redhat.io/quay/quay-rhel8@sha256:c7c6fe7ff2592c0fdf51d6e3b0ce657dffcd131c60c00ce680acd89c5c286cee_s390x",
"product_identification_helper": {
"purl": "pkg:oci/quay-rhel8@sha256%3Ac7c6fe7ff2592c0fdf51d6e3b0ce657dffcd131c60c00ce680acd89c5c286cee?arch=s390x\u0026repository_url=registry.redhat.io/quay\u0026tag=3.9-1764254756"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/clair-rhel8@sha256:02ced94ebfcce3e21bcc71af6aa1c11db50822c91dd05cec4fb41a34e6669112_amd64 as a component of Red Hat Quay 3.9",
"product_id": "Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:02ced94ebfcce3e21bcc71af6aa1c11db50822c91dd05cec4fb41a34e6669112_amd64"
},
"product_reference": "registry.redhat.io/quay/clair-rhel8@sha256:02ced94ebfcce3e21bcc71af6aa1c11db50822c91dd05cec4fb41a34e6669112_amd64",
"relates_to_product_reference": "Red Hat Quay 3.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/clair-rhel8@sha256:42a67bb2e5ab681eadc253b413f0bf557d63f282f270e6064f5768fecf6886e5_ppc64le as a component of Red Hat Quay 3.9",
"product_id": "Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:42a67bb2e5ab681eadc253b413f0bf557d63f282f270e6064f5768fecf6886e5_ppc64le"
},
"product_reference": "registry.redhat.io/quay/clair-rhel8@sha256:42a67bb2e5ab681eadc253b413f0bf557d63f282f270e6064f5768fecf6886e5_ppc64le",
"relates_to_product_reference": "Red Hat Quay 3.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/clair-rhel8@sha256:880c746eb5822f68e41ca7b60d97799115c30f39bdc7e458f7a4101e2af36c8c_s390x as a component of Red Hat Quay 3.9",
"product_id": "Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:880c746eb5822f68e41ca7b60d97799115c30f39bdc7e458f7a4101e2af36c8c_s390x"
},
"product_reference": "registry.redhat.io/quay/clair-rhel8@sha256:880c746eb5822f68e41ca7b60d97799115c30f39bdc7e458f7a4101e2af36c8c_s390x",
"relates_to_product_reference": "Red Hat Quay 3.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/clair-rhel8@sha256:ad995b723102f4472e4190257b61582de5c6b058b908bcee7cebe683ae77be75_arm64 as a component of Red Hat Quay 3.9",
"product_id": "Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:ad995b723102f4472e4190257b61582de5c6b058b908bcee7cebe683ae77be75_arm64"
},
"product_reference": "registry.redhat.io/quay/clair-rhel8@sha256:ad995b723102f4472e4190257b61582de5c6b058b908bcee7cebe683ae77be75_arm64",
"relates_to_product_reference": "Red Hat Quay 3.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:49db4fa7375da6397c45b6c09e10e20f5855348e21812d64474c3adec7f1cbdd_amd64 as a component of Red Hat Quay 3.9",
"product_id": "Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:49db4fa7375da6397c45b6c09e10e20f5855348e21812d64474c3adec7f1cbdd_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:49db4fa7375da6397c45b6c09e10e20f5855348e21812d64474c3adec7f1cbdd_amd64",
"relates_to_product_reference": "Red Hat Quay 3.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:235d66a1ef93f2ae13266709a30698d444d6e481b8edbdb252d49d9aea4b76ce_amd64 as a component of Red Hat Quay 3.9",
"product_id": "Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:235d66a1ef93f2ae13266709a30698d444d6e481b8edbdb252d49d9aea4b76ce_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:235d66a1ef93f2ae13266709a30698d444d6e481b8edbdb252d49d9aea4b76ce_amd64",
"relates_to_product_reference": "Red Hat Quay 3.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:26a27da8aa0da9a6673907fe35de61cc93932386070dc3d7ad348e8c086b19d7_ppc64le as a component of Red Hat Quay 3.9",
"product_id": "Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:26a27da8aa0da9a6673907fe35de61cc93932386070dc3d7ad348e8c086b19d7_ppc64le"
},
"product_reference": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:26a27da8aa0da9a6673907fe35de61cc93932386070dc3d7ad348e8c086b19d7_ppc64le",
"relates_to_product_reference": "Red Hat Quay 3.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:97dd28bc0b588ffc8fd9a171a946580c0572eb6fb34c85d5e1b799a12cf22574_arm64 as a component of Red Hat Quay 3.9",
"product_id": "Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:97dd28bc0b588ffc8fd9a171a946580c0572eb6fb34c85d5e1b799a12cf22574_arm64"
},
"product_reference": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:97dd28bc0b588ffc8fd9a171a946580c0572eb6fb34c85d5e1b799a12cf22574_arm64",
"relates_to_product_reference": "Red Hat Quay 3.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b6179970b9060f74475ccd25cbb8f8a098ed5e71afb444058156e91e8a51d5a9_s390x as a component of Red Hat Quay 3.9",
"product_id": "Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b6179970b9060f74475ccd25cbb8f8a098ed5e71afb444058156e91e8a51d5a9_s390x"
},
"product_reference": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b6179970b9060f74475ccd25cbb8f8a098ed5e71afb444058156e91e8a51d5a9_s390x",
"relates_to_product_reference": "Red Hat Quay 3.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:60638663af472a24a79cc4a6ec7d4d78a3d10b0e09eec80f6da6855277ff139b_arm64 as a component of Red Hat Quay 3.9",
"product_id": "Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:60638663af472a24a79cc4a6ec7d4d78a3d10b0e09eec80f6da6855277ff139b_arm64"
},
"product_reference": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:60638663af472a24a79cc4a6ec7d4d78a3d10b0e09eec80f6da6855277ff139b_arm64",
"relates_to_product_reference": "Red Hat Quay 3.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:8ca3e5903314362c191c6acd1d3865436d85daf50e284760da21e28f473a8ee5_amd64 as a component of Red Hat Quay 3.9",
"product_id": "Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:8ca3e5903314362c191c6acd1d3865436d85daf50e284760da21e28f473a8ee5_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:8ca3e5903314362c191c6acd1d3865436d85daf50e284760da21e28f473a8ee5_amd64",
"relates_to_product_reference": "Red Hat Quay 3.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9a8d1b2e4b0497f96cbbdfa90d96239da9da8329917adca696ea6f0e20d2c2c0_ppc64le as a component of Red Hat Quay 3.9",
"product_id": "Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9a8d1b2e4b0497f96cbbdfa90d96239da9da8329917adca696ea6f0e20d2c2c0_ppc64le"
},
"product_reference": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9a8d1b2e4b0497f96cbbdfa90d96239da9da8329917adca696ea6f0e20d2c2c0_ppc64le",
"relates_to_product_reference": "Red Hat Quay 3.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:c622550fb4630be48a1a6e1a8f9337718e4f934b5e5cd23bcc4300beb03eeeae_s390x as a component of Red Hat Quay 3.9",
"product_id": "Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:c622550fb4630be48a1a6e1a8f9337718e4f934b5e5cd23bcc4300beb03eeeae_s390x"
},
"product_reference": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:c622550fb4630be48a1a6e1a8f9337718e4f934b5e5cd23bcc4300beb03eeeae_s390x",
"relates_to_product_reference": "Red Hat Quay 3.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:76dd5f7b326afb6c72515daed8e65331f98cb7ad514612c06c85f14de6b525e4_arm64 as a component of Red Hat Quay 3.9",
"product_id": "Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:76dd5f7b326afb6c72515daed8e65331f98cb7ad514612c06c85f14de6b525e4_arm64"
},
"product_reference": "registry.redhat.io/quay/quay-builder-rhel8@sha256:76dd5f7b326afb6c72515daed8e65331f98cb7ad514612c06c85f14de6b525e4_arm64",
"relates_to_product_reference": "Red Hat Quay 3.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:7cfa21df6e22c2157d2eb65b5e226863a121c8e661a1869b585ca0656fb6013a_s390x as a component of Red Hat Quay 3.9",
"product_id": "Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:7cfa21df6e22c2157d2eb65b5e226863a121c8e661a1869b585ca0656fb6013a_s390x"
},
"product_reference": "registry.redhat.io/quay/quay-builder-rhel8@sha256:7cfa21df6e22c2157d2eb65b5e226863a121c8e661a1869b585ca0656fb6013a_s390x",
"relates_to_product_reference": "Red Hat Quay 3.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:9b69aadfde5c4cbde98f496c54ce396d1daa5277b8f59577f22855345604442e_amd64 as a component of Red Hat Quay 3.9",
"product_id": "Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:9b69aadfde5c4cbde98f496c54ce396d1daa5277b8f59577f22855345604442e_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-builder-rhel8@sha256:9b69aadfde5c4cbde98f496c54ce396d1daa5277b8f59577f22855345604442e_amd64",
"relates_to_product_reference": "Red Hat Quay 3.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:decf4b7e1917a2c551ea095c9798a65237879369e9f736a44b885e2589e5c05b_ppc64le as a component of Red Hat Quay 3.9",
"product_id": "Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:decf4b7e1917a2c551ea095c9798a65237879369e9f736a44b885e2589e5c05b_ppc64le"
},
"product_reference": "registry.redhat.io/quay/quay-builder-rhel8@sha256:decf4b7e1917a2c551ea095c9798a65237879369e9f736a44b885e2589e5c05b_ppc64le",
"relates_to_product_reference": "Red Hat Quay 3.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:878b011b86512d01021feb10cdd54608a3ab68d2f3db5a1d53ce8feaa9e56878_amd64 as a component of Red Hat Quay 3.9",
"product_id": "Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:878b011b86512d01021feb10cdd54608a3ab68d2f3db5a1d53ce8feaa9e56878_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:878b011b86512d01021feb10cdd54608a3ab68d2f3db5a1d53ce8feaa9e56878_amd64",
"relates_to_product_reference": "Red Hat Quay 3.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:54003d9396862c6e3b675455ac8c0159662a6640bb889ffb34516d2d091275de_amd64 as a component of Red Hat Quay 3.9",
"product_id": "Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:54003d9396862c6e3b675455ac8c0159662a6640bb889ffb34516d2d091275de_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:54003d9396862c6e3b675455ac8c0159662a6640bb889ffb34516d2d091275de_amd64",
"relates_to_product_reference": "Red Hat Quay 3.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:5f2ba97f71eefadd2a84b031e536619dcf1a0b76ae9225592c05b99ec87ca9dc_s390x as a component of Red Hat Quay 3.9",
"product_id": "Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:5f2ba97f71eefadd2a84b031e536619dcf1a0b76ae9225592c05b99ec87ca9dc_s390x"
},
"product_reference": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:5f2ba97f71eefadd2a84b031e536619dcf1a0b76ae9225592c05b99ec87ca9dc_s390x",
"relates_to_product_reference": "Red Hat Quay 3.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8458e32483b897e156a5688ec6d96af2ff897e8c14dafb396c945f7c76b4c368_arm64 as a component of Red Hat Quay 3.9",
"product_id": "Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8458e32483b897e156a5688ec6d96af2ff897e8c14dafb396c945f7c76b4c368_arm64"
},
"product_reference": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8458e32483b897e156a5688ec6d96af2ff897e8c14dafb396c945f7c76b4c368_arm64",
"relates_to_product_reference": "Red Hat Quay 3.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:ac042b538a7498bf3020c20234966fdbc9b6817aae343985f3bf8ba9fcfdb6d6_ppc64le as a component of Red Hat Quay 3.9",
"product_id": "Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:ac042b538a7498bf3020c20234966fdbc9b6817aae343985f3bf8ba9fcfdb6d6_ppc64le"
},
"product_reference": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:ac042b538a7498bf3020c20234966fdbc9b6817aae343985f3bf8ba9fcfdb6d6_ppc64le",
"relates_to_product_reference": "Red Hat Quay 3.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-operator-bundle@sha256:ce217da657cabd3cf9beaff3a3b096309738c33932f2ad33d46b03870598f0c4_amd64 as a component of Red Hat Quay 3.9",
"product_id": "Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-bundle@sha256:ce217da657cabd3cf9beaff3a3b096309738c33932f2ad33d46b03870598f0c4_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-operator-bundle@sha256:ce217da657cabd3cf9beaff3a3b096309738c33932f2ad33d46b03870598f0c4_amd64",
"relates_to_product_reference": "Red Hat Quay 3.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:278facca3eaf0c2091ad8575e85ac03aef6e8a52227511e7ee5f62bc2842dac8_s390x as a component of Red Hat Quay 3.9",
"product_id": "Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:278facca3eaf0c2091ad8575e85ac03aef6e8a52227511e7ee5f62bc2842dac8_s390x"
},
"product_reference": "registry.redhat.io/quay/quay-operator-rhel8@sha256:278facca3eaf0c2091ad8575e85ac03aef6e8a52227511e7ee5f62bc2842dac8_s390x",
"relates_to_product_reference": "Red Hat Quay 3.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:71a6e23a69d7c4723a2653f630c8b02057545c1be65e5f4401490f0364f0d43c_ppc64le as a component of Red Hat Quay 3.9",
"product_id": "Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:71a6e23a69d7c4723a2653f630c8b02057545c1be65e5f4401490f0364f0d43c_ppc64le"
},
"product_reference": "registry.redhat.io/quay/quay-operator-rhel8@sha256:71a6e23a69d7c4723a2653f630c8b02057545c1be65e5f4401490f0364f0d43c_ppc64le",
"relates_to_product_reference": "Red Hat Quay 3.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:a6e6c1f865e6c3e237c36bbb58b3c0e533171303e21cbe4d829d05b497fcd5c7_arm64 as a component of Red Hat Quay 3.9",
"product_id": "Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:a6e6c1f865e6c3e237c36bbb58b3c0e533171303e21cbe4d829d05b497fcd5c7_arm64"
},
"product_reference": "registry.redhat.io/quay/quay-operator-rhel8@sha256:a6e6c1f865e6c3e237c36bbb58b3c0e533171303e21cbe4d829d05b497fcd5c7_arm64",
"relates_to_product_reference": "Red Hat Quay 3.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:f4ab11e6a09b983a4af87723877338a79b45c36b3848b0e8032963a330d98467_amd64 as a component of Red Hat Quay 3.9",
"product_id": "Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:f4ab11e6a09b983a4af87723877338a79b45c36b3848b0e8032963a330d98467_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-operator-rhel8@sha256:f4ab11e6a09b983a4af87723877338a79b45c36b3848b0e8032963a330d98467_amd64",
"relates_to_product_reference": "Red Hat Quay 3.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-rhel8@sha256:628dd4acfe11aef376cc6d75dc7c337c1e487113c2e78e003a3377472b22f488_ppc64le as a component of Red Hat Quay 3.9",
"product_id": "Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:628dd4acfe11aef376cc6d75dc7c337c1e487113c2e78e003a3377472b22f488_ppc64le"
},
"product_reference": "registry.redhat.io/quay/quay-rhel8@sha256:628dd4acfe11aef376cc6d75dc7c337c1e487113c2e78e003a3377472b22f488_ppc64le",
"relates_to_product_reference": "Red Hat Quay 3.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-rhel8@sha256:a6813e5bf29916abf84b2d120a30cda07edf06f735c860ee4d0510ed0c59633b_amd64 as a component of Red Hat Quay 3.9",
"product_id": "Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:a6813e5bf29916abf84b2d120a30cda07edf06f735c860ee4d0510ed0c59633b_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-rhel8@sha256:a6813e5bf29916abf84b2d120a30cda07edf06f735c860ee4d0510ed0c59633b_amd64",
"relates_to_product_reference": "Red Hat Quay 3.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-rhel8@sha256:c7c6fe7ff2592c0fdf51d6e3b0ce657dffcd131c60c00ce680acd89c5c286cee_s390x as a component of Red Hat Quay 3.9",
"product_id": "Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:c7c6fe7ff2592c0fdf51d6e3b0ce657dffcd131c60c00ce680acd89c5c286cee_s390x"
},
"product_reference": "registry.redhat.io/quay/quay-rhel8@sha256:c7c6fe7ff2592c0fdf51d6e3b0ce657dffcd131c60c00ce680acd89c5c286cee_s390x",
"relates_to_product_reference": "Red Hat Quay 3.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-rhel8@sha256:f0814d33be7a101b6326fb8a536efc0fe66df764d1efa8ddda021e90e61afda9_arm64 as a component of Red Hat Quay 3.9",
"product_id": "Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:f0814d33be7a101b6326fb8a536efc0fe66df764d1efa8ddda021e90e61afda9_arm64"
},
"product_reference": "registry.redhat.io/quay/quay-rhel8@sha256:f0814d33be7a101b6326fb8a536efc0fe66df764d1efa8ddda021e90e61afda9_arm64",
"relates_to_product_reference": "Red Hat Quay 3.9"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-34156",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"discovery_date": "2024-09-06T21:20:09.377905+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:02ced94ebfcce3e21bcc71af6aa1c11db50822c91dd05cec4fb41a34e6669112_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:42a67bb2e5ab681eadc253b413f0bf557d63f282f270e6064f5768fecf6886e5_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:880c746eb5822f68e41ca7b60d97799115c30f39bdc7e458f7a4101e2af36c8c_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:ad995b723102f4472e4190257b61582de5c6b058b908bcee7cebe683ae77be75_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:49db4fa7375da6397c45b6c09e10e20f5855348e21812d64474c3adec7f1cbdd_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:235d66a1ef93f2ae13266709a30698d444d6e481b8edbdb252d49d9aea4b76ce_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:26a27da8aa0da9a6673907fe35de61cc93932386070dc3d7ad348e8c086b19d7_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:97dd28bc0b588ffc8fd9a171a946580c0572eb6fb34c85d5e1b799a12cf22574_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b6179970b9060f74475ccd25cbb8f8a098ed5e71afb444058156e91e8a51d5a9_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:60638663af472a24a79cc4a6ec7d4d78a3d10b0e09eec80f6da6855277ff139b_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:8ca3e5903314362c191c6acd1d3865436d85daf50e284760da21e28f473a8ee5_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9a8d1b2e4b0497f96cbbdfa90d96239da9da8329917adca696ea6f0e20d2c2c0_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:c622550fb4630be48a1a6e1a8f9337718e4f934b5e5cd23bcc4300beb03eeeae_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:76dd5f7b326afb6c72515daed8e65331f98cb7ad514612c06c85f14de6b525e4_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:7cfa21df6e22c2157d2eb65b5e226863a121c8e661a1869b585ca0656fb6013a_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:9b69aadfde5c4cbde98f496c54ce396d1daa5277b8f59577f22855345604442e_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:decf4b7e1917a2c551ea095c9798a65237879369e9f736a44b885e2589e5c05b_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:878b011b86512d01021feb10cdd54608a3ab68d2f3db5a1d53ce8feaa9e56878_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:54003d9396862c6e3b675455ac8c0159662a6640bb889ffb34516d2d091275de_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:5f2ba97f71eefadd2a84b031e536619dcf1a0b76ae9225592c05b99ec87ca9dc_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8458e32483b897e156a5688ec6d96af2ff897e8c14dafb396c945f7c76b4c368_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:ac042b538a7498bf3020c20234966fdbc9b6817aae343985f3bf8ba9fcfdb6d6_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-bundle@sha256:ce217da657cabd3cf9beaff3a3b096309738c33932f2ad33d46b03870598f0c4_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:628dd4acfe11aef376cc6d75dc7c337c1e487113c2e78e003a3377472b22f488_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:a6813e5bf29916abf84b2d120a30cda07edf06f735c860ee4d0510ed0c59633b_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:c7c6fe7ff2592c0fdf51d6e3b0ce657dffcd131c60c00ce680acd89c5c286cee_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:f0814d33be7a101b6326fb8a536efc0fe66df764d1efa8ddda021e90e61afda9_arm64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2310528"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the encoding/gob package of the Golang standard library. Calling Decoder.Decoding, a message that contains deeply nested structures, can cause a panic due to stack exhaustion. This is a follow-up to CVE-2022-30635.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability in Go\u0027s `encoding/gob` package is of high severity because it exposes applications to potential Denial of Service (DoS) attacks through stack exhaustion. Since `gob` relies on recursive function calls to decode nested structures, an attacker could exploit this by sending crafted messages with excessively deep nesting, causing the application to panic due to stack overflow. This risk is particularly important in scenarios where untrusted or external input is processed, as it can lead to system unavailability or crashes, undermining the reliability and availability of services.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:278facca3eaf0c2091ad8575e85ac03aef6e8a52227511e7ee5f62bc2842dac8_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:71a6e23a69d7c4723a2653f630c8b02057545c1be65e5f4401490f0364f0d43c_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:a6e6c1f865e6c3e237c36bbb58b3c0e533171303e21cbe4d829d05b497fcd5c7_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:f4ab11e6a09b983a4af87723877338a79b45c36b3848b0e8032963a330d98467_amd64"
],
"known_not_affected": [
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:02ced94ebfcce3e21bcc71af6aa1c11db50822c91dd05cec4fb41a34e6669112_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:42a67bb2e5ab681eadc253b413f0bf557d63f282f270e6064f5768fecf6886e5_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:880c746eb5822f68e41ca7b60d97799115c30f39bdc7e458f7a4101e2af36c8c_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:ad995b723102f4472e4190257b61582de5c6b058b908bcee7cebe683ae77be75_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:49db4fa7375da6397c45b6c09e10e20f5855348e21812d64474c3adec7f1cbdd_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:235d66a1ef93f2ae13266709a30698d444d6e481b8edbdb252d49d9aea4b76ce_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:26a27da8aa0da9a6673907fe35de61cc93932386070dc3d7ad348e8c086b19d7_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:97dd28bc0b588ffc8fd9a171a946580c0572eb6fb34c85d5e1b799a12cf22574_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b6179970b9060f74475ccd25cbb8f8a098ed5e71afb444058156e91e8a51d5a9_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:60638663af472a24a79cc4a6ec7d4d78a3d10b0e09eec80f6da6855277ff139b_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:8ca3e5903314362c191c6acd1d3865436d85daf50e284760da21e28f473a8ee5_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9a8d1b2e4b0497f96cbbdfa90d96239da9da8329917adca696ea6f0e20d2c2c0_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:c622550fb4630be48a1a6e1a8f9337718e4f934b5e5cd23bcc4300beb03eeeae_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:76dd5f7b326afb6c72515daed8e65331f98cb7ad514612c06c85f14de6b525e4_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:7cfa21df6e22c2157d2eb65b5e226863a121c8e661a1869b585ca0656fb6013a_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:9b69aadfde5c4cbde98f496c54ce396d1daa5277b8f59577f22855345604442e_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:decf4b7e1917a2c551ea095c9798a65237879369e9f736a44b885e2589e5c05b_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:878b011b86512d01021feb10cdd54608a3ab68d2f3db5a1d53ce8feaa9e56878_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:54003d9396862c6e3b675455ac8c0159662a6640bb889ffb34516d2d091275de_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:5f2ba97f71eefadd2a84b031e536619dcf1a0b76ae9225592c05b99ec87ca9dc_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8458e32483b897e156a5688ec6d96af2ff897e8c14dafb396c945f7c76b4c368_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:ac042b538a7498bf3020c20234966fdbc9b6817aae343985f3bf8ba9fcfdb6d6_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-bundle@sha256:ce217da657cabd3cf9beaff3a3b096309738c33932f2ad33d46b03870598f0c4_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:628dd4acfe11aef376cc6d75dc7c337c1e487113c2e78e003a3377472b22f488_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:a6813e5bf29916abf84b2d120a30cda07edf06f735c860ee4d0510ed0c59633b_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:c7c6fe7ff2592c0fdf51d6e3b0ce657dffcd131c60c00ce680acd89c5c286cee_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:f0814d33be7a101b6326fb8a536efc0fe66df764d1efa8ddda021e90e61afda9_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-34156"
},
{
"category": "external",
"summary": "RHBZ#2310528",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2310528"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-34156",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34156"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-34156",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-34156"
},
{
"category": "external",
"summary": "https://go.dev/cl/611239",
"url": "https://go.dev/cl/611239"
},
{
"category": "external",
"summary": "https://go.dev/issue/69139",
"url": "https://go.dev/issue/69139"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-dev/c/S9POB9NCTdk",
"url": "https://groups.google.com/g/golang-dev/c/S9POB9NCTdk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2024-3106",
"url": "https://pkg.go.dev/vuln/GO-2024-3106"
}
],
"release_date": "2024-09-06T21:15:12.020000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-11-27T14:54:51+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:278facca3eaf0c2091ad8575e85ac03aef6e8a52227511e7ee5f62bc2842dac8_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:71a6e23a69d7c4723a2653f630c8b02057545c1be65e5f4401490f0364f0d43c_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:a6e6c1f865e6c3e237c36bbb58b3c0e533171303e21cbe4d829d05b497fcd5c7_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:f4ab11e6a09b983a4af87723877338a79b45c36b3848b0e8032963a330d98467_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:22287"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:02ced94ebfcce3e21bcc71af6aa1c11db50822c91dd05cec4fb41a34e6669112_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:42a67bb2e5ab681eadc253b413f0bf557d63f282f270e6064f5768fecf6886e5_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:880c746eb5822f68e41ca7b60d97799115c30f39bdc7e458f7a4101e2af36c8c_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:ad995b723102f4472e4190257b61582de5c6b058b908bcee7cebe683ae77be75_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:49db4fa7375da6397c45b6c09e10e20f5855348e21812d64474c3adec7f1cbdd_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:235d66a1ef93f2ae13266709a30698d444d6e481b8edbdb252d49d9aea4b76ce_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:26a27da8aa0da9a6673907fe35de61cc93932386070dc3d7ad348e8c086b19d7_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:97dd28bc0b588ffc8fd9a171a946580c0572eb6fb34c85d5e1b799a12cf22574_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b6179970b9060f74475ccd25cbb8f8a098ed5e71afb444058156e91e8a51d5a9_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:60638663af472a24a79cc4a6ec7d4d78a3d10b0e09eec80f6da6855277ff139b_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:8ca3e5903314362c191c6acd1d3865436d85daf50e284760da21e28f473a8ee5_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9a8d1b2e4b0497f96cbbdfa90d96239da9da8329917adca696ea6f0e20d2c2c0_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:c622550fb4630be48a1a6e1a8f9337718e4f934b5e5cd23bcc4300beb03eeeae_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:76dd5f7b326afb6c72515daed8e65331f98cb7ad514612c06c85f14de6b525e4_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:7cfa21df6e22c2157d2eb65b5e226863a121c8e661a1869b585ca0656fb6013a_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:9b69aadfde5c4cbde98f496c54ce396d1daa5277b8f59577f22855345604442e_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:decf4b7e1917a2c551ea095c9798a65237879369e9f736a44b885e2589e5c05b_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:878b011b86512d01021feb10cdd54608a3ab68d2f3db5a1d53ce8feaa9e56878_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:54003d9396862c6e3b675455ac8c0159662a6640bb889ffb34516d2d091275de_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:5f2ba97f71eefadd2a84b031e536619dcf1a0b76ae9225592c05b99ec87ca9dc_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8458e32483b897e156a5688ec6d96af2ff897e8c14dafb396c945f7c76b4c368_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:ac042b538a7498bf3020c20234966fdbc9b6817aae343985f3bf8ba9fcfdb6d6_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-bundle@sha256:ce217da657cabd3cf9beaff3a3b096309738c33932f2ad33d46b03870598f0c4_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:278facca3eaf0c2091ad8575e85ac03aef6e8a52227511e7ee5f62bc2842dac8_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:71a6e23a69d7c4723a2653f630c8b02057545c1be65e5f4401490f0364f0d43c_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:a6e6c1f865e6c3e237c36bbb58b3c0e533171303e21cbe4d829d05b497fcd5c7_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:f4ab11e6a09b983a4af87723877338a79b45c36b3848b0e8032963a330d98467_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:628dd4acfe11aef376cc6d75dc7c337c1e487113c2e78e003a3377472b22f488_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:a6813e5bf29916abf84b2d120a30cda07edf06f735c860ee4d0510ed0c59633b_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:c7c6fe7ff2592c0fdf51d6e3b0ce657dffcd131c60c00ce680acd89c5c286cee_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:f0814d33be7a101b6326fb8a536efc0fe66df764d1efa8ddda021e90e61afda9_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:02ced94ebfcce3e21bcc71af6aa1c11db50822c91dd05cec4fb41a34e6669112_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:42a67bb2e5ab681eadc253b413f0bf557d63f282f270e6064f5768fecf6886e5_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:880c746eb5822f68e41ca7b60d97799115c30f39bdc7e458f7a4101e2af36c8c_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:ad995b723102f4472e4190257b61582de5c6b058b908bcee7cebe683ae77be75_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:49db4fa7375da6397c45b6c09e10e20f5855348e21812d64474c3adec7f1cbdd_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:235d66a1ef93f2ae13266709a30698d444d6e481b8edbdb252d49d9aea4b76ce_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:26a27da8aa0da9a6673907fe35de61cc93932386070dc3d7ad348e8c086b19d7_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:97dd28bc0b588ffc8fd9a171a946580c0572eb6fb34c85d5e1b799a12cf22574_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b6179970b9060f74475ccd25cbb8f8a098ed5e71afb444058156e91e8a51d5a9_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:60638663af472a24a79cc4a6ec7d4d78a3d10b0e09eec80f6da6855277ff139b_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:8ca3e5903314362c191c6acd1d3865436d85daf50e284760da21e28f473a8ee5_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9a8d1b2e4b0497f96cbbdfa90d96239da9da8329917adca696ea6f0e20d2c2c0_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:c622550fb4630be48a1a6e1a8f9337718e4f934b5e5cd23bcc4300beb03eeeae_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:76dd5f7b326afb6c72515daed8e65331f98cb7ad514612c06c85f14de6b525e4_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:7cfa21df6e22c2157d2eb65b5e226863a121c8e661a1869b585ca0656fb6013a_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:9b69aadfde5c4cbde98f496c54ce396d1daa5277b8f59577f22855345604442e_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:decf4b7e1917a2c551ea095c9798a65237879369e9f736a44b885e2589e5c05b_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:878b011b86512d01021feb10cdd54608a3ab68d2f3db5a1d53ce8feaa9e56878_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:54003d9396862c6e3b675455ac8c0159662a6640bb889ffb34516d2d091275de_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:5f2ba97f71eefadd2a84b031e536619dcf1a0b76ae9225592c05b99ec87ca9dc_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8458e32483b897e156a5688ec6d96af2ff897e8c14dafb396c945f7c76b4c368_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:ac042b538a7498bf3020c20234966fdbc9b6817aae343985f3bf8ba9fcfdb6d6_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-bundle@sha256:ce217da657cabd3cf9beaff3a3b096309738c33932f2ad33d46b03870598f0c4_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:278facca3eaf0c2091ad8575e85ac03aef6e8a52227511e7ee5f62bc2842dac8_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:71a6e23a69d7c4723a2653f630c8b02057545c1be65e5f4401490f0364f0d43c_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:a6e6c1f865e6c3e237c36bbb58b3c0e533171303e21cbe4d829d05b497fcd5c7_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:f4ab11e6a09b983a4af87723877338a79b45c36b3848b0e8032963a330d98467_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:628dd4acfe11aef376cc6d75dc7c337c1e487113c2e78e003a3377472b22f488_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:a6813e5bf29916abf84b2d120a30cda07edf06f735c860ee4d0510ed0c59633b_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:c7c6fe7ff2592c0fdf51d6e3b0ce657dffcd131c60c00ce680acd89c5c286cee_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:f0814d33be7a101b6326fb8a536efc0fe66df764d1efa8ddda021e90e61afda9_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion"
},
{
"cve": "CVE-2024-45337",
"cwe": {
"id": "CWE-285",
"name": "Improper Authorization"
},
"discovery_date": "2024-12-11T19:00:54.247490+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:02ced94ebfcce3e21bcc71af6aa1c11db50822c91dd05cec4fb41a34e6669112_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:42a67bb2e5ab681eadc253b413f0bf557d63f282f270e6064f5768fecf6886e5_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:880c746eb5822f68e41ca7b60d97799115c30f39bdc7e458f7a4101e2af36c8c_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:ad995b723102f4472e4190257b61582de5c6b058b908bcee7cebe683ae77be75_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:49db4fa7375da6397c45b6c09e10e20f5855348e21812d64474c3adec7f1cbdd_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:235d66a1ef93f2ae13266709a30698d444d6e481b8edbdb252d49d9aea4b76ce_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:26a27da8aa0da9a6673907fe35de61cc93932386070dc3d7ad348e8c086b19d7_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:97dd28bc0b588ffc8fd9a171a946580c0572eb6fb34c85d5e1b799a12cf22574_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b6179970b9060f74475ccd25cbb8f8a098ed5e71afb444058156e91e8a51d5a9_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:60638663af472a24a79cc4a6ec7d4d78a3d10b0e09eec80f6da6855277ff139b_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:8ca3e5903314362c191c6acd1d3865436d85daf50e284760da21e28f473a8ee5_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9a8d1b2e4b0497f96cbbdfa90d96239da9da8329917adca696ea6f0e20d2c2c0_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:c622550fb4630be48a1a6e1a8f9337718e4f934b5e5cd23bcc4300beb03eeeae_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:76dd5f7b326afb6c72515daed8e65331f98cb7ad514612c06c85f14de6b525e4_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:7cfa21df6e22c2157d2eb65b5e226863a121c8e661a1869b585ca0656fb6013a_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:9b69aadfde5c4cbde98f496c54ce396d1daa5277b8f59577f22855345604442e_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:decf4b7e1917a2c551ea095c9798a65237879369e9f736a44b885e2589e5c05b_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:878b011b86512d01021feb10cdd54608a3ab68d2f3db5a1d53ce8feaa9e56878_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:54003d9396862c6e3b675455ac8c0159662a6640bb889ffb34516d2d091275de_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:5f2ba97f71eefadd2a84b031e536619dcf1a0b76ae9225592c05b99ec87ca9dc_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8458e32483b897e156a5688ec6d96af2ff897e8c14dafb396c945f7c76b4c368_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:ac042b538a7498bf3020c20234966fdbc9b6817aae343985f3bf8ba9fcfdb6d6_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-bundle@sha256:ce217da657cabd3cf9beaff3a3b096309738c33932f2ad33d46b03870598f0c4_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:628dd4acfe11aef376cc6d75dc7c337c1e487113c2e78e003a3377472b22f488_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:a6813e5bf29916abf84b2d120a30cda07edf06f735c860ee4d0510ed0c59633b_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:c7c6fe7ff2592c0fdf51d6e3b0ce657dffcd131c60c00ce680acd89c5c286cee_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:f0814d33be7a101b6326fb8a536efc0fe66df764d1efa8ddda021e90e61afda9_arm64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2331720"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the x/crypto/ssh go library. Applications and libraries that misuse the ServerConfig.PublicKeyCallback callback may be susceptible to an authorization bypass. For example, an attacker may send public keys A and B and authenticate with A. PublicKeyCallback would be called only twice, first with A and then with B. A vulnerable application may then make authorization decisions based on key B, for which the attacker does not control the private key. The misuse of ServerConfig.PublicKeyCallback may cause an authorization bypass.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang.org/x/crypto/ssh: Misuse of ServerConfig.PublicKeyCallback may cause authorization bypass in golang.org/x/crypto",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is classified as important rather than critical because it does not directly enable unauthorized access but rather introduces a risk of authorization bypass if the application or library misuses the PublicKeyCallback API. The vulnerability relies on incorrect assumptions made by the application when handling the sequence or state of keys provided during SSH authentication. Properly implemented systems that use the Permissions field or avoid relying on external state remain unaffected. Additionally, the vulnerability does not allow direct exploitation to gain control over a system without the presence of insecure logic in the application\u0027s handling of authentication attempts.\n\n\nRed Hat Enterprise Linux(RHEL) 8 \u0026 9 and Red Hat Openshift marked as not affected as it was determined that the problem function `ServerConfig.PublicKeyCallback`, as noted in the CVE-2024-45337 issue, is not called by Podman, Buildah, containers-common, or the gvisor-tap-vsock projects.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:278facca3eaf0c2091ad8575e85ac03aef6e8a52227511e7ee5f62bc2842dac8_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:71a6e23a69d7c4723a2653f630c8b02057545c1be65e5f4401490f0364f0d43c_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:a6e6c1f865e6c3e237c36bbb58b3c0e533171303e21cbe4d829d05b497fcd5c7_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:f4ab11e6a09b983a4af87723877338a79b45c36b3848b0e8032963a330d98467_amd64"
],
"known_not_affected": [
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:02ced94ebfcce3e21bcc71af6aa1c11db50822c91dd05cec4fb41a34e6669112_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:42a67bb2e5ab681eadc253b413f0bf557d63f282f270e6064f5768fecf6886e5_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:880c746eb5822f68e41ca7b60d97799115c30f39bdc7e458f7a4101e2af36c8c_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:ad995b723102f4472e4190257b61582de5c6b058b908bcee7cebe683ae77be75_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:49db4fa7375da6397c45b6c09e10e20f5855348e21812d64474c3adec7f1cbdd_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:235d66a1ef93f2ae13266709a30698d444d6e481b8edbdb252d49d9aea4b76ce_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:26a27da8aa0da9a6673907fe35de61cc93932386070dc3d7ad348e8c086b19d7_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:97dd28bc0b588ffc8fd9a171a946580c0572eb6fb34c85d5e1b799a12cf22574_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b6179970b9060f74475ccd25cbb8f8a098ed5e71afb444058156e91e8a51d5a9_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:60638663af472a24a79cc4a6ec7d4d78a3d10b0e09eec80f6da6855277ff139b_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:8ca3e5903314362c191c6acd1d3865436d85daf50e284760da21e28f473a8ee5_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9a8d1b2e4b0497f96cbbdfa90d96239da9da8329917adca696ea6f0e20d2c2c0_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:c622550fb4630be48a1a6e1a8f9337718e4f934b5e5cd23bcc4300beb03eeeae_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:76dd5f7b326afb6c72515daed8e65331f98cb7ad514612c06c85f14de6b525e4_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:7cfa21df6e22c2157d2eb65b5e226863a121c8e661a1869b585ca0656fb6013a_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:9b69aadfde5c4cbde98f496c54ce396d1daa5277b8f59577f22855345604442e_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:decf4b7e1917a2c551ea095c9798a65237879369e9f736a44b885e2589e5c05b_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:878b011b86512d01021feb10cdd54608a3ab68d2f3db5a1d53ce8feaa9e56878_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:54003d9396862c6e3b675455ac8c0159662a6640bb889ffb34516d2d091275de_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:5f2ba97f71eefadd2a84b031e536619dcf1a0b76ae9225592c05b99ec87ca9dc_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8458e32483b897e156a5688ec6d96af2ff897e8c14dafb396c945f7c76b4c368_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:ac042b538a7498bf3020c20234966fdbc9b6817aae343985f3bf8ba9fcfdb6d6_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-bundle@sha256:ce217da657cabd3cf9beaff3a3b096309738c33932f2ad33d46b03870598f0c4_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:628dd4acfe11aef376cc6d75dc7c337c1e487113c2e78e003a3377472b22f488_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:a6813e5bf29916abf84b2d120a30cda07edf06f735c860ee4d0510ed0c59633b_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:c7c6fe7ff2592c0fdf51d6e3b0ce657dffcd131c60c00ce680acd89c5c286cee_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:f0814d33be7a101b6326fb8a536efc0fe66df764d1efa8ddda021e90e61afda9_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-45337"
},
{
"category": "external",
"summary": "RHBZ#2331720",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331720"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-45337",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-45337"
},
{
"category": "external",
"summary": "https://github.com/golang/crypto/commit/b4f1988a35dee11ec3e05d6bf3e90b695fbd8909",
"url": "https://github.com/golang/crypto/commit/b4f1988a35dee11ec3e05d6bf3e90b695fbd8909"
},
{
"category": "external",
"summary": "https://go.dev/cl/635315",
"url": "https://go.dev/cl/635315"
},
{
"category": "external",
"summary": "https://go.dev/issue/70779",
"url": "https://go.dev/issue/70779"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/-nPEi39gI4Q/m/cGVPJCqdAQAJ",
"url": "https://groups.google.com/g/golang-announce/c/-nPEi39gI4Q/m/cGVPJCqdAQAJ"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2024-3321",
"url": "https://pkg.go.dev/vuln/GO-2024-3321"
}
],
"release_date": "2024-12-11T18:55:58.506000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-11-27T14:54:51+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:278facca3eaf0c2091ad8575e85ac03aef6e8a52227511e7ee5f62bc2842dac8_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:71a6e23a69d7c4723a2653f630c8b02057545c1be65e5f4401490f0364f0d43c_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:a6e6c1f865e6c3e237c36bbb58b3c0e533171303e21cbe4d829d05b497fcd5c7_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:f4ab11e6a09b983a4af87723877338a79b45c36b3848b0e8032963a330d98467_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:22287"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:02ced94ebfcce3e21bcc71af6aa1c11db50822c91dd05cec4fb41a34e6669112_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:42a67bb2e5ab681eadc253b413f0bf557d63f282f270e6064f5768fecf6886e5_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:880c746eb5822f68e41ca7b60d97799115c30f39bdc7e458f7a4101e2af36c8c_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:ad995b723102f4472e4190257b61582de5c6b058b908bcee7cebe683ae77be75_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:49db4fa7375da6397c45b6c09e10e20f5855348e21812d64474c3adec7f1cbdd_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:235d66a1ef93f2ae13266709a30698d444d6e481b8edbdb252d49d9aea4b76ce_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:26a27da8aa0da9a6673907fe35de61cc93932386070dc3d7ad348e8c086b19d7_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:97dd28bc0b588ffc8fd9a171a946580c0572eb6fb34c85d5e1b799a12cf22574_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b6179970b9060f74475ccd25cbb8f8a098ed5e71afb444058156e91e8a51d5a9_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:60638663af472a24a79cc4a6ec7d4d78a3d10b0e09eec80f6da6855277ff139b_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:8ca3e5903314362c191c6acd1d3865436d85daf50e284760da21e28f473a8ee5_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9a8d1b2e4b0497f96cbbdfa90d96239da9da8329917adca696ea6f0e20d2c2c0_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:c622550fb4630be48a1a6e1a8f9337718e4f934b5e5cd23bcc4300beb03eeeae_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:76dd5f7b326afb6c72515daed8e65331f98cb7ad514612c06c85f14de6b525e4_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:7cfa21df6e22c2157d2eb65b5e226863a121c8e661a1869b585ca0656fb6013a_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:9b69aadfde5c4cbde98f496c54ce396d1daa5277b8f59577f22855345604442e_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:decf4b7e1917a2c551ea095c9798a65237879369e9f736a44b885e2589e5c05b_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:878b011b86512d01021feb10cdd54608a3ab68d2f3db5a1d53ce8feaa9e56878_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:54003d9396862c6e3b675455ac8c0159662a6640bb889ffb34516d2d091275de_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:5f2ba97f71eefadd2a84b031e536619dcf1a0b76ae9225592c05b99ec87ca9dc_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8458e32483b897e156a5688ec6d96af2ff897e8c14dafb396c945f7c76b4c368_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:ac042b538a7498bf3020c20234966fdbc9b6817aae343985f3bf8ba9fcfdb6d6_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-bundle@sha256:ce217da657cabd3cf9beaff3a3b096309738c33932f2ad33d46b03870598f0c4_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:278facca3eaf0c2091ad8575e85ac03aef6e8a52227511e7ee5f62bc2842dac8_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:71a6e23a69d7c4723a2653f630c8b02057545c1be65e5f4401490f0364f0d43c_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:a6e6c1f865e6c3e237c36bbb58b3c0e533171303e21cbe4d829d05b497fcd5c7_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:f4ab11e6a09b983a4af87723877338a79b45c36b3848b0e8032963a330d98467_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:628dd4acfe11aef376cc6d75dc7c337c1e487113c2e78e003a3377472b22f488_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:a6813e5bf29916abf84b2d120a30cda07edf06f735c860ee4d0510ed0c59633b_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:c7c6fe7ff2592c0fdf51d6e3b0ce657dffcd131c60c00ce680acd89c5c286cee_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:f0814d33be7a101b6326fb8a536efc0fe66df764d1efa8ddda021e90e61afda9_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:02ced94ebfcce3e21bcc71af6aa1c11db50822c91dd05cec4fb41a34e6669112_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:42a67bb2e5ab681eadc253b413f0bf557d63f282f270e6064f5768fecf6886e5_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:880c746eb5822f68e41ca7b60d97799115c30f39bdc7e458f7a4101e2af36c8c_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:ad995b723102f4472e4190257b61582de5c6b058b908bcee7cebe683ae77be75_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:49db4fa7375da6397c45b6c09e10e20f5855348e21812d64474c3adec7f1cbdd_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:235d66a1ef93f2ae13266709a30698d444d6e481b8edbdb252d49d9aea4b76ce_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:26a27da8aa0da9a6673907fe35de61cc93932386070dc3d7ad348e8c086b19d7_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:97dd28bc0b588ffc8fd9a171a946580c0572eb6fb34c85d5e1b799a12cf22574_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b6179970b9060f74475ccd25cbb8f8a098ed5e71afb444058156e91e8a51d5a9_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:60638663af472a24a79cc4a6ec7d4d78a3d10b0e09eec80f6da6855277ff139b_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:8ca3e5903314362c191c6acd1d3865436d85daf50e284760da21e28f473a8ee5_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9a8d1b2e4b0497f96cbbdfa90d96239da9da8329917adca696ea6f0e20d2c2c0_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:c622550fb4630be48a1a6e1a8f9337718e4f934b5e5cd23bcc4300beb03eeeae_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:76dd5f7b326afb6c72515daed8e65331f98cb7ad514612c06c85f14de6b525e4_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:7cfa21df6e22c2157d2eb65b5e226863a121c8e661a1869b585ca0656fb6013a_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:9b69aadfde5c4cbde98f496c54ce396d1daa5277b8f59577f22855345604442e_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:decf4b7e1917a2c551ea095c9798a65237879369e9f736a44b885e2589e5c05b_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:878b011b86512d01021feb10cdd54608a3ab68d2f3db5a1d53ce8feaa9e56878_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:54003d9396862c6e3b675455ac8c0159662a6640bb889ffb34516d2d091275de_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:5f2ba97f71eefadd2a84b031e536619dcf1a0b76ae9225592c05b99ec87ca9dc_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8458e32483b897e156a5688ec6d96af2ff897e8c14dafb396c945f7c76b4c368_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:ac042b538a7498bf3020c20234966fdbc9b6817aae343985f3bf8ba9fcfdb6d6_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-bundle@sha256:ce217da657cabd3cf9beaff3a3b096309738c33932f2ad33d46b03870598f0c4_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:278facca3eaf0c2091ad8575e85ac03aef6e8a52227511e7ee5f62bc2842dac8_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:71a6e23a69d7c4723a2653f630c8b02057545c1be65e5f4401490f0364f0d43c_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:a6e6c1f865e6c3e237c36bbb58b3c0e533171303e21cbe4d829d05b497fcd5c7_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:f4ab11e6a09b983a4af87723877338a79b45c36b3848b0e8032963a330d98467_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:628dd4acfe11aef376cc6d75dc7c337c1e487113c2e78e003a3377472b22f488_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:a6813e5bf29916abf84b2d120a30cda07edf06f735c860ee4d0510ed0c59633b_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:c7c6fe7ff2592c0fdf51d6e3b0ce657dffcd131c60c00ce680acd89c5c286cee_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:f0814d33be7a101b6326fb8a536efc0fe66df764d1efa8ddda021e90e61afda9_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang.org/x/crypto/ssh: Misuse of ServerConfig.PublicKeyCallback may cause authorization bypass in golang.org/x/crypto"
},
{
"cve": "CVE-2024-45338",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2024-12-18T21:00:59.938173+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:02ced94ebfcce3e21bcc71af6aa1c11db50822c91dd05cec4fb41a34e6669112_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:42a67bb2e5ab681eadc253b413f0bf557d63f282f270e6064f5768fecf6886e5_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:880c746eb5822f68e41ca7b60d97799115c30f39bdc7e458f7a4101e2af36c8c_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:ad995b723102f4472e4190257b61582de5c6b058b908bcee7cebe683ae77be75_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:49db4fa7375da6397c45b6c09e10e20f5855348e21812d64474c3adec7f1cbdd_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:235d66a1ef93f2ae13266709a30698d444d6e481b8edbdb252d49d9aea4b76ce_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:26a27da8aa0da9a6673907fe35de61cc93932386070dc3d7ad348e8c086b19d7_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:97dd28bc0b588ffc8fd9a171a946580c0572eb6fb34c85d5e1b799a12cf22574_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b6179970b9060f74475ccd25cbb8f8a098ed5e71afb444058156e91e8a51d5a9_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:60638663af472a24a79cc4a6ec7d4d78a3d10b0e09eec80f6da6855277ff139b_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:8ca3e5903314362c191c6acd1d3865436d85daf50e284760da21e28f473a8ee5_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9a8d1b2e4b0497f96cbbdfa90d96239da9da8329917adca696ea6f0e20d2c2c0_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:c622550fb4630be48a1a6e1a8f9337718e4f934b5e5cd23bcc4300beb03eeeae_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:76dd5f7b326afb6c72515daed8e65331f98cb7ad514612c06c85f14de6b525e4_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:7cfa21df6e22c2157d2eb65b5e226863a121c8e661a1869b585ca0656fb6013a_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:9b69aadfde5c4cbde98f496c54ce396d1daa5277b8f59577f22855345604442e_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:decf4b7e1917a2c551ea095c9798a65237879369e9f736a44b885e2589e5c05b_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:878b011b86512d01021feb10cdd54608a3ab68d2f3db5a1d53ce8feaa9e56878_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:54003d9396862c6e3b675455ac8c0159662a6640bb889ffb34516d2d091275de_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:5f2ba97f71eefadd2a84b031e536619dcf1a0b76ae9225592c05b99ec87ca9dc_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8458e32483b897e156a5688ec6d96af2ff897e8c14dafb396c945f7c76b4c368_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:ac042b538a7498bf3020c20234966fdbc9b6817aae343985f3bf8ba9fcfdb6d6_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-bundle@sha256:ce217da657cabd3cf9beaff3a3b096309738c33932f2ad33d46b03870598f0c4_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:628dd4acfe11aef376cc6d75dc7c337c1e487113c2e78e003a3377472b22f488_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:a6813e5bf29916abf84b2d120a30cda07edf06f735c860ee4d0510ed0c59633b_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:c7c6fe7ff2592c0fdf51d6e3b0ce657dffcd131c60c00ce680acd89c5c286cee_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:f0814d33be7a101b6326fb8a536efc0fe66df764d1efa8ddda021e90e61afda9_arm64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2333122"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang.org/x/net/html. This flaw allows an attacker to craft input to the parse functions that would be processed non-linearly with respect to its length, resulting in extremely slow parsing. This issue can cause a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated as an Important severity because an attacker can craft malicious input that causes the parsing functions to process data non-linearly, resulting in significant delays which leads to a denial of service by exhausting system resources.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:278facca3eaf0c2091ad8575e85ac03aef6e8a52227511e7ee5f62bc2842dac8_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:71a6e23a69d7c4723a2653f630c8b02057545c1be65e5f4401490f0364f0d43c_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:a6e6c1f865e6c3e237c36bbb58b3c0e533171303e21cbe4d829d05b497fcd5c7_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:f4ab11e6a09b983a4af87723877338a79b45c36b3848b0e8032963a330d98467_amd64"
],
"known_not_affected": [
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:02ced94ebfcce3e21bcc71af6aa1c11db50822c91dd05cec4fb41a34e6669112_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:42a67bb2e5ab681eadc253b413f0bf557d63f282f270e6064f5768fecf6886e5_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:880c746eb5822f68e41ca7b60d97799115c30f39bdc7e458f7a4101e2af36c8c_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:ad995b723102f4472e4190257b61582de5c6b058b908bcee7cebe683ae77be75_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:49db4fa7375da6397c45b6c09e10e20f5855348e21812d64474c3adec7f1cbdd_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:235d66a1ef93f2ae13266709a30698d444d6e481b8edbdb252d49d9aea4b76ce_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:26a27da8aa0da9a6673907fe35de61cc93932386070dc3d7ad348e8c086b19d7_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:97dd28bc0b588ffc8fd9a171a946580c0572eb6fb34c85d5e1b799a12cf22574_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b6179970b9060f74475ccd25cbb8f8a098ed5e71afb444058156e91e8a51d5a9_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:60638663af472a24a79cc4a6ec7d4d78a3d10b0e09eec80f6da6855277ff139b_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:8ca3e5903314362c191c6acd1d3865436d85daf50e284760da21e28f473a8ee5_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9a8d1b2e4b0497f96cbbdfa90d96239da9da8329917adca696ea6f0e20d2c2c0_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:c622550fb4630be48a1a6e1a8f9337718e4f934b5e5cd23bcc4300beb03eeeae_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:76dd5f7b326afb6c72515daed8e65331f98cb7ad514612c06c85f14de6b525e4_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:7cfa21df6e22c2157d2eb65b5e226863a121c8e661a1869b585ca0656fb6013a_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:9b69aadfde5c4cbde98f496c54ce396d1daa5277b8f59577f22855345604442e_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:decf4b7e1917a2c551ea095c9798a65237879369e9f736a44b885e2589e5c05b_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:878b011b86512d01021feb10cdd54608a3ab68d2f3db5a1d53ce8feaa9e56878_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:54003d9396862c6e3b675455ac8c0159662a6640bb889ffb34516d2d091275de_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:5f2ba97f71eefadd2a84b031e536619dcf1a0b76ae9225592c05b99ec87ca9dc_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8458e32483b897e156a5688ec6d96af2ff897e8c14dafb396c945f7c76b4c368_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:ac042b538a7498bf3020c20234966fdbc9b6817aae343985f3bf8ba9fcfdb6d6_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-bundle@sha256:ce217da657cabd3cf9beaff3a3b096309738c33932f2ad33d46b03870598f0c4_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:628dd4acfe11aef376cc6d75dc7c337c1e487113c2e78e003a3377472b22f488_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:a6813e5bf29916abf84b2d120a30cda07edf06f735c860ee4d0510ed0c59633b_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:c7c6fe7ff2592c0fdf51d6e3b0ce657dffcd131c60c00ce680acd89c5c286cee_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:f0814d33be7a101b6326fb8a536efc0fe66df764d1efa8ddda021e90e61afda9_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-45338"
},
{
"category": "external",
"summary": "RHBZ#2333122",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333122"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-45338",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45338"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-45338",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-45338"
},
{
"category": "external",
"summary": "https://go.dev/cl/637536",
"url": "https://go.dev/cl/637536"
},
{
"category": "external",
"summary": "https://go.dev/issue/70906",
"url": "https://go.dev/issue/70906"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/wSCRmFnNmPA/m/Lvcd0mRMAwAJ",
"url": "https://groups.google.com/g/golang-announce/c/wSCRmFnNmPA/m/Lvcd0mRMAwAJ"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2024-3333",
"url": "https://pkg.go.dev/vuln/GO-2024-3333"
}
],
"release_date": "2024-12-18T20:38:22.660000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-11-27T14:54:51+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:278facca3eaf0c2091ad8575e85ac03aef6e8a52227511e7ee5f62bc2842dac8_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:71a6e23a69d7c4723a2653f630c8b02057545c1be65e5f4401490f0364f0d43c_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:a6e6c1f865e6c3e237c36bbb58b3c0e533171303e21cbe4d829d05b497fcd5c7_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:f4ab11e6a09b983a4af87723877338a79b45c36b3848b0e8032963a330d98467_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:22287"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:02ced94ebfcce3e21bcc71af6aa1c11db50822c91dd05cec4fb41a34e6669112_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:42a67bb2e5ab681eadc253b413f0bf557d63f282f270e6064f5768fecf6886e5_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:880c746eb5822f68e41ca7b60d97799115c30f39bdc7e458f7a4101e2af36c8c_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:ad995b723102f4472e4190257b61582de5c6b058b908bcee7cebe683ae77be75_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:49db4fa7375da6397c45b6c09e10e20f5855348e21812d64474c3adec7f1cbdd_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:235d66a1ef93f2ae13266709a30698d444d6e481b8edbdb252d49d9aea4b76ce_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:26a27da8aa0da9a6673907fe35de61cc93932386070dc3d7ad348e8c086b19d7_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:97dd28bc0b588ffc8fd9a171a946580c0572eb6fb34c85d5e1b799a12cf22574_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b6179970b9060f74475ccd25cbb8f8a098ed5e71afb444058156e91e8a51d5a9_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:60638663af472a24a79cc4a6ec7d4d78a3d10b0e09eec80f6da6855277ff139b_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:8ca3e5903314362c191c6acd1d3865436d85daf50e284760da21e28f473a8ee5_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9a8d1b2e4b0497f96cbbdfa90d96239da9da8329917adca696ea6f0e20d2c2c0_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:c622550fb4630be48a1a6e1a8f9337718e4f934b5e5cd23bcc4300beb03eeeae_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:76dd5f7b326afb6c72515daed8e65331f98cb7ad514612c06c85f14de6b525e4_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:7cfa21df6e22c2157d2eb65b5e226863a121c8e661a1869b585ca0656fb6013a_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:9b69aadfde5c4cbde98f496c54ce396d1daa5277b8f59577f22855345604442e_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:decf4b7e1917a2c551ea095c9798a65237879369e9f736a44b885e2589e5c05b_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:878b011b86512d01021feb10cdd54608a3ab68d2f3db5a1d53ce8feaa9e56878_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:54003d9396862c6e3b675455ac8c0159662a6640bb889ffb34516d2d091275de_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:5f2ba97f71eefadd2a84b031e536619dcf1a0b76ae9225592c05b99ec87ca9dc_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8458e32483b897e156a5688ec6d96af2ff897e8c14dafb396c945f7c76b4c368_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:ac042b538a7498bf3020c20234966fdbc9b6817aae343985f3bf8ba9fcfdb6d6_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-bundle@sha256:ce217da657cabd3cf9beaff3a3b096309738c33932f2ad33d46b03870598f0c4_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:278facca3eaf0c2091ad8575e85ac03aef6e8a52227511e7ee5f62bc2842dac8_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:71a6e23a69d7c4723a2653f630c8b02057545c1be65e5f4401490f0364f0d43c_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:a6e6c1f865e6c3e237c36bbb58b3c0e533171303e21cbe4d829d05b497fcd5c7_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:f4ab11e6a09b983a4af87723877338a79b45c36b3848b0e8032963a330d98467_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:628dd4acfe11aef376cc6d75dc7c337c1e487113c2e78e003a3377472b22f488_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:a6813e5bf29916abf84b2d120a30cda07edf06f735c860ee4d0510ed0c59633b_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:c7c6fe7ff2592c0fdf51d6e3b0ce657dffcd131c60c00ce680acd89c5c286cee_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:f0814d33be7a101b6326fb8a536efc0fe66df764d1efa8ddda021e90e61afda9_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html"
},
{
"cve": "CVE-2025-59420",
"cwe": {
"id": "CWE-440",
"name": "Expected Behavior Violation"
},
"discovery_date": "2025-09-22T18:01:35.379361+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:02ced94ebfcce3e21bcc71af6aa1c11db50822c91dd05cec4fb41a34e6669112_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:42a67bb2e5ab681eadc253b413f0bf557d63f282f270e6064f5768fecf6886e5_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:880c746eb5822f68e41ca7b60d97799115c30f39bdc7e458f7a4101e2af36c8c_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:ad995b723102f4472e4190257b61582de5c6b058b908bcee7cebe683ae77be75_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:49db4fa7375da6397c45b6c09e10e20f5855348e21812d64474c3adec7f1cbdd_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:235d66a1ef93f2ae13266709a30698d444d6e481b8edbdb252d49d9aea4b76ce_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:26a27da8aa0da9a6673907fe35de61cc93932386070dc3d7ad348e8c086b19d7_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:97dd28bc0b588ffc8fd9a171a946580c0572eb6fb34c85d5e1b799a12cf22574_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b6179970b9060f74475ccd25cbb8f8a098ed5e71afb444058156e91e8a51d5a9_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:60638663af472a24a79cc4a6ec7d4d78a3d10b0e09eec80f6da6855277ff139b_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:8ca3e5903314362c191c6acd1d3865436d85daf50e284760da21e28f473a8ee5_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9a8d1b2e4b0497f96cbbdfa90d96239da9da8329917adca696ea6f0e20d2c2c0_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:c622550fb4630be48a1a6e1a8f9337718e4f934b5e5cd23bcc4300beb03eeeae_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:76dd5f7b326afb6c72515daed8e65331f98cb7ad514612c06c85f14de6b525e4_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:7cfa21df6e22c2157d2eb65b5e226863a121c8e661a1869b585ca0656fb6013a_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:9b69aadfde5c4cbde98f496c54ce396d1daa5277b8f59577f22855345604442e_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:decf4b7e1917a2c551ea095c9798a65237879369e9f736a44b885e2589e5c05b_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:878b011b86512d01021feb10cdd54608a3ab68d2f3db5a1d53ce8feaa9e56878_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:54003d9396862c6e3b675455ac8c0159662a6640bb889ffb34516d2d091275de_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:5f2ba97f71eefadd2a84b031e536619dcf1a0b76ae9225592c05b99ec87ca9dc_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8458e32483b897e156a5688ec6d96af2ff897e8c14dafb396c945f7c76b4c368_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:ac042b538a7498bf3020c20234966fdbc9b6817aae343985f3bf8ba9fcfdb6d6_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-bundle@sha256:ce217da657cabd3cf9beaff3a3b096309738c33932f2ad33d46b03870598f0c4_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:278facca3eaf0c2091ad8575e85ac03aef6e8a52227511e7ee5f62bc2842dac8_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:71a6e23a69d7c4723a2653f630c8b02057545c1be65e5f4401490f0364f0d43c_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:a6e6c1f865e6c3e237c36bbb58b3c0e533171303e21cbe4d829d05b497fcd5c7_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:f4ab11e6a09b983a4af87723877338a79b45c36b3848b0e8032963a330d98467_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2397460"
}
],
"notes": [
{
"category": "description",
"text": "Authlib\u2019s JWS verification accepts tokens that declare unknown critical header parameters (crit), violating RFC 7515 \u201cmust\u2011understand\u201d semantics. An attacker can craft a signed token with a critical header (for example, bork or cnf) that strict verifiers reject but Authlib accepts. In mixed\u2011language fleets, this enables split\u2011brain verification and can lead to policy bypass, replay, or privilege escalation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "authlib: Authlib RFC violation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:628dd4acfe11aef376cc6d75dc7c337c1e487113c2e78e003a3377472b22f488_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:a6813e5bf29916abf84b2d120a30cda07edf06f735c860ee4d0510ed0c59633b_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:c7c6fe7ff2592c0fdf51d6e3b0ce657dffcd131c60c00ce680acd89c5c286cee_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:f0814d33be7a101b6326fb8a536efc0fe66df764d1efa8ddda021e90e61afda9_arm64"
],
"known_not_affected": [
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:02ced94ebfcce3e21bcc71af6aa1c11db50822c91dd05cec4fb41a34e6669112_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:42a67bb2e5ab681eadc253b413f0bf557d63f282f270e6064f5768fecf6886e5_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:880c746eb5822f68e41ca7b60d97799115c30f39bdc7e458f7a4101e2af36c8c_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:ad995b723102f4472e4190257b61582de5c6b058b908bcee7cebe683ae77be75_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:49db4fa7375da6397c45b6c09e10e20f5855348e21812d64474c3adec7f1cbdd_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:235d66a1ef93f2ae13266709a30698d444d6e481b8edbdb252d49d9aea4b76ce_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:26a27da8aa0da9a6673907fe35de61cc93932386070dc3d7ad348e8c086b19d7_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:97dd28bc0b588ffc8fd9a171a946580c0572eb6fb34c85d5e1b799a12cf22574_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b6179970b9060f74475ccd25cbb8f8a098ed5e71afb444058156e91e8a51d5a9_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:60638663af472a24a79cc4a6ec7d4d78a3d10b0e09eec80f6da6855277ff139b_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:8ca3e5903314362c191c6acd1d3865436d85daf50e284760da21e28f473a8ee5_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9a8d1b2e4b0497f96cbbdfa90d96239da9da8329917adca696ea6f0e20d2c2c0_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:c622550fb4630be48a1a6e1a8f9337718e4f934b5e5cd23bcc4300beb03eeeae_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:76dd5f7b326afb6c72515daed8e65331f98cb7ad514612c06c85f14de6b525e4_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:7cfa21df6e22c2157d2eb65b5e226863a121c8e661a1869b585ca0656fb6013a_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:9b69aadfde5c4cbde98f496c54ce396d1daa5277b8f59577f22855345604442e_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:decf4b7e1917a2c551ea095c9798a65237879369e9f736a44b885e2589e5c05b_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:878b011b86512d01021feb10cdd54608a3ab68d2f3db5a1d53ce8feaa9e56878_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:54003d9396862c6e3b675455ac8c0159662a6640bb889ffb34516d2d091275de_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:5f2ba97f71eefadd2a84b031e536619dcf1a0b76ae9225592c05b99ec87ca9dc_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8458e32483b897e156a5688ec6d96af2ff897e8c14dafb396c945f7c76b4c368_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:ac042b538a7498bf3020c20234966fdbc9b6817aae343985f3bf8ba9fcfdb6d6_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-bundle@sha256:ce217da657cabd3cf9beaff3a3b096309738c33932f2ad33d46b03870598f0c4_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:278facca3eaf0c2091ad8575e85ac03aef6e8a52227511e7ee5f62bc2842dac8_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:71a6e23a69d7c4723a2653f630c8b02057545c1be65e5f4401490f0364f0d43c_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:a6e6c1f865e6c3e237c36bbb58b3c0e533171303e21cbe4d829d05b497fcd5c7_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:f4ab11e6a09b983a4af87723877338a79b45c36b3848b0e8032963a330d98467_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-59420"
},
{
"category": "external",
"summary": "RHBZ#2397460",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2397460"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-59420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59420"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-59420",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-59420"
},
{
"category": "external",
"summary": "https://github.com/authlib/authlib/commit/6b1813e4392eb7c168c276099ff7783b176479df",
"url": "https://github.com/authlib/authlib/commit/6b1813e4392eb7c168c276099ff7783b176479df"
},
{
"category": "external",
"summary": "https://github.com/authlib/authlib/security/advisories/GHSA-9ggr-2464-2j32",
"url": "https://github.com/authlib/authlib/security/advisories/GHSA-9ggr-2464-2j32"
}
],
"release_date": "2025-09-22T17:28:53.869000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-11-27T14:54:51+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:628dd4acfe11aef376cc6d75dc7c337c1e487113c2e78e003a3377472b22f488_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:a6813e5bf29916abf84b2d120a30cda07edf06f735c860ee4d0510ed0c59633b_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:c7c6fe7ff2592c0fdf51d6e3b0ce657dffcd131c60c00ce680acd89c5c286cee_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:f0814d33be7a101b6326fb8a536efc0fe66df764d1efa8ddda021e90e61afda9_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:22287"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:02ced94ebfcce3e21bcc71af6aa1c11db50822c91dd05cec4fb41a34e6669112_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:42a67bb2e5ab681eadc253b413f0bf557d63f282f270e6064f5768fecf6886e5_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:880c746eb5822f68e41ca7b60d97799115c30f39bdc7e458f7a4101e2af36c8c_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:ad995b723102f4472e4190257b61582de5c6b058b908bcee7cebe683ae77be75_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:49db4fa7375da6397c45b6c09e10e20f5855348e21812d64474c3adec7f1cbdd_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:235d66a1ef93f2ae13266709a30698d444d6e481b8edbdb252d49d9aea4b76ce_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:26a27da8aa0da9a6673907fe35de61cc93932386070dc3d7ad348e8c086b19d7_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:97dd28bc0b588ffc8fd9a171a946580c0572eb6fb34c85d5e1b799a12cf22574_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b6179970b9060f74475ccd25cbb8f8a098ed5e71afb444058156e91e8a51d5a9_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:60638663af472a24a79cc4a6ec7d4d78a3d10b0e09eec80f6da6855277ff139b_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:8ca3e5903314362c191c6acd1d3865436d85daf50e284760da21e28f473a8ee5_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9a8d1b2e4b0497f96cbbdfa90d96239da9da8329917adca696ea6f0e20d2c2c0_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:c622550fb4630be48a1a6e1a8f9337718e4f934b5e5cd23bcc4300beb03eeeae_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:76dd5f7b326afb6c72515daed8e65331f98cb7ad514612c06c85f14de6b525e4_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:7cfa21df6e22c2157d2eb65b5e226863a121c8e661a1869b585ca0656fb6013a_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:9b69aadfde5c4cbde98f496c54ce396d1daa5277b8f59577f22855345604442e_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:decf4b7e1917a2c551ea095c9798a65237879369e9f736a44b885e2589e5c05b_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:878b011b86512d01021feb10cdd54608a3ab68d2f3db5a1d53ce8feaa9e56878_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:54003d9396862c6e3b675455ac8c0159662a6640bb889ffb34516d2d091275de_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:5f2ba97f71eefadd2a84b031e536619dcf1a0b76ae9225592c05b99ec87ca9dc_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8458e32483b897e156a5688ec6d96af2ff897e8c14dafb396c945f7c76b4c368_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:ac042b538a7498bf3020c20234966fdbc9b6817aae343985f3bf8ba9fcfdb6d6_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-bundle@sha256:ce217da657cabd3cf9beaff3a3b096309738c33932f2ad33d46b03870598f0c4_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:278facca3eaf0c2091ad8575e85ac03aef6e8a52227511e7ee5f62bc2842dac8_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:71a6e23a69d7c4723a2653f630c8b02057545c1be65e5f4401490f0364f0d43c_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:a6e6c1f865e6c3e237c36bbb58b3c0e533171303e21cbe4d829d05b497fcd5c7_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:f4ab11e6a09b983a4af87723877338a79b45c36b3848b0e8032963a330d98467_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:628dd4acfe11aef376cc6d75dc7c337c1e487113c2e78e003a3377472b22f488_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:a6813e5bf29916abf84b2d120a30cda07edf06f735c860ee4d0510ed0c59633b_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:c7c6fe7ff2592c0fdf51d6e3b0ce657dffcd131c60c00ce680acd89c5c286cee_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:f0814d33be7a101b6326fb8a536efc0fe66df764d1efa8ddda021e90e61afda9_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:02ced94ebfcce3e21bcc71af6aa1c11db50822c91dd05cec4fb41a34e6669112_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:42a67bb2e5ab681eadc253b413f0bf557d63f282f270e6064f5768fecf6886e5_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:880c746eb5822f68e41ca7b60d97799115c30f39bdc7e458f7a4101e2af36c8c_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:ad995b723102f4472e4190257b61582de5c6b058b908bcee7cebe683ae77be75_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:49db4fa7375da6397c45b6c09e10e20f5855348e21812d64474c3adec7f1cbdd_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:235d66a1ef93f2ae13266709a30698d444d6e481b8edbdb252d49d9aea4b76ce_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:26a27da8aa0da9a6673907fe35de61cc93932386070dc3d7ad348e8c086b19d7_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:97dd28bc0b588ffc8fd9a171a946580c0572eb6fb34c85d5e1b799a12cf22574_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b6179970b9060f74475ccd25cbb8f8a098ed5e71afb444058156e91e8a51d5a9_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:60638663af472a24a79cc4a6ec7d4d78a3d10b0e09eec80f6da6855277ff139b_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:8ca3e5903314362c191c6acd1d3865436d85daf50e284760da21e28f473a8ee5_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9a8d1b2e4b0497f96cbbdfa90d96239da9da8329917adca696ea6f0e20d2c2c0_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:c622550fb4630be48a1a6e1a8f9337718e4f934b5e5cd23bcc4300beb03eeeae_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:76dd5f7b326afb6c72515daed8e65331f98cb7ad514612c06c85f14de6b525e4_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:7cfa21df6e22c2157d2eb65b5e226863a121c8e661a1869b585ca0656fb6013a_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:9b69aadfde5c4cbde98f496c54ce396d1daa5277b8f59577f22855345604442e_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:decf4b7e1917a2c551ea095c9798a65237879369e9f736a44b885e2589e5c05b_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:878b011b86512d01021feb10cdd54608a3ab68d2f3db5a1d53ce8feaa9e56878_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:54003d9396862c6e3b675455ac8c0159662a6640bb889ffb34516d2d091275de_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:5f2ba97f71eefadd2a84b031e536619dcf1a0b76ae9225592c05b99ec87ca9dc_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8458e32483b897e156a5688ec6d96af2ff897e8c14dafb396c945f7c76b4c368_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:ac042b538a7498bf3020c20234966fdbc9b6817aae343985f3bf8ba9fcfdb6d6_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-bundle@sha256:ce217da657cabd3cf9beaff3a3b096309738c33932f2ad33d46b03870598f0c4_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:278facca3eaf0c2091ad8575e85ac03aef6e8a52227511e7ee5f62bc2842dac8_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:71a6e23a69d7c4723a2653f630c8b02057545c1be65e5f4401490f0364f0d43c_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:a6e6c1f865e6c3e237c36bbb58b3c0e533171303e21cbe4d829d05b497fcd5c7_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:f4ab11e6a09b983a4af87723877338a79b45c36b3848b0e8032963a330d98467_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:628dd4acfe11aef376cc6d75dc7c337c1e487113c2e78e003a3377472b22f488_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:a6813e5bf29916abf84b2d120a30cda07edf06f735c860ee4d0510ed0c59633b_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:c7c6fe7ff2592c0fdf51d6e3b0ce657dffcd131c60c00ce680acd89c5c286cee_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:f0814d33be7a101b6326fb8a536efc0fe66df764d1efa8ddda021e90e61afda9_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "authlib: Authlib RFC violation"
},
{
"cve": "CVE-2025-61920",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2025-10-10T20:01:12.833962+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:02ced94ebfcce3e21bcc71af6aa1c11db50822c91dd05cec4fb41a34e6669112_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:42a67bb2e5ab681eadc253b413f0bf557d63f282f270e6064f5768fecf6886e5_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:880c746eb5822f68e41ca7b60d97799115c30f39bdc7e458f7a4101e2af36c8c_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:ad995b723102f4472e4190257b61582de5c6b058b908bcee7cebe683ae77be75_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:49db4fa7375da6397c45b6c09e10e20f5855348e21812d64474c3adec7f1cbdd_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:235d66a1ef93f2ae13266709a30698d444d6e481b8edbdb252d49d9aea4b76ce_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:26a27da8aa0da9a6673907fe35de61cc93932386070dc3d7ad348e8c086b19d7_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:97dd28bc0b588ffc8fd9a171a946580c0572eb6fb34c85d5e1b799a12cf22574_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b6179970b9060f74475ccd25cbb8f8a098ed5e71afb444058156e91e8a51d5a9_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:60638663af472a24a79cc4a6ec7d4d78a3d10b0e09eec80f6da6855277ff139b_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:8ca3e5903314362c191c6acd1d3865436d85daf50e284760da21e28f473a8ee5_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9a8d1b2e4b0497f96cbbdfa90d96239da9da8329917adca696ea6f0e20d2c2c0_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:c622550fb4630be48a1a6e1a8f9337718e4f934b5e5cd23bcc4300beb03eeeae_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:76dd5f7b326afb6c72515daed8e65331f98cb7ad514612c06c85f14de6b525e4_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:7cfa21df6e22c2157d2eb65b5e226863a121c8e661a1869b585ca0656fb6013a_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:9b69aadfde5c4cbde98f496c54ce396d1daa5277b8f59577f22855345604442e_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:decf4b7e1917a2c551ea095c9798a65237879369e9f736a44b885e2589e5c05b_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:878b011b86512d01021feb10cdd54608a3ab68d2f3db5a1d53ce8feaa9e56878_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:54003d9396862c6e3b675455ac8c0159662a6640bb889ffb34516d2d091275de_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:5f2ba97f71eefadd2a84b031e536619dcf1a0b76ae9225592c05b99ec87ca9dc_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8458e32483b897e156a5688ec6d96af2ff897e8c14dafb396c945f7c76b4c368_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:ac042b538a7498bf3020c20234966fdbc9b6817aae343985f3bf8ba9fcfdb6d6_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-bundle@sha256:ce217da657cabd3cf9beaff3a3b096309738c33932f2ad33d46b03870598f0c4_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:278facca3eaf0c2091ad8575e85ac03aef6e8a52227511e7ee5f62bc2842dac8_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:71a6e23a69d7c4723a2653f630c8b02057545c1be65e5f4401490f0364f0d43c_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:a6e6c1f865e6c3e237c36bbb58b3c0e533171303e21cbe4d829d05b497fcd5c7_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:f4ab11e6a09b983a4af87723877338a79b45c36b3848b0e8032963a330d98467_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2403179"
}
],
"notes": [
{
"category": "description",
"text": "A denial of service flaw has been discovered in the python Authlib package. Authlib\u2019s JOSE implementation accepts unbounded JWS/JWT header and signature segments. A remote attacker can craft a token whose base64url\u2011encoded header or signature spans hundreds of megabytes. During verification, Authlib decodes and parses the full input before it is rejected, driving CPU and memory consumption to hostile levels and enabling denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "authlib: Authlib Denial of Service",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:628dd4acfe11aef376cc6d75dc7c337c1e487113c2e78e003a3377472b22f488_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:a6813e5bf29916abf84b2d120a30cda07edf06f735c860ee4d0510ed0c59633b_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:c7c6fe7ff2592c0fdf51d6e3b0ce657dffcd131c60c00ce680acd89c5c286cee_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:f0814d33be7a101b6326fb8a536efc0fe66df764d1efa8ddda021e90e61afda9_arm64"
],
"known_not_affected": [
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:02ced94ebfcce3e21bcc71af6aa1c11db50822c91dd05cec4fb41a34e6669112_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:42a67bb2e5ab681eadc253b413f0bf557d63f282f270e6064f5768fecf6886e5_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:880c746eb5822f68e41ca7b60d97799115c30f39bdc7e458f7a4101e2af36c8c_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:ad995b723102f4472e4190257b61582de5c6b058b908bcee7cebe683ae77be75_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:49db4fa7375da6397c45b6c09e10e20f5855348e21812d64474c3adec7f1cbdd_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:235d66a1ef93f2ae13266709a30698d444d6e481b8edbdb252d49d9aea4b76ce_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:26a27da8aa0da9a6673907fe35de61cc93932386070dc3d7ad348e8c086b19d7_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:97dd28bc0b588ffc8fd9a171a946580c0572eb6fb34c85d5e1b799a12cf22574_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b6179970b9060f74475ccd25cbb8f8a098ed5e71afb444058156e91e8a51d5a9_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:60638663af472a24a79cc4a6ec7d4d78a3d10b0e09eec80f6da6855277ff139b_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:8ca3e5903314362c191c6acd1d3865436d85daf50e284760da21e28f473a8ee5_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9a8d1b2e4b0497f96cbbdfa90d96239da9da8329917adca696ea6f0e20d2c2c0_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:c622550fb4630be48a1a6e1a8f9337718e4f934b5e5cd23bcc4300beb03eeeae_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:76dd5f7b326afb6c72515daed8e65331f98cb7ad514612c06c85f14de6b525e4_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:7cfa21df6e22c2157d2eb65b5e226863a121c8e661a1869b585ca0656fb6013a_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:9b69aadfde5c4cbde98f496c54ce396d1daa5277b8f59577f22855345604442e_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:decf4b7e1917a2c551ea095c9798a65237879369e9f736a44b885e2589e5c05b_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:878b011b86512d01021feb10cdd54608a3ab68d2f3db5a1d53ce8feaa9e56878_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:54003d9396862c6e3b675455ac8c0159662a6640bb889ffb34516d2d091275de_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:5f2ba97f71eefadd2a84b031e536619dcf1a0b76ae9225592c05b99ec87ca9dc_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8458e32483b897e156a5688ec6d96af2ff897e8c14dafb396c945f7c76b4c368_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:ac042b538a7498bf3020c20234966fdbc9b6817aae343985f3bf8ba9fcfdb6d6_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-bundle@sha256:ce217da657cabd3cf9beaff3a3b096309738c33932f2ad33d46b03870598f0c4_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:278facca3eaf0c2091ad8575e85ac03aef6e8a52227511e7ee5f62bc2842dac8_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:71a6e23a69d7c4723a2653f630c8b02057545c1be65e5f4401490f0364f0d43c_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:a6e6c1f865e6c3e237c36bbb58b3c0e533171303e21cbe4d829d05b497fcd5c7_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:f4ab11e6a09b983a4af87723877338a79b45c36b3848b0e8032963a330d98467_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61920"
},
{
"category": "external",
"summary": "RHBZ#2403179",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2403179"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61920",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61920"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61920",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61920"
},
{
"category": "external",
"summary": "https://github.com/authlib/authlib/commit/867e3f87b072347a1ae9cf6983cc8bbf88447e5e",
"url": "https://github.com/authlib/authlib/commit/867e3f87b072347a1ae9cf6983cc8bbf88447e5e"
},
{
"category": "external",
"summary": "https://github.com/authlib/authlib/security/advisories/GHSA-pq5p-34cr-23v9",
"url": "https://github.com/authlib/authlib/security/advisories/GHSA-pq5p-34cr-23v9"
}
],
"release_date": "2025-10-10T19:25:07.679000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-11-27T14:54:51+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:628dd4acfe11aef376cc6d75dc7c337c1e487113c2e78e003a3377472b22f488_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:a6813e5bf29916abf84b2d120a30cda07edf06f735c860ee4d0510ed0c59633b_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:c7c6fe7ff2592c0fdf51d6e3b0ce657dffcd131c60c00ce680acd89c5c286cee_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:f0814d33be7a101b6326fb8a536efc0fe66df764d1efa8ddda021e90e61afda9_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:22287"
},
{
"category": "workaround",
"details": "Users unable to upgrade may manually enforce input size limits before handing tokens to Authlib and/or use application-level throttling to reduce amplification risk.",
"product_ids": [
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:02ced94ebfcce3e21bcc71af6aa1c11db50822c91dd05cec4fb41a34e6669112_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:42a67bb2e5ab681eadc253b413f0bf557d63f282f270e6064f5768fecf6886e5_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:880c746eb5822f68e41ca7b60d97799115c30f39bdc7e458f7a4101e2af36c8c_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:ad995b723102f4472e4190257b61582de5c6b058b908bcee7cebe683ae77be75_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:49db4fa7375da6397c45b6c09e10e20f5855348e21812d64474c3adec7f1cbdd_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:235d66a1ef93f2ae13266709a30698d444d6e481b8edbdb252d49d9aea4b76ce_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:26a27da8aa0da9a6673907fe35de61cc93932386070dc3d7ad348e8c086b19d7_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:97dd28bc0b588ffc8fd9a171a946580c0572eb6fb34c85d5e1b799a12cf22574_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b6179970b9060f74475ccd25cbb8f8a098ed5e71afb444058156e91e8a51d5a9_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:60638663af472a24a79cc4a6ec7d4d78a3d10b0e09eec80f6da6855277ff139b_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:8ca3e5903314362c191c6acd1d3865436d85daf50e284760da21e28f473a8ee5_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9a8d1b2e4b0497f96cbbdfa90d96239da9da8329917adca696ea6f0e20d2c2c0_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:c622550fb4630be48a1a6e1a8f9337718e4f934b5e5cd23bcc4300beb03eeeae_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:76dd5f7b326afb6c72515daed8e65331f98cb7ad514612c06c85f14de6b525e4_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:7cfa21df6e22c2157d2eb65b5e226863a121c8e661a1869b585ca0656fb6013a_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:9b69aadfde5c4cbde98f496c54ce396d1daa5277b8f59577f22855345604442e_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:decf4b7e1917a2c551ea095c9798a65237879369e9f736a44b885e2589e5c05b_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:878b011b86512d01021feb10cdd54608a3ab68d2f3db5a1d53ce8feaa9e56878_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:54003d9396862c6e3b675455ac8c0159662a6640bb889ffb34516d2d091275de_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:5f2ba97f71eefadd2a84b031e536619dcf1a0b76ae9225592c05b99ec87ca9dc_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8458e32483b897e156a5688ec6d96af2ff897e8c14dafb396c945f7c76b4c368_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:ac042b538a7498bf3020c20234966fdbc9b6817aae343985f3bf8ba9fcfdb6d6_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-bundle@sha256:ce217da657cabd3cf9beaff3a3b096309738c33932f2ad33d46b03870598f0c4_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:278facca3eaf0c2091ad8575e85ac03aef6e8a52227511e7ee5f62bc2842dac8_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:71a6e23a69d7c4723a2653f630c8b02057545c1be65e5f4401490f0364f0d43c_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:a6e6c1f865e6c3e237c36bbb58b3c0e533171303e21cbe4d829d05b497fcd5c7_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:f4ab11e6a09b983a4af87723877338a79b45c36b3848b0e8032963a330d98467_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:628dd4acfe11aef376cc6d75dc7c337c1e487113c2e78e003a3377472b22f488_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:a6813e5bf29916abf84b2d120a30cda07edf06f735c860ee4d0510ed0c59633b_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:c7c6fe7ff2592c0fdf51d6e3b0ce657dffcd131c60c00ce680acd89c5c286cee_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:f0814d33be7a101b6326fb8a536efc0fe66df764d1efa8ddda021e90e61afda9_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:02ced94ebfcce3e21bcc71af6aa1c11db50822c91dd05cec4fb41a34e6669112_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:42a67bb2e5ab681eadc253b413f0bf557d63f282f270e6064f5768fecf6886e5_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:880c746eb5822f68e41ca7b60d97799115c30f39bdc7e458f7a4101e2af36c8c_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:ad995b723102f4472e4190257b61582de5c6b058b908bcee7cebe683ae77be75_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:49db4fa7375da6397c45b6c09e10e20f5855348e21812d64474c3adec7f1cbdd_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:235d66a1ef93f2ae13266709a30698d444d6e481b8edbdb252d49d9aea4b76ce_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:26a27da8aa0da9a6673907fe35de61cc93932386070dc3d7ad348e8c086b19d7_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:97dd28bc0b588ffc8fd9a171a946580c0572eb6fb34c85d5e1b799a12cf22574_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b6179970b9060f74475ccd25cbb8f8a098ed5e71afb444058156e91e8a51d5a9_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:60638663af472a24a79cc4a6ec7d4d78a3d10b0e09eec80f6da6855277ff139b_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:8ca3e5903314362c191c6acd1d3865436d85daf50e284760da21e28f473a8ee5_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9a8d1b2e4b0497f96cbbdfa90d96239da9da8329917adca696ea6f0e20d2c2c0_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:c622550fb4630be48a1a6e1a8f9337718e4f934b5e5cd23bcc4300beb03eeeae_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:76dd5f7b326afb6c72515daed8e65331f98cb7ad514612c06c85f14de6b525e4_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:7cfa21df6e22c2157d2eb65b5e226863a121c8e661a1869b585ca0656fb6013a_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:9b69aadfde5c4cbde98f496c54ce396d1daa5277b8f59577f22855345604442e_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:decf4b7e1917a2c551ea095c9798a65237879369e9f736a44b885e2589e5c05b_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:878b011b86512d01021feb10cdd54608a3ab68d2f3db5a1d53ce8feaa9e56878_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:54003d9396862c6e3b675455ac8c0159662a6640bb889ffb34516d2d091275de_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:5f2ba97f71eefadd2a84b031e536619dcf1a0b76ae9225592c05b99ec87ca9dc_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8458e32483b897e156a5688ec6d96af2ff897e8c14dafb396c945f7c76b4c368_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:ac042b538a7498bf3020c20234966fdbc9b6817aae343985f3bf8ba9fcfdb6d6_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-bundle@sha256:ce217da657cabd3cf9beaff3a3b096309738c33932f2ad33d46b03870598f0c4_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:278facca3eaf0c2091ad8575e85ac03aef6e8a52227511e7ee5f62bc2842dac8_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:71a6e23a69d7c4723a2653f630c8b02057545c1be65e5f4401490f0364f0d43c_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:a6e6c1f865e6c3e237c36bbb58b3c0e533171303e21cbe4d829d05b497fcd5c7_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:f4ab11e6a09b983a4af87723877338a79b45c36b3848b0e8032963a330d98467_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:628dd4acfe11aef376cc6d75dc7c337c1e487113c2e78e003a3377472b22f488_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:a6813e5bf29916abf84b2d120a30cda07edf06f735c860ee4d0510ed0c59633b_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:c7c6fe7ff2592c0fdf51d6e3b0ce657dffcd131c60c00ce680acd89c5c286cee_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:f0814d33be7a101b6326fb8a536efc0fe66df764d1efa8ddda021e90e61afda9_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "authlib: Authlib Denial of Service"
}
]
}
RHSA-2025:23064
Vulnerability from csaf_redhat - Published: 2025-12-10 16:36 - Updated: 2026-03-16 12:13Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat Quay 3.10.17 is now available with bug fixes.",
"title": "Topic"
},
{
"category": "general",
"text": "Quay 3.10.17",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:23064",
"url": "https://access.redhat.com/errata/RHSA-2025:23064"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2024-34156",
"url": "https://access.redhat.com/security/cve/CVE-2024-34156"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2024-45337",
"url": "https://access.redhat.com/security/cve/CVE-2024-45337"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2024-45338",
"url": "https://access.redhat.com/security/cve/CVE-2024-45338"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-47913",
"url": "https://access.redhat.com/security/cve/CVE-2025-47913"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-59420",
"url": "https://access.redhat.com/security/cve/CVE-2025-59420"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61920",
"url": "https://access.redhat.com/security/cve/CVE-2025-61920"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_23064.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Quay 3.10.17",
"tracking": {
"current_release_date": "2026-03-16T12:13:39+00:00",
"generator": {
"date": "2026-03-16T12:13:39+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.3"
}
},
"id": "RHSA-2025:23064",
"initial_release_date": "2025-12-10T16:36:13+00:00",
"revision_history": [
{
"date": "2025-12-10T16:36:13+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-12-11T15:24:12+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-16T12:13:39+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Quay 3.1",
"product": {
"name": "Red Hat Quay 3.1",
"product_id": "Red Hat Quay 3.1",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:quay:3.10::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat Quay"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:b82090e9203982de62d995c18eed37838b8ebbb092195a7f58d02526fd04523e_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:b82090e9203982de62d995c18eed37838b8ebbb092195a7f58d02526fd04523e_amd64",
"product_id": "registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:b82090e9203982de62d995c18eed37838b8ebbb092195a7f58d02526fd04523e_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-container-security-operator-bundle@sha256%3Ab82090e9203982de62d995c18eed37838b8ebbb092195a7f58d02526fd04523e?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=3.10.17-1765384144"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:ab3aa3fde12c94c24c2c1a3caa08f5d995cc9d3d9cca1af8b46610f6b4ff28ee_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:ab3aa3fde12c94c24c2c1a3caa08f5d995cc9d3d9cca1af8b46610f6b4ff28ee_amd64",
"product_id": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:ab3aa3fde12c94c24c2c1a3caa08f5d995cc9d3d9cca1af8b46610f6b4ff28ee_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-container-security-operator-rhel8@sha256%3Aab3aa3fde12c94c24c2c1a3caa08f5d995cc9d3d9cca1af8b46610f6b4ff28ee?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=3.10.17-1765384144"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:8b475114a5f77f7c041509a30246769a5f9064510724c8fc99ac29164dc3a0bb_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:8b475114a5f77f7c041509a30246769a5f9064510724c8fc99ac29164dc3a0bb_amd64",
"product_id": "registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:8b475114a5f77f7c041509a30246769a5f9064510724c8fc99ac29164dc3a0bb_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-bridge-operator-bundle@sha256%3A8b475114a5f77f7c041509a30246769a5f9064510724c8fc99ac29164dc3a0bb?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=3.10.17-1765384144"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa126c3f4865a2a62cba2734110418c865aa2d32f38147c056732e53fc593715_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa126c3f4865a2a62cba2734110418c865aa2d32f38147c056732e53fc593715_amd64",
"product_id": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa126c3f4865a2a62cba2734110418c865aa2d32f38147c056732e53fc593715_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-bridge-operator-rhel8@sha256%3Aaa126c3f4865a2a62cba2734110418c865aa2d32f38147c056732e53fc593715?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=3.10.17-1765384144"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:cf0b723425c76814def9211124d18ce95e58b265185e12c5ae183f9999e51b1a_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:cf0b723425c76814def9211124d18ce95e58b265185e12c5ae183f9999e51b1a_amd64",
"product_id": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:cf0b723425c76814def9211124d18ce95e58b265185e12c5ae183f9999e51b1a_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-builder-qemu-rhcos-rhel8@sha256%3Acf0b723425c76814def9211124d18ce95e58b265185e12c5ae183f9999e51b1a?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=3.14-1765384144"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:6f893e3537bdc8ac814c5726f5594f4da820973d2246d3b399687d406e9a3952_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:6f893e3537bdc8ac814c5726f5594f4da820973d2246d3b399687d406e9a3952_amd64",
"product_id": "registry.redhat.io/quay/quay-builder-rhel8@sha256:6f893e3537bdc8ac814c5726f5594f4da820973d2246d3b399687d406e9a3952_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-builder-rhel8@sha256%3A6f893e3537bdc8ac814c5726f5594f4da820973d2246d3b399687d406e9a3952?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=3.10.17-1765384144"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/clair-rhel8@sha256:9403e73ee33102c2f18bcaca03e8eae21a283e47a4f288150db4d105a90b6b8f_amd64",
"product": {
"name": "registry.redhat.io/quay/clair-rhel8@sha256:9403e73ee33102c2f18bcaca03e8eae21a283e47a4f288150db4d105a90b6b8f_amd64",
"product_id": "registry.redhat.io/quay/clair-rhel8@sha256:9403e73ee33102c2f18bcaca03e8eae21a283e47a4f288150db4d105a90b6b8f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/clair-rhel8@sha256%3A9403e73ee33102c2f18bcaca03e8eae21a283e47a4f288150db4d105a90b6b8f?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=v3.10.16-1765384144"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-operator-bundle@sha256:91ce9e64184afb90b00360c64f5ba37d30130ab0344b2439b93db15f2b35b74d_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-operator-bundle@sha256:91ce9e64184afb90b00360c64f5ba37d30130ab0344b2439b93db15f2b35b74d_amd64",
"product_id": "registry.redhat.io/quay/quay-operator-bundle@sha256:91ce9e64184afb90b00360c64f5ba37d30130ab0344b2439b93db15f2b35b74d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-operator-bundle@sha256%3A91ce9e64184afb90b00360c64f5ba37d30130ab0344b2439b93db15f2b35b74d?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=3.10.17-1765384144"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:cfbfd35f7cd15df266c69d12975f64db2bc38238d2a0a7f9d17b319db20ccbbb_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:cfbfd35f7cd15df266c69d12975f64db2bc38238d2a0a7f9d17b319db20ccbbb_amd64",
"product_id": "registry.redhat.io/quay/quay-operator-rhel8@sha256:cfbfd35f7cd15df266c69d12975f64db2bc38238d2a0a7f9d17b319db20ccbbb_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-operator-rhel8@sha256%3Acfbfd35f7cd15df266c69d12975f64db2bc38238d2a0a7f9d17b319db20ccbbb?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=3.10.17-1765384144"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-rhel8@sha256:7b77b205b95f99383f12e571b391a35ea8f85dfd23f2d4fd67045bbece1ee66e_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-rhel8@sha256:7b77b205b95f99383f12e571b391a35ea8f85dfd23f2d4fd67045bbece1ee66e_amd64",
"product_id": "registry.redhat.io/quay/quay-rhel8@sha256:7b77b205b95f99383f12e571b391a35ea8f85dfd23f2d4fd67045bbece1ee66e_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-rhel8@sha256%3A7b77b205b95f99383f12e571b391a35ea8f85dfd23f2d4fd67045bbece1ee66e?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=3.10.17-1765384144"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:c7c2192a046c0fde35dcafa363803c085663676224708f4520fd967b3d2c8dd4_arm64",
"product": {
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:c7c2192a046c0fde35dcafa363803c085663676224708f4520fd967b3d2c8dd4_arm64",
"product_id": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:c7c2192a046c0fde35dcafa363803c085663676224708f4520fd967b3d2c8dd4_arm64",
"product_identification_helper": {
"purl": "pkg:oci/quay-container-security-operator-rhel8@sha256%3Ac7c2192a046c0fde35dcafa363803c085663676224708f4520fd967b3d2c8dd4?arch=arm64\u0026repository_url=registry.redhat.io/quay\u0026tag=3.10.17-1765384144"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f55014b7e95512e2dcad9ebde4d36a39e136093ed22fc3436e66cf9b34091999_arm64",
"product": {
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f55014b7e95512e2dcad9ebde4d36a39e136093ed22fc3436e66cf9b34091999_arm64",
"product_id": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f55014b7e95512e2dcad9ebde4d36a39e136093ed22fc3436e66cf9b34091999_arm64",
"product_identification_helper": {
"purl": "pkg:oci/quay-bridge-operator-rhel8@sha256%3Af55014b7e95512e2dcad9ebde4d36a39e136093ed22fc3436e66cf9b34091999?arch=arm64\u0026repository_url=registry.redhat.io/quay\u0026tag=3.10.17-1765384144"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:d93675365e51845d5d8a17997395726a4b09952fba42aaccdcfe132fd8e4d31c_arm64",
"product": {
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:d93675365e51845d5d8a17997395726a4b09952fba42aaccdcfe132fd8e4d31c_arm64",
"product_id": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:d93675365e51845d5d8a17997395726a4b09952fba42aaccdcfe132fd8e4d31c_arm64",
"product_identification_helper": {
"purl": "pkg:oci/quay-builder-qemu-rhcos-rhel8@sha256%3Ad93675365e51845d5d8a17997395726a4b09952fba42aaccdcfe132fd8e4d31c?arch=arm64\u0026repository_url=registry.redhat.io/quay\u0026tag=3.14-1765384144"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:bcc3f8c6589b63a0a162498ea2ab3596971a97b9107ade0ebd3e8d0d372ac84e_arm64",
"product": {
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:bcc3f8c6589b63a0a162498ea2ab3596971a97b9107ade0ebd3e8d0d372ac84e_arm64",
"product_id": "registry.redhat.io/quay/quay-builder-rhel8@sha256:bcc3f8c6589b63a0a162498ea2ab3596971a97b9107ade0ebd3e8d0d372ac84e_arm64",
"product_identification_helper": {
"purl": "pkg:oci/quay-builder-rhel8@sha256%3Abcc3f8c6589b63a0a162498ea2ab3596971a97b9107ade0ebd3e8d0d372ac84e?arch=arm64\u0026repository_url=registry.redhat.io/quay\u0026tag=3.10.17-1765384144"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/clair-rhel8@sha256:bb630cb6e6bad937624d772e49a795da457035c7dcb1740c07d54a36f561ad79_arm64",
"product": {
"name": "registry.redhat.io/quay/clair-rhel8@sha256:bb630cb6e6bad937624d772e49a795da457035c7dcb1740c07d54a36f561ad79_arm64",
"product_id": "registry.redhat.io/quay/clair-rhel8@sha256:bb630cb6e6bad937624d772e49a795da457035c7dcb1740c07d54a36f561ad79_arm64",
"product_identification_helper": {
"purl": "pkg:oci/clair-rhel8@sha256%3Abb630cb6e6bad937624d772e49a795da457035c7dcb1740c07d54a36f561ad79?arch=arm64\u0026repository_url=registry.redhat.io/quay\u0026tag=v3.10.16-1765384144"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:3940beeed21aa2c4ae695e7ac40a0373a05246f1dff2d6d829d3111c032a1970_arm64",
"product": {
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:3940beeed21aa2c4ae695e7ac40a0373a05246f1dff2d6d829d3111c032a1970_arm64",
"product_id": "registry.redhat.io/quay/quay-operator-rhel8@sha256:3940beeed21aa2c4ae695e7ac40a0373a05246f1dff2d6d829d3111c032a1970_arm64",
"product_identification_helper": {
"purl": "pkg:oci/quay-operator-rhel8@sha256%3A3940beeed21aa2c4ae695e7ac40a0373a05246f1dff2d6d829d3111c032a1970?arch=arm64\u0026repository_url=registry.redhat.io/quay\u0026tag=3.10.17-1765384144"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-rhel8@sha256:d0ad53575ddce599c11e959d3590300ab325633951003db4ef2d82a133c8ef19_arm64",
"product": {
"name": "registry.redhat.io/quay/quay-rhel8@sha256:d0ad53575ddce599c11e959d3590300ab325633951003db4ef2d82a133c8ef19_arm64",
"product_id": "registry.redhat.io/quay/quay-rhel8@sha256:d0ad53575ddce599c11e959d3590300ab325633951003db4ef2d82a133c8ef19_arm64",
"product_identification_helper": {
"purl": "pkg:oci/quay-rhel8@sha256%3Ad0ad53575ddce599c11e959d3590300ab325633951003db4ef2d82a133c8ef19?arch=arm64\u0026repository_url=registry.redhat.io/quay\u0026tag=3.10.17-1765384144"
}
}
}
],
"category": "architecture",
"name": "arm64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:1bd8354520b468f4eb47872a428f56da551e6720f31a41ce6e02df5050b4f8b2_ppc64le",
"product": {
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:1bd8354520b468f4eb47872a428f56da551e6720f31a41ce6e02df5050b4f8b2_ppc64le",
"product_id": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:1bd8354520b468f4eb47872a428f56da551e6720f31a41ce6e02df5050b4f8b2_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/quay-container-security-operator-rhel8@sha256%3A1bd8354520b468f4eb47872a428f56da551e6720f31a41ce6e02df5050b4f8b2?arch=ppc64le\u0026repository_url=registry.redhat.io/quay\u0026tag=3.10.17-1765384144"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b9889747f06f6fe48cd1a79aaf6dcafcf6a9cdd2d2ad986fb10da3f2a51c103b_ppc64le",
"product": {
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b9889747f06f6fe48cd1a79aaf6dcafcf6a9cdd2d2ad986fb10da3f2a51c103b_ppc64le",
"product_id": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b9889747f06f6fe48cd1a79aaf6dcafcf6a9cdd2d2ad986fb10da3f2a51c103b_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/quay-bridge-operator-rhel8@sha256%3Ab9889747f06f6fe48cd1a79aaf6dcafcf6a9cdd2d2ad986fb10da3f2a51c103b?arch=ppc64le\u0026repository_url=registry.redhat.io/quay\u0026tag=3.10.17-1765384144"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:f3223fc2fef5653947f8e402020c7f332beeee7c6a09d9be0bc7dc31ef3936f8_ppc64le",
"product": {
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:f3223fc2fef5653947f8e402020c7f332beeee7c6a09d9be0bc7dc31ef3936f8_ppc64le",
"product_id": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:f3223fc2fef5653947f8e402020c7f332beeee7c6a09d9be0bc7dc31ef3936f8_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/quay-builder-qemu-rhcos-rhel8@sha256%3Af3223fc2fef5653947f8e402020c7f332beeee7c6a09d9be0bc7dc31ef3936f8?arch=ppc64le\u0026repository_url=registry.redhat.io/quay\u0026tag=3.14-1765384144"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:c6dfd40d71e49b352b39595ad73f06002d3bc448bc93e06def96ab3424451893_ppc64le",
"product": {
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:c6dfd40d71e49b352b39595ad73f06002d3bc448bc93e06def96ab3424451893_ppc64le",
"product_id": "registry.redhat.io/quay/quay-builder-rhel8@sha256:c6dfd40d71e49b352b39595ad73f06002d3bc448bc93e06def96ab3424451893_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/quay-builder-rhel8@sha256%3Ac6dfd40d71e49b352b39595ad73f06002d3bc448bc93e06def96ab3424451893?arch=ppc64le\u0026repository_url=registry.redhat.io/quay\u0026tag=3.10.17-1765384144"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/clair-rhel8@sha256:83c5ad5ebfdd1b389af2fd407d8d6b8da52805cb3212bb2916108001296bb642_ppc64le",
"product": {
"name": "registry.redhat.io/quay/clair-rhel8@sha256:83c5ad5ebfdd1b389af2fd407d8d6b8da52805cb3212bb2916108001296bb642_ppc64le",
"product_id": "registry.redhat.io/quay/clair-rhel8@sha256:83c5ad5ebfdd1b389af2fd407d8d6b8da52805cb3212bb2916108001296bb642_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/clair-rhel8@sha256%3A83c5ad5ebfdd1b389af2fd407d8d6b8da52805cb3212bb2916108001296bb642?arch=ppc64le\u0026repository_url=registry.redhat.io/quay\u0026tag=v3.10.16-1765384144"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:96ee14d79f08194aa54cc7e6d1d814dae5af1d7143e513b6f1cb9397b6407ae6_ppc64le",
"product": {
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:96ee14d79f08194aa54cc7e6d1d814dae5af1d7143e513b6f1cb9397b6407ae6_ppc64le",
"product_id": "registry.redhat.io/quay/quay-operator-rhel8@sha256:96ee14d79f08194aa54cc7e6d1d814dae5af1d7143e513b6f1cb9397b6407ae6_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/quay-operator-rhel8@sha256%3A96ee14d79f08194aa54cc7e6d1d814dae5af1d7143e513b6f1cb9397b6407ae6?arch=ppc64le\u0026repository_url=registry.redhat.io/quay\u0026tag=3.10.17-1765384144"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-rhel8@sha256:b638f53267de38576f1875ee3379114ba3c2089d8b26901c4a960ec82d35a0b6_ppc64le",
"product": {
"name": "registry.redhat.io/quay/quay-rhel8@sha256:b638f53267de38576f1875ee3379114ba3c2089d8b26901c4a960ec82d35a0b6_ppc64le",
"product_id": "registry.redhat.io/quay/quay-rhel8@sha256:b638f53267de38576f1875ee3379114ba3c2089d8b26901c4a960ec82d35a0b6_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/quay-rhel8@sha256%3Ab638f53267de38576f1875ee3379114ba3c2089d8b26901c4a960ec82d35a0b6?arch=ppc64le\u0026repository_url=registry.redhat.io/quay\u0026tag=3.10.17-1765384144"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:03da6ae6711c5238e19daa8ccccd75bc936ab8144b67cb2ccddcd3d1d2e33a40_s390x",
"product": {
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:03da6ae6711c5238e19daa8ccccd75bc936ab8144b67cb2ccddcd3d1d2e33a40_s390x",
"product_id": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:03da6ae6711c5238e19daa8ccccd75bc936ab8144b67cb2ccddcd3d1d2e33a40_s390x",
"product_identification_helper": {
"purl": "pkg:oci/quay-container-security-operator-rhel8@sha256%3A03da6ae6711c5238e19daa8ccccd75bc936ab8144b67cb2ccddcd3d1d2e33a40?arch=s390x\u0026repository_url=registry.redhat.io/quay\u0026tag=3.10.17-1765384144"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:892bee6e3214a69b8924f840b69a55ac0c8d66443bf042cfa88c13766bd8dce3_s390x",
"product": {
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:892bee6e3214a69b8924f840b69a55ac0c8d66443bf042cfa88c13766bd8dce3_s390x",
"product_id": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:892bee6e3214a69b8924f840b69a55ac0c8d66443bf042cfa88c13766bd8dce3_s390x",
"product_identification_helper": {
"purl": "pkg:oci/quay-bridge-operator-rhel8@sha256%3A892bee6e3214a69b8924f840b69a55ac0c8d66443bf042cfa88c13766bd8dce3?arch=s390x\u0026repository_url=registry.redhat.io/quay\u0026tag=3.10.17-1765384144"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:42e442bf326bf2039f7ead1d13ba0b47e605fce986c241e6fcfca9cc9926b255_s390x",
"product": {
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:42e442bf326bf2039f7ead1d13ba0b47e605fce986c241e6fcfca9cc9926b255_s390x",
"product_id": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:42e442bf326bf2039f7ead1d13ba0b47e605fce986c241e6fcfca9cc9926b255_s390x",
"product_identification_helper": {
"purl": "pkg:oci/quay-builder-qemu-rhcos-rhel8@sha256%3A42e442bf326bf2039f7ead1d13ba0b47e605fce986c241e6fcfca9cc9926b255?arch=s390x\u0026repository_url=registry.redhat.io/quay\u0026tag=3.14-1765384144"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:25567f02ee5b0640a12f76bfed9b889334363be402d9bdb14c8b7cc37feb6b28_s390x",
"product": {
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:25567f02ee5b0640a12f76bfed9b889334363be402d9bdb14c8b7cc37feb6b28_s390x",
"product_id": "registry.redhat.io/quay/quay-builder-rhel8@sha256:25567f02ee5b0640a12f76bfed9b889334363be402d9bdb14c8b7cc37feb6b28_s390x",
"product_identification_helper": {
"purl": "pkg:oci/quay-builder-rhel8@sha256%3A25567f02ee5b0640a12f76bfed9b889334363be402d9bdb14c8b7cc37feb6b28?arch=s390x\u0026repository_url=registry.redhat.io/quay\u0026tag=3.10.17-1765384144"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/clair-rhel8@sha256:fec577bc00c5dc32b284c30fb0d2e324a12d0f932b9abf65e70256e3d80bcda8_s390x",
"product": {
"name": "registry.redhat.io/quay/clair-rhel8@sha256:fec577bc00c5dc32b284c30fb0d2e324a12d0f932b9abf65e70256e3d80bcda8_s390x",
"product_id": "registry.redhat.io/quay/clair-rhel8@sha256:fec577bc00c5dc32b284c30fb0d2e324a12d0f932b9abf65e70256e3d80bcda8_s390x",
"product_identification_helper": {
"purl": "pkg:oci/clair-rhel8@sha256%3Afec577bc00c5dc32b284c30fb0d2e324a12d0f932b9abf65e70256e3d80bcda8?arch=s390x\u0026repository_url=registry.redhat.io/quay\u0026tag=v3.10.16-1765384144"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:e83662cd7bab21bcd0faa26ae67f0cb9244a67e17036af92cf30fe2a5591dcb0_s390x",
"product": {
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:e83662cd7bab21bcd0faa26ae67f0cb9244a67e17036af92cf30fe2a5591dcb0_s390x",
"product_id": "registry.redhat.io/quay/quay-operator-rhel8@sha256:e83662cd7bab21bcd0faa26ae67f0cb9244a67e17036af92cf30fe2a5591dcb0_s390x",
"product_identification_helper": {
"purl": "pkg:oci/quay-operator-rhel8@sha256%3Ae83662cd7bab21bcd0faa26ae67f0cb9244a67e17036af92cf30fe2a5591dcb0?arch=s390x\u0026repository_url=registry.redhat.io/quay\u0026tag=3.10.17-1765384144"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-rhel8@sha256:2b5f83bbade40b04a7975788743afdb8cec5f72ad8e5eea4c75d5840ce44ef3f_s390x",
"product": {
"name": "registry.redhat.io/quay/quay-rhel8@sha256:2b5f83bbade40b04a7975788743afdb8cec5f72ad8e5eea4c75d5840ce44ef3f_s390x",
"product_id": "registry.redhat.io/quay/quay-rhel8@sha256:2b5f83bbade40b04a7975788743afdb8cec5f72ad8e5eea4c75d5840ce44ef3f_s390x",
"product_identification_helper": {
"purl": "pkg:oci/quay-rhel8@sha256%3A2b5f83bbade40b04a7975788743afdb8cec5f72ad8e5eea4c75d5840ce44ef3f?arch=s390x\u0026repository_url=registry.redhat.io/quay\u0026tag=3.10.17-1765384144"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/clair-rhel8@sha256:83c5ad5ebfdd1b389af2fd407d8d6b8da52805cb3212bb2916108001296bb642_ppc64le as a component of Red Hat Quay 3.1",
"product_id": "Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:83c5ad5ebfdd1b389af2fd407d8d6b8da52805cb3212bb2916108001296bb642_ppc64le"
},
"product_reference": "registry.redhat.io/quay/clair-rhel8@sha256:83c5ad5ebfdd1b389af2fd407d8d6b8da52805cb3212bb2916108001296bb642_ppc64le",
"relates_to_product_reference": "Red Hat Quay 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/clair-rhel8@sha256:9403e73ee33102c2f18bcaca03e8eae21a283e47a4f288150db4d105a90b6b8f_amd64 as a component of Red Hat Quay 3.1",
"product_id": "Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:9403e73ee33102c2f18bcaca03e8eae21a283e47a4f288150db4d105a90b6b8f_amd64"
},
"product_reference": "registry.redhat.io/quay/clair-rhel8@sha256:9403e73ee33102c2f18bcaca03e8eae21a283e47a4f288150db4d105a90b6b8f_amd64",
"relates_to_product_reference": "Red Hat Quay 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/clair-rhel8@sha256:bb630cb6e6bad937624d772e49a795da457035c7dcb1740c07d54a36f561ad79_arm64 as a component of Red Hat Quay 3.1",
"product_id": "Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:bb630cb6e6bad937624d772e49a795da457035c7dcb1740c07d54a36f561ad79_arm64"
},
"product_reference": "registry.redhat.io/quay/clair-rhel8@sha256:bb630cb6e6bad937624d772e49a795da457035c7dcb1740c07d54a36f561ad79_arm64",
"relates_to_product_reference": "Red Hat Quay 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/clair-rhel8@sha256:fec577bc00c5dc32b284c30fb0d2e324a12d0f932b9abf65e70256e3d80bcda8_s390x as a component of Red Hat Quay 3.1",
"product_id": "Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:fec577bc00c5dc32b284c30fb0d2e324a12d0f932b9abf65e70256e3d80bcda8_s390x"
},
"product_reference": "registry.redhat.io/quay/clair-rhel8@sha256:fec577bc00c5dc32b284c30fb0d2e324a12d0f932b9abf65e70256e3d80bcda8_s390x",
"relates_to_product_reference": "Red Hat Quay 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:8b475114a5f77f7c041509a30246769a5f9064510724c8fc99ac29164dc3a0bb_amd64 as a component of Red Hat Quay 3.1",
"product_id": "Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:8b475114a5f77f7c041509a30246769a5f9064510724c8fc99ac29164dc3a0bb_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:8b475114a5f77f7c041509a30246769a5f9064510724c8fc99ac29164dc3a0bb_amd64",
"relates_to_product_reference": "Red Hat Quay 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:892bee6e3214a69b8924f840b69a55ac0c8d66443bf042cfa88c13766bd8dce3_s390x as a component of Red Hat Quay 3.1",
"product_id": "Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:892bee6e3214a69b8924f840b69a55ac0c8d66443bf042cfa88c13766bd8dce3_s390x"
},
"product_reference": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:892bee6e3214a69b8924f840b69a55ac0c8d66443bf042cfa88c13766bd8dce3_s390x",
"relates_to_product_reference": "Red Hat Quay 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa126c3f4865a2a62cba2734110418c865aa2d32f38147c056732e53fc593715_amd64 as a component of Red Hat Quay 3.1",
"product_id": "Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa126c3f4865a2a62cba2734110418c865aa2d32f38147c056732e53fc593715_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa126c3f4865a2a62cba2734110418c865aa2d32f38147c056732e53fc593715_amd64",
"relates_to_product_reference": "Red Hat Quay 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b9889747f06f6fe48cd1a79aaf6dcafcf6a9cdd2d2ad986fb10da3f2a51c103b_ppc64le as a component of Red Hat Quay 3.1",
"product_id": "Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b9889747f06f6fe48cd1a79aaf6dcafcf6a9cdd2d2ad986fb10da3f2a51c103b_ppc64le"
},
"product_reference": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b9889747f06f6fe48cd1a79aaf6dcafcf6a9cdd2d2ad986fb10da3f2a51c103b_ppc64le",
"relates_to_product_reference": "Red Hat Quay 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f55014b7e95512e2dcad9ebde4d36a39e136093ed22fc3436e66cf9b34091999_arm64 as a component of Red Hat Quay 3.1",
"product_id": "Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f55014b7e95512e2dcad9ebde4d36a39e136093ed22fc3436e66cf9b34091999_arm64"
},
"product_reference": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f55014b7e95512e2dcad9ebde4d36a39e136093ed22fc3436e66cf9b34091999_arm64",
"relates_to_product_reference": "Red Hat Quay 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:42e442bf326bf2039f7ead1d13ba0b47e605fce986c241e6fcfca9cc9926b255_s390x as a component of Red Hat Quay 3.1",
"product_id": "Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:42e442bf326bf2039f7ead1d13ba0b47e605fce986c241e6fcfca9cc9926b255_s390x"
},
"product_reference": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:42e442bf326bf2039f7ead1d13ba0b47e605fce986c241e6fcfca9cc9926b255_s390x",
"relates_to_product_reference": "Red Hat Quay 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:cf0b723425c76814def9211124d18ce95e58b265185e12c5ae183f9999e51b1a_amd64 as a component of Red Hat Quay 3.1",
"product_id": "Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:cf0b723425c76814def9211124d18ce95e58b265185e12c5ae183f9999e51b1a_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:cf0b723425c76814def9211124d18ce95e58b265185e12c5ae183f9999e51b1a_amd64",
"relates_to_product_reference": "Red Hat Quay 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:d93675365e51845d5d8a17997395726a4b09952fba42aaccdcfe132fd8e4d31c_arm64 as a component of Red Hat Quay 3.1",
"product_id": "Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:d93675365e51845d5d8a17997395726a4b09952fba42aaccdcfe132fd8e4d31c_arm64"
},
"product_reference": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:d93675365e51845d5d8a17997395726a4b09952fba42aaccdcfe132fd8e4d31c_arm64",
"relates_to_product_reference": "Red Hat Quay 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:f3223fc2fef5653947f8e402020c7f332beeee7c6a09d9be0bc7dc31ef3936f8_ppc64le as a component of Red Hat Quay 3.1",
"product_id": "Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:f3223fc2fef5653947f8e402020c7f332beeee7c6a09d9be0bc7dc31ef3936f8_ppc64le"
},
"product_reference": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:f3223fc2fef5653947f8e402020c7f332beeee7c6a09d9be0bc7dc31ef3936f8_ppc64le",
"relates_to_product_reference": "Red Hat Quay 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:25567f02ee5b0640a12f76bfed9b889334363be402d9bdb14c8b7cc37feb6b28_s390x as a component of Red Hat Quay 3.1",
"product_id": "Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:25567f02ee5b0640a12f76bfed9b889334363be402d9bdb14c8b7cc37feb6b28_s390x"
},
"product_reference": "registry.redhat.io/quay/quay-builder-rhel8@sha256:25567f02ee5b0640a12f76bfed9b889334363be402d9bdb14c8b7cc37feb6b28_s390x",
"relates_to_product_reference": "Red Hat Quay 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:6f893e3537bdc8ac814c5726f5594f4da820973d2246d3b399687d406e9a3952_amd64 as a component of Red Hat Quay 3.1",
"product_id": "Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:6f893e3537bdc8ac814c5726f5594f4da820973d2246d3b399687d406e9a3952_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-builder-rhel8@sha256:6f893e3537bdc8ac814c5726f5594f4da820973d2246d3b399687d406e9a3952_amd64",
"relates_to_product_reference": "Red Hat Quay 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:bcc3f8c6589b63a0a162498ea2ab3596971a97b9107ade0ebd3e8d0d372ac84e_arm64 as a component of Red Hat Quay 3.1",
"product_id": "Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:bcc3f8c6589b63a0a162498ea2ab3596971a97b9107ade0ebd3e8d0d372ac84e_arm64"
},
"product_reference": "registry.redhat.io/quay/quay-builder-rhel8@sha256:bcc3f8c6589b63a0a162498ea2ab3596971a97b9107ade0ebd3e8d0d372ac84e_arm64",
"relates_to_product_reference": "Red Hat Quay 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:c6dfd40d71e49b352b39595ad73f06002d3bc448bc93e06def96ab3424451893_ppc64le as a component of Red Hat Quay 3.1",
"product_id": "Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:c6dfd40d71e49b352b39595ad73f06002d3bc448bc93e06def96ab3424451893_ppc64le"
},
"product_reference": "registry.redhat.io/quay/quay-builder-rhel8@sha256:c6dfd40d71e49b352b39595ad73f06002d3bc448bc93e06def96ab3424451893_ppc64le",
"relates_to_product_reference": "Red Hat Quay 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:b82090e9203982de62d995c18eed37838b8ebbb092195a7f58d02526fd04523e_amd64 as a component of Red Hat Quay 3.1",
"product_id": "Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:b82090e9203982de62d995c18eed37838b8ebbb092195a7f58d02526fd04523e_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:b82090e9203982de62d995c18eed37838b8ebbb092195a7f58d02526fd04523e_amd64",
"relates_to_product_reference": "Red Hat Quay 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:03da6ae6711c5238e19daa8ccccd75bc936ab8144b67cb2ccddcd3d1d2e33a40_s390x as a component of Red Hat Quay 3.1",
"product_id": "Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:03da6ae6711c5238e19daa8ccccd75bc936ab8144b67cb2ccddcd3d1d2e33a40_s390x"
},
"product_reference": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:03da6ae6711c5238e19daa8ccccd75bc936ab8144b67cb2ccddcd3d1d2e33a40_s390x",
"relates_to_product_reference": "Red Hat Quay 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:1bd8354520b468f4eb47872a428f56da551e6720f31a41ce6e02df5050b4f8b2_ppc64le as a component of Red Hat Quay 3.1",
"product_id": "Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:1bd8354520b468f4eb47872a428f56da551e6720f31a41ce6e02df5050b4f8b2_ppc64le"
},
"product_reference": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:1bd8354520b468f4eb47872a428f56da551e6720f31a41ce6e02df5050b4f8b2_ppc64le",
"relates_to_product_reference": "Red Hat Quay 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:ab3aa3fde12c94c24c2c1a3caa08f5d995cc9d3d9cca1af8b46610f6b4ff28ee_amd64 as a component of Red Hat Quay 3.1",
"product_id": "Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:ab3aa3fde12c94c24c2c1a3caa08f5d995cc9d3d9cca1af8b46610f6b4ff28ee_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:ab3aa3fde12c94c24c2c1a3caa08f5d995cc9d3d9cca1af8b46610f6b4ff28ee_amd64",
"relates_to_product_reference": "Red Hat Quay 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:c7c2192a046c0fde35dcafa363803c085663676224708f4520fd967b3d2c8dd4_arm64 as a component of Red Hat Quay 3.1",
"product_id": "Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:c7c2192a046c0fde35dcafa363803c085663676224708f4520fd967b3d2c8dd4_arm64"
},
"product_reference": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:c7c2192a046c0fde35dcafa363803c085663676224708f4520fd967b3d2c8dd4_arm64",
"relates_to_product_reference": "Red Hat Quay 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-operator-bundle@sha256:91ce9e64184afb90b00360c64f5ba37d30130ab0344b2439b93db15f2b35b74d_amd64 as a component of Red Hat Quay 3.1",
"product_id": "Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-bundle@sha256:91ce9e64184afb90b00360c64f5ba37d30130ab0344b2439b93db15f2b35b74d_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-operator-bundle@sha256:91ce9e64184afb90b00360c64f5ba37d30130ab0344b2439b93db15f2b35b74d_amd64",
"relates_to_product_reference": "Red Hat Quay 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:3940beeed21aa2c4ae695e7ac40a0373a05246f1dff2d6d829d3111c032a1970_arm64 as a component of Red Hat Quay 3.1",
"product_id": "Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:3940beeed21aa2c4ae695e7ac40a0373a05246f1dff2d6d829d3111c032a1970_arm64"
},
"product_reference": "registry.redhat.io/quay/quay-operator-rhel8@sha256:3940beeed21aa2c4ae695e7ac40a0373a05246f1dff2d6d829d3111c032a1970_arm64",
"relates_to_product_reference": "Red Hat Quay 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:96ee14d79f08194aa54cc7e6d1d814dae5af1d7143e513b6f1cb9397b6407ae6_ppc64le as a component of Red Hat Quay 3.1",
"product_id": "Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:96ee14d79f08194aa54cc7e6d1d814dae5af1d7143e513b6f1cb9397b6407ae6_ppc64le"
},
"product_reference": "registry.redhat.io/quay/quay-operator-rhel8@sha256:96ee14d79f08194aa54cc7e6d1d814dae5af1d7143e513b6f1cb9397b6407ae6_ppc64le",
"relates_to_product_reference": "Red Hat Quay 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:cfbfd35f7cd15df266c69d12975f64db2bc38238d2a0a7f9d17b319db20ccbbb_amd64 as a component of Red Hat Quay 3.1",
"product_id": "Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:cfbfd35f7cd15df266c69d12975f64db2bc38238d2a0a7f9d17b319db20ccbbb_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-operator-rhel8@sha256:cfbfd35f7cd15df266c69d12975f64db2bc38238d2a0a7f9d17b319db20ccbbb_amd64",
"relates_to_product_reference": "Red Hat Quay 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:e83662cd7bab21bcd0faa26ae67f0cb9244a67e17036af92cf30fe2a5591dcb0_s390x as a component of Red Hat Quay 3.1",
"product_id": "Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:e83662cd7bab21bcd0faa26ae67f0cb9244a67e17036af92cf30fe2a5591dcb0_s390x"
},
"product_reference": "registry.redhat.io/quay/quay-operator-rhel8@sha256:e83662cd7bab21bcd0faa26ae67f0cb9244a67e17036af92cf30fe2a5591dcb0_s390x",
"relates_to_product_reference": "Red Hat Quay 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-rhel8@sha256:2b5f83bbade40b04a7975788743afdb8cec5f72ad8e5eea4c75d5840ce44ef3f_s390x as a component of Red Hat Quay 3.1",
"product_id": "Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:2b5f83bbade40b04a7975788743afdb8cec5f72ad8e5eea4c75d5840ce44ef3f_s390x"
},
"product_reference": "registry.redhat.io/quay/quay-rhel8@sha256:2b5f83bbade40b04a7975788743afdb8cec5f72ad8e5eea4c75d5840ce44ef3f_s390x",
"relates_to_product_reference": "Red Hat Quay 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-rhel8@sha256:7b77b205b95f99383f12e571b391a35ea8f85dfd23f2d4fd67045bbece1ee66e_amd64 as a component of Red Hat Quay 3.1",
"product_id": "Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:7b77b205b95f99383f12e571b391a35ea8f85dfd23f2d4fd67045bbece1ee66e_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-rhel8@sha256:7b77b205b95f99383f12e571b391a35ea8f85dfd23f2d4fd67045bbece1ee66e_amd64",
"relates_to_product_reference": "Red Hat Quay 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-rhel8@sha256:b638f53267de38576f1875ee3379114ba3c2089d8b26901c4a960ec82d35a0b6_ppc64le as a component of Red Hat Quay 3.1",
"product_id": "Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:b638f53267de38576f1875ee3379114ba3c2089d8b26901c4a960ec82d35a0b6_ppc64le"
},
"product_reference": "registry.redhat.io/quay/quay-rhel8@sha256:b638f53267de38576f1875ee3379114ba3c2089d8b26901c4a960ec82d35a0b6_ppc64le",
"relates_to_product_reference": "Red Hat Quay 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-rhel8@sha256:d0ad53575ddce599c11e959d3590300ab325633951003db4ef2d82a133c8ef19_arm64 as a component of Red Hat Quay 3.1",
"product_id": "Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:d0ad53575ddce599c11e959d3590300ab325633951003db4ef2d82a133c8ef19_arm64"
},
"product_reference": "registry.redhat.io/quay/quay-rhel8@sha256:d0ad53575ddce599c11e959d3590300ab325633951003db4ef2d82a133c8ef19_arm64",
"relates_to_product_reference": "Red Hat Quay 3.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-34156",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"discovery_date": "2024-09-06T21:20:09.377905+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:83c5ad5ebfdd1b389af2fd407d8d6b8da52805cb3212bb2916108001296bb642_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:9403e73ee33102c2f18bcaca03e8eae21a283e47a4f288150db4d105a90b6b8f_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:bb630cb6e6bad937624d772e49a795da457035c7dcb1740c07d54a36f561ad79_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:fec577bc00c5dc32b284c30fb0d2e324a12d0f932b9abf65e70256e3d80bcda8_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:8b475114a5f77f7c041509a30246769a5f9064510724c8fc99ac29164dc3a0bb_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:892bee6e3214a69b8924f840b69a55ac0c8d66443bf042cfa88c13766bd8dce3_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa126c3f4865a2a62cba2734110418c865aa2d32f38147c056732e53fc593715_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b9889747f06f6fe48cd1a79aaf6dcafcf6a9cdd2d2ad986fb10da3f2a51c103b_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f55014b7e95512e2dcad9ebde4d36a39e136093ed22fc3436e66cf9b34091999_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:42e442bf326bf2039f7ead1d13ba0b47e605fce986c241e6fcfca9cc9926b255_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:cf0b723425c76814def9211124d18ce95e58b265185e12c5ae183f9999e51b1a_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:d93675365e51845d5d8a17997395726a4b09952fba42aaccdcfe132fd8e4d31c_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:f3223fc2fef5653947f8e402020c7f332beeee7c6a09d9be0bc7dc31ef3936f8_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:25567f02ee5b0640a12f76bfed9b889334363be402d9bdb14c8b7cc37feb6b28_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:6f893e3537bdc8ac814c5726f5594f4da820973d2246d3b399687d406e9a3952_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:bcc3f8c6589b63a0a162498ea2ab3596971a97b9107ade0ebd3e8d0d372ac84e_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:c6dfd40d71e49b352b39595ad73f06002d3bc448bc93e06def96ab3424451893_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:b82090e9203982de62d995c18eed37838b8ebbb092195a7f58d02526fd04523e_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:03da6ae6711c5238e19daa8ccccd75bc936ab8144b67cb2ccddcd3d1d2e33a40_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:1bd8354520b468f4eb47872a428f56da551e6720f31a41ce6e02df5050b4f8b2_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:ab3aa3fde12c94c24c2c1a3caa08f5d995cc9d3d9cca1af8b46610f6b4ff28ee_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:c7c2192a046c0fde35dcafa363803c085663676224708f4520fd967b3d2c8dd4_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-bundle@sha256:91ce9e64184afb90b00360c64f5ba37d30130ab0344b2439b93db15f2b35b74d_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:2b5f83bbade40b04a7975788743afdb8cec5f72ad8e5eea4c75d5840ce44ef3f_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:7b77b205b95f99383f12e571b391a35ea8f85dfd23f2d4fd67045bbece1ee66e_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:b638f53267de38576f1875ee3379114ba3c2089d8b26901c4a960ec82d35a0b6_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:d0ad53575ddce599c11e959d3590300ab325633951003db4ef2d82a133c8ef19_arm64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2310528"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the encoding/gob package of the Golang standard library. Calling Decoder.Decoding, a message that contains deeply nested structures, can cause a panic due to stack exhaustion. This is a follow-up to CVE-2022-30635.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability in Go\u0027s `encoding/gob` package is of high severity because it exposes applications to potential Denial of Service (DoS) attacks through stack exhaustion. Since `gob` relies on recursive function calls to decode nested structures, an attacker could exploit this by sending crafted messages with excessively deep nesting, causing the application to panic due to stack overflow. This risk is particularly important in scenarios where untrusted or external input is processed, as it can lead to system unavailability or crashes, undermining the reliability and availability of services.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:3940beeed21aa2c4ae695e7ac40a0373a05246f1dff2d6d829d3111c032a1970_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:96ee14d79f08194aa54cc7e6d1d814dae5af1d7143e513b6f1cb9397b6407ae6_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:cfbfd35f7cd15df266c69d12975f64db2bc38238d2a0a7f9d17b319db20ccbbb_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:e83662cd7bab21bcd0faa26ae67f0cb9244a67e17036af92cf30fe2a5591dcb0_s390x"
],
"known_not_affected": [
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:83c5ad5ebfdd1b389af2fd407d8d6b8da52805cb3212bb2916108001296bb642_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:9403e73ee33102c2f18bcaca03e8eae21a283e47a4f288150db4d105a90b6b8f_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:bb630cb6e6bad937624d772e49a795da457035c7dcb1740c07d54a36f561ad79_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:fec577bc00c5dc32b284c30fb0d2e324a12d0f932b9abf65e70256e3d80bcda8_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:8b475114a5f77f7c041509a30246769a5f9064510724c8fc99ac29164dc3a0bb_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:892bee6e3214a69b8924f840b69a55ac0c8d66443bf042cfa88c13766bd8dce3_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa126c3f4865a2a62cba2734110418c865aa2d32f38147c056732e53fc593715_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b9889747f06f6fe48cd1a79aaf6dcafcf6a9cdd2d2ad986fb10da3f2a51c103b_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f55014b7e95512e2dcad9ebde4d36a39e136093ed22fc3436e66cf9b34091999_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:42e442bf326bf2039f7ead1d13ba0b47e605fce986c241e6fcfca9cc9926b255_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:cf0b723425c76814def9211124d18ce95e58b265185e12c5ae183f9999e51b1a_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:d93675365e51845d5d8a17997395726a4b09952fba42aaccdcfe132fd8e4d31c_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:f3223fc2fef5653947f8e402020c7f332beeee7c6a09d9be0bc7dc31ef3936f8_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:25567f02ee5b0640a12f76bfed9b889334363be402d9bdb14c8b7cc37feb6b28_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:6f893e3537bdc8ac814c5726f5594f4da820973d2246d3b399687d406e9a3952_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:bcc3f8c6589b63a0a162498ea2ab3596971a97b9107ade0ebd3e8d0d372ac84e_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:c6dfd40d71e49b352b39595ad73f06002d3bc448bc93e06def96ab3424451893_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:b82090e9203982de62d995c18eed37838b8ebbb092195a7f58d02526fd04523e_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:03da6ae6711c5238e19daa8ccccd75bc936ab8144b67cb2ccddcd3d1d2e33a40_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:1bd8354520b468f4eb47872a428f56da551e6720f31a41ce6e02df5050b4f8b2_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:ab3aa3fde12c94c24c2c1a3caa08f5d995cc9d3d9cca1af8b46610f6b4ff28ee_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:c7c2192a046c0fde35dcafa363803c085663676224708f4520fd967b3d2c8dd4_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-bundle@sha256:91ce9e64184afb90b00360c64f5ba37d30130ab0344b2439b93db15f2b35b74d_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:2b5f83bbade40b04a7975788743afdb8cec5f72ad8e5eea4c75d5840ce44ef3f_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:7b77b205b95f99383f12e571b391a35ea8f85dfd23f2d4fd67045bbece1ee66e_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:b638f53267de38576f1875ee3379114ba3c2089d8b26901c4a960ec82d35a0b6_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:d0ad53575ddce599c11e959d3590300ab325633951003db4ef2d82a133c8ef19_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-34156"
},
{
"category": "external",
"summary": "RHBZ#2310528",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2310528"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-34156",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34156"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-34156",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-34156"
},
{
"category": "external",
"summary": "https://go.dev/cl/611239",
"url": "https://go.dev/cl/611239"
},
{
"category": "external",
"summary": "https://go.dev/issue/69139",
"url": "https://go.dev/issue/69139"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-dev/c/S9POB9NCTdk",
"url": "https://groups.google.com/g/golang-dev/c/S9POB9NCTdk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2024-3106",
"url": "https://pkg.go.dev/vuln/GO-2024-3106"
}
],
"release_date": "2024-09-06T21:15:12.020000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-12-10T16:36:13+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:3940beeed21aa2c4ae695e7ac40a0373a05246f1dff2d6d829d3111c032a1970_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:96ee14d79f08194aa54cc7e6d1d814dae5af1d7143e513b6f1cb9397b6407ae6_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:cfbfd35f7cd15df266c69d12975f64db2bc38238d2a0a7f9d17b319db20ccbbb_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:e83662cd7bab21bcd0faa26ae67f0cb9244a67e17036af92cf30fe2a5591dcb0_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:23064"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:83c5ad5ebfdd1b389af2fd407d8d6b8da52805cb3212bb2916108001296bb642_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:9403e73ee33102c2f18bcaca03e8eae21a283e47a4f288150db4d105a90b6b8f_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:bb630cb6e6bad937624d772e49a795da457035c7dcb1740c07d54a36f561ad79_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:fec577bc00c5dc32b284c30fb0d2e324a12d0f932b9abf65e70256e3d80bcda8_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:8b475114a5f77f7c041509a30246769a5f9064510724c8fc99ac29164dc3a0bb_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:892bee6e3214a69b8924f840b69a55ac0c8d66443bf042cfa88c13766bd8dce3_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa126c3f4865a2a62cba2734110418c865aa2d32f38147c056732e53fc593715_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b9889747f06f6fe48cd1a79aaf6dcafcf6a9cdd2d2ad986fb10da3f2a51c103b_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f55014b7e95512e2dcad9ebde4d36a39e136093ed22fc3436e66cf9b34091999_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:42e442bf326bf2039f7ead1d13ba0b47e605fce986c241e6fcfca9cc9926b255_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:cf0b723425c76814def9211124d18ce95e58b265185e12c5ae183f9999e51b1a_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:d93675365e51845d5d8a17997395726a4b09952fba42aaccdcfe132fd8e4d31c_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:f3223fc2fef5653947f8e402020c7f332beeee7c6a09d9be0bc7dc31ef3936f8_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:25567f02ee5b0640a12f76bfed9b889334363be402d9bdb14c8b7cc37feb6b28_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:6f893e3537bdc8ac814c5726f5594f4da820973d2246d3b399687d406e9a3952_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:bcc3f8c6589b63a0a162498ea2ab3596971a97b9107ade0ebd3e8d0d372ac84e_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:c6dfd40d71e49b352b39595ad73f06002d3bc448bc93e06def96ab3424451893_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:b82090e9203982de62d995c18eed37838b8ebbb092195a7f58d02526fd04523e_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:03da6ae6711c5238e19daa8ccccd75bc936ab8144b67cb2ccddcd3d1d2e33a40_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:1bd8354520b468f4eb47872a428f56da551e6720f31a41ce6e02df5050b4f8b2_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:ab3aa3fde12c94c24c2c1a3caa08f5d995cc9d3d9cca1af8b46610f6b4ff28ee_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:c7c2192a046c0fde35dcafa363803c085663676224708f4520fd967b3d2c8dd4_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-bundle@sha256:91ce9e64184afb90b00360c64f5ba37d30130ab0344b2439b93db15f2b35b74d_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:3940beeed21aa2c4ae695e7ac40a0373a05246f1dff2d6d829d3111c032a1970_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:96ee14d79f08194aa54cc7e6d1d814dae5af1d7143e513b6f1cb9397b6407ae6_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:cfbfd35f7cd15df266c69d12975f64db2bc38238d2a0a7f9d17b319db20ccbbb_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:e83662cd7bab21bcd0faa26ae67f0cb9244a67e17036af92cf30fe2a5591dcb0_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:2b5f83bbade40b04a7975788743afdb8cec5f72ad8e5eea4c75d5840ce44ef3f_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:7b77b205b95f99383f12e571b391a35ea8f85dfd23f2d4fd67045bbece1ee66e_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:b638f53267de38576f1875ee3379114ba3c2089d8b26901c4a960ec82d35a0b6_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:d0ad53575ddce599c11e959d3590300ab325633951003db4ef2d82a133c8ef19_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:83c5ad5ebfdd1b389af2fd407d8d6b8da52805cb3212bb2916108001296bb642_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:9403e73ee33102c2f18bcaca03e8eae21a283e47a4f288150db4d105a90b6b8f_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:bb630cb6e6bad937624d772e49a795da457035c7dcb1740c07d54a36f561ad79_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:fec577bc00c5dc32b284c30fb0d2e324a12d0f932b9abf65e70256e3d80bcda8_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:8b475114a5f77f7c041509a30246769a5f9064510724c8fc99ac29164dc3a0bb_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:892bee6e3214a69b8924f840b69a55ac0c8d66443bf042cfa88c13766bd8dce3_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa126c3f4865a2a62cba2734110418c865aa2d32f38147c056732e53fc593715_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b9889747f06f6fe48cd1a79aaf6dcafcf6a9cdd2d2ad986fb10da3f2a51c103b_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f55014b7e95512e2dcad9ebde4d36a39e136093ed22fc3436e66cf9b34091999_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:42e442bf326bf2039f7ead1d13ba0b47e605fce986c241e6fcfca9cc9926b255_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:cf0b723425c76814def9211124d18ce95e58b265185e12c5ae183f9999e51b1a_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:d93675365e51845d5d8a17997395726a4b09952fba42aaccdcfe132fd8e4d31c_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:f3223fc2fef5653947f8e402020c7f332beeee7c6a09d9be0bc7dc31ef3936f8_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:25567f02ee5b0640a12f76bfed9b889334363be402d9bdb14c8b7cc37feb6b28_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:6f893e3537bdc8ac814c5726f5594f4da820973d2246d3b399687d406e9a3952_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:bcc3f8c6589b63a0a162498ea2ab3596971a97b9107ade0ebd3e8d0d372ac84e_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:c6dfd40d71e49b352b39595ad73f06002d3bc448bc93e06def96ab3424451893_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:b82090e9203982de62d995c18eed37838b8ebbb092195a7f58d02526fd04523e_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:03da6ae6711c5238e19daa8ccccd75bc936ab8144b67cb2ccddcd3d1d2e33a40_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:1bd8354520b468f4eb47872a428f56da551e6720f31a41ce6e02df5050b4f8b2_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:ab3aa3fde12c94c24c2c1a3caa08f5d995cc9d3d9cca1af8b46610f6b4ff28ee_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:c7c2192a046c0fde35dcafa363803c085663676224708f4520fd967b3d2c8dd4_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-bundle@sha256:91ce9e64184afb90b00360c64f5ba37d30130ab0344b2439b93db15f2b35b74d_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:3940beeed21aa2c4ae695e7ac40a0373a05246f1dff2d6d829d3111c032a1970_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:96ee14d79f08194aa54cc7e6d1d814dae5af1d7143e513b6f1cb9397b6407ae6_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:cfbfd35f7cd15df266c69d12975f64db2bc38238d2a0a7f9d17b319db20ccbbb_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:e83662cd7bab21bcd0faa26ae67f0cb9244a67e17036af92cf30fe2a5591dcb0_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:2b5f83bbade40b04a7975788743afdb8cec5f72ad8e5eea4c75d5840ce44ef3f_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:7b77b205b95f99383f12e571b391a35ea8f85dfd23f2d4fd67045bbece1ee66e_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:b638f53267de38576f1875ee3379114ba3c2089d8b26901c4a960ec82d35a0b6_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:d0ad53575ddce599c11e959d3590300ab325633951003db4ef2d82a133c8ef19_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion"
},
{
"cve": "CVE-2024-45337",
"cwe": {
"id": "CWE-285",
"name": "Improper Authorization"
},
"discovery_date": "2024-12-11T19:00:54.247490+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:83c5ad5ebfdd1b389af2fd407d8d6b8da52805cb3212bb2916108001296bb642_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:9403e73ee33102c2f18bcaca03e8eae21a283e47a4f288150db4d105a90b6b8f_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:bb630cb6e6bad937624d772e49a795da457035c7dcb1740c07d54a36f561ad79_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:fec577bc00c5dc32b284c30fb0d2e324a12d0f932b9abf65e70256e3d80bcda8_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:8b475114a5f77f7c041509a30246769a5f9064510724c8fc99ac29164dc3a0bb_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:892bee6e3214a69b8924f840b69a55ac0c8d66443bf042cfa88c13766bd8dce3_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa126c3f4865a2a62cba2734110418c865aa2d32f38147c056732e53fc593715_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b9889747f06f6fe48cd1a79aaf6dcafcf6a9cdd2d2ad986fb10da3f2a51c103b_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f55014b7e95512e2dcad9ebde4d36a39e136093ed22fc3436e66cf9b34091999_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:42e442bf326bf2039f7ead1d13ba0b47e605fce986c241e6fcfca9cc9926b255_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:cf0b723425c76814def9211124d18ce95e58b265185e12c5ae183f9999e51b1a_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:d93675365e51845d5d8a17997395726a4b09952fba42aaccdcfe132fd8e4d31c_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:f3223fc2fef5653947f8e402020c7f332beeee7c6a09d9be0bc7dc31ef3936f8_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:25567f02ee5b0640a12f76bfed9b889334363be402d9bdb14c8b7cc37feb6b28_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:6f893e3537bdc8ac814c5726f5594f4da820973d2246d3b399687d406e9a3952_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:bcc3f8c6589b63a0a162498ea2ab3596971a97b9107ade0ebd3e8d0d372ac84e_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:c6dfd40d71e49b352b39595ad73f06002d3bc448bc93e06def96ab3424451893_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:b82090e9203982de62d995c18eed37838b8ebbb092195a7f58d02526fd04523e_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:03da6ae6711c5238e19daa8ccccd75bc936ab8144b67cb2ccddcd3d1d2e33a40_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:1bd8354520b468f4eb47872a428f56da551e6720f31a41ce6e02df5050b4f8b2_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:ab3aa3fde12c94c24c2c1a3caa08f5d995cc9d3d9cca1af8b46610f6b4ff28ee_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:c7c2192a046c0fde35dcafa363803c085663676224708f4520fd967b3d2c8dd4_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-bundle@sha256:91ce9e64184afb90b00360c64f5ba37d30130ab0344b2439b93db15f2b35b74d_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:2b5f83bbade40b04a7975788743afdb8cec5f72ad8e5eea4c75d5840ce44ef3f_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:7b77b205b95f99383f12e571b391a35ea8f85dfd23f2d4fd67045bbece1ee66e_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:b638f53267de38576f1875ee3379114ba3c2089d8b26901c4a960ec82d35a0b6_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:d0ad53575ddce599c11e959d3590300ab325633951003db4ef2d82a133c8ef19_arm64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2331720"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the x/crypto/ssh go library. Applications and libraries that misuse the ServerConfig.PublicKeyCallback callback may be susceptible to an authorization bypass. For example, an attacker may send public keys A and B and authenticate with A. PublicKeyCallback would be called only twice, first with A and then with B. A vulnerable application may then make authorization decisions based on key B, for which the attacker does not control the private key. The misuse of ServerConfig.PublicKeyCallback may cause an authorization bypass.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang.org/x/crypto/ssh: Misuse of ServerConfig.PublicKeyCallback may cause authorization bypass in golang.org/x/crypto",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is classified as important rather than critical because it does not directly enable unauthorized access but rather introduces a risk of authorization bypass if the application or library misuses the PublicKeyCallback API. The vulnerability relies on incorrect assumptions made by the application when handling the sequence or state of keys provided during SSH authentication. Properly implemented systems that use the Permissions field or avoid relying on external state remain unaffected. Additionally, the vulnerability does not allow direct exploitation to gain control over a system without the presence of insecure logic in the application\u0027s handling of authentication attempts.\n\n\nRed Hat Enterprise Linux(RHEL) 8 \u0026 9 and Red Hat Openshift marked as not affected as it was determined that the problem function `ServerConfig.PublicKeyCallback`, as noted in the CVE-2024-45337 issue, is not called by Podman, Buildah, containers-common, or the gvisor-tap-vsock projects.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:3940beeed21aa2c4ae695e7ac40a0373a05246f1dff2d6d829d3111c032a1970_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:96ee14d79f08194aa54cc7e6d1d814dae5af1d7143e513b6f1cb9397b6407ae6_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:cfbfd35f7cd15df266c69d12975f64db2bc38238d2a0a7f9d17b319db20ccbbb_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:e83662cd7bab21bcd0faa26ae67f0cb9244a67e17036af92cf30fe2a5591dcb0_s390x"
],
"known_not_affected": [
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:83c5ad5ebfdd1b389af2fd407d8d6b8da52805cb3212bb2916108001296bb642_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:9403e73ee33102c2f18bcaca03e8eae21a283e47a4f288150db4d105a90b6b8f_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:bb630cb6e6bad937624d772e49a795da457035c7dcb1740c07d54a36f561ad79_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:fec577bc00c5dc32b284c30fb0d2e324a12d0f932b9abf65e70256e3d80bcda8_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:8b475114a5f77f7c041509a30246769a5f9064510724c8fc99ac29164dc3a0bb_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:892bee6e3214a69b8924f840b69a55ac0c8d66443bf042cfa88c13766bd8dce3_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa126c3f4865a2a62cba2734110418c865aa2d32f38147c056732e53fc593715_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b9889747f06f6fe48cd1a79aaf6dcafcf6a9cdd2d2ad986fb10da3f2a51c103b_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f55014b7e95512e2dcad9ebde4d36a39e136093ed22fc3436e66cf9b34091999_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:42e442bf326bf2039f7ead1d13ba0b47e605fce986c241e6fcfca9cc9926b255_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:cf0b723425c76814def9211124d18ce95e58b265185e12c5ae183f9999e51b1a_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:d93675365e51845d5d8a17997395726a4b09952fba42aaccdcfe132fd8e4d31c_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:f3223fc2fef5653947f8e402020c7f332beeee7c6a09d9be0bc7dc31ef3936f8_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:25567f02ee5b0640a12f76bfed9b889334363be402d9bdb14c8b7cc37feb6b28_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:6f893e3537bdc8ac814c5726f5594f4da820973d2246d3b399687d406e9a3952_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:bcc3f8c6589b63a0a162498ea2ab3596971a97b9107ade0ebd3e8d0d372ac84e_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:c6dfd40d71e49b352b39595ad73f06002d3bc448bc93e06def96ab3424451893_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:b82090e9203982de62d995c18eed37838b8ebbb092195a7f58d02526fd04523e_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:03da6ae6711c5238e19daa8ccccd75bc936ab8144b67cb2ccddcd3d1d2e33a40_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:1bd8354520b468f4eb47872a428f56da551e6720f31a41ce6e02df5050b4f8b2_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:ab3aa3fde12c94c24c2c1a3caa08f5d995cc9d3d9cca1af8b46610f6b4ff28ee_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:c7c2192a046c0fde35dcafa363803c085663676224708f4520fd967b3d2c8dd4_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-bundle@sha256:91ce9e64184afb90b00360c64f5ba37d30130ab0344b2439b93db15f2b35b74d_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:2b5f83bbade40b04a7975788743afdb8cec5f72ad8e5eea4c75d5840ce44ef3f_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:7b77b205b95f99383f12e571b391a35ea8f85dfd23f2d4fd67045bbece1ee66e_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:b638f53267de38576f1875ee3379114ba3c2089d8b26901c4a960ec82d35a0b6_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:d0ad53575ddce599c11e959d3590300ab325633951003db4ef2d82a133c8ef19_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-45337"
},
{
"category": "external",
"summary": "RHBZ#2331720",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331720"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-45337",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-45337"
},
{
"category": "external",
"summary": "https://github.com/golang/crypto/commit/b4f1988a35dee11ec3e05d6bf3e90b695fbd8909",
"url": "https://github.com/golang/crypto/commit/b4f1988a35dee11ec3e05d6bf3e90b695fbd8909"
},
{
"category": "external",
"summary": "https://go.dev/cl/635315",
"url": "https://go.dev/cl/635315"
},
{
"category": "external",
"summary": "https://go.dev/issue/70779",
"url": "https://go.dev/issue/70779"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/-nPEi39gI4Q/m/cGVPJCqdAQAJ",
"url": "https://groups.google.com/g/golang-announce/c/-nPEi39gI4Q/m/cGVPJCqdAQAJ"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2024-3321",
"url": "https://pkg.go.dev/vuln/GO-2024-3321"
}
],
"release_date": "2024-12-11T18:55:58.506000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-12-10T16:36:13+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:3940beeed21aa2c4ae695e7ac40a0373a05246f1dff2d6d829d3111c032a1970_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:96ee14d79f08194aa54cc7e6d1d814dae5af1d7143e513b6f1cb9397b6407ae6_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:cfbfd35f7cd15df266c69d12975f64db2bc38238d2a0a7f9d17b319db20ccbbb_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:e83662cd7bab21bcd0faa26ae67f0cb9244a67e17036af92cf30fe2a5591dcb0_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:23064"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:83c5ad5ebfdd1b389af2fd407d8d6b8da52805cb3212bb2916108001296bb642_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:9403e73ee33102c2f18bcaca03e8eae21a283e47a4f288150db4d105a90b6b8f_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:bb630cb6e6bad937624d772e49a795da457035c7dcb1740c07d54a36f561ad79_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:fec577bc00c5dc32b284c30fb0d2e324a12d0f932b9abf65e70256e3d80bcda8_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:8b475114a5f77f7c041509a30246769a5f9064510724c8fc99ac29164dc3a0bb_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:892bee6e3214a69b8924f840b69a55ac0c8d66443bf042cfa88c13766bd8dce3_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa126c3f4865a2a62cba2734110418c865aa2d32f38147c056732e53fc593715_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b9889747f06f6fe48cd1a79aaf6dcafcf6a9cdd2d2ad986fb10da3f2a51c103b_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f55014b7e95512e2dcad9ebde4d36a39e136093ed22fc3436e66cf9b34091999_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:42e442bf326bf2039f7ead1d13ba0b47e605fce986c241e6fcfca9cc9926b255_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:cf0b723425c76814def9211124d18ce95e58b265185e12c5ae183f9999e51b1a_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:d93675365e51845d5d8a17997395726a4b09952fba42aaccdcfe132fd8e4d31c_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:f3223fc2fef5653947f8e402020c7f332beeee7c6a09d9be0bc7dc31ef3936f8_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:25567f02ee5b0640a12f76bfed9b889334363be402d9bdb14c8b7cc37feb6b28_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:6f893e3537bdc8ac814c5726f5594f4da820973d2246d3b399687d406e9a3952_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:bcc3f8c6589b63a0a162498ea2ab3596971a97b9107ade0ebd3e8d0d372ac84e_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:c6dfd40d71e49b352b39595ad73f06002d3bc448bc93e06def96ab3424451893_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:b82090e9203982de62d995c18eed37838b8ebbb092195a7f58d02526fd04523e_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:03da6ae6711c5238e19daa8ccccd75bc936ab8144b67cb2ccddcd3d1d2e33a40_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:1bd8354520b468f4eb47872a428f56da551e6720f31a41ce6e02df5050b4f8b2_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:ab3aa3fde12c94c24c2c1a3caa08f5d995cc9d3d9cca1af8b46610f6b4ff28ee_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:c7c2192a046c0fde35dcafa363803c085663676224708f4520fd967b3d2c8dd4_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-bundle@sha256:91ce9e64184afb90b00360c64f5ba37d30130ab0344b2439b93db15f2b35b74d_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:3940beeed21aa2c4ae695e7ac40a0373a05246f1dff2d6d829d3111c032a1970_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:96ee14d79f08194aa54cc7e6d1d814dae5af1d7143e513b6f1cb9397b6407ae6_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:cfbfd35f7cd15df266c69d12975f64db2bc38238d2a0a7f9d17b319db20ccbbb_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:e83662cd7bab21bcd0faa26ae67f0cb9244a67e17036af92cf30fe2a5591dcb0_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:2b5f83bbade40b04a7975788743afdb8cec5f72ad8e5eea4c75d5840ce44ef3f_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:7b77b205b95f99383f12e571b391a35ea8f85dfd23f2d4fd67045bbece1ee66e_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:b638f53267de38576f1875ee3379114ba3c2089d8b26901c4a960ec82d35a0b6_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:d0ad53575ddce599c11e959d3590300ab325633951003db4ef2d82a133c8ef19_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:83c5ad5ebfdd1b389af2fd407d8d6b8da52805cb3212bb2916108001296bb642_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:9403e73ee33102c2f18bcaca03e8eae21a283e47a4f288150db4d105a90b6b8f_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:bb630cb6e6bad937624d772e49a795da457035c7dcb1740c07d54a36f561ad79_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:fec577bc00c5dc32b284c30fb0d2e324a12d0f932b9abf65e70256e3d80bcda8_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:8b475114a5f77f7c041509a30246769a5f9064510724c8fc99ac29164dc3a0bb_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:892bee6e3214a69b8924f840b69a55ac0c8d66443bf042cfa88c13766bd8dce3_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa126c3f4865a2a62cba2734110418c865aa2d32f38147c056732e53fc593715_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b9889747f06f6fe48cd1a79aaf6dcafcf6a9cdd2d2ad986fb10da3f2a51c103b_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f55014b7e95512e2dcad9ebde4d36a39e136093ed22fc3436e66cf9b34091999_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:42e442bf326bf2039f7ead1d13ba0b47e605fce986c241e6fcfca9cc9926b255_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:cf0b723425c76814def9211124d18ce95e58b265185e12c5ae183f9999e51b1a_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:d93675365e51845d5d8a17997395726a4b09952fba42aaccdcfe132fd8e4d31c_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:f3223fc2fef5653947f8e402020c7f332beeee7c6a09d9be0bc7dc31ef3936f8_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:25567f02ee5b0640a12f76bfed9b889334363be402d9bdb14c8b7cc37feb6b28_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:6f893e3537bdc8ac814c5726f5594f4da820973d2246d3b399687d406e9a3952_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:bcc3f8c6589b63a0a162498ea2ab3596971a97b9107ade0ebd3e8d0d372ac84e_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:c6dfd40d71e49b352b39595ad73f06002d3bc448bc93e06def96ab3424451893_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:b82090e9203982de62d995c18eed37838b8ebbb092195a7f58d02526fd04523e_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:03da6ae6711c5238e19daa8ccccd75bc936ab8144b67cb2ccddcd3d1d2e33a40_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:1bd8354520b468f4eb47872a428f56da551e6720f31a41ce6e02df5050b4f8b2_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:ab3aa3fde12c94c24c2c1a3caa08f5d995cc9d3d9cca1af8b46610f6b4ff28ee_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:c7c2192a046c0fde35dcafa363803c085663676224708f4520fd967b3d2c8dd4_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-bundle@sha256:91ce9e64184afb90b00360c64f5ba37d30130ab0344b2439b93db15f2b35b74d_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:3940beeed21aa2c4ae695e7ac40a0373a05246f1dff2d6d829d3111c032a1970_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:96ee14d79f08194aa54cc7e6d1d814dae5af1d7143e513b6f1cb9397b6407ae6_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:cfbfd35f7cd15df266c69d12975f64db2bc38238d2a0a7f9d17b319db20ccbbb_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:e83662cd7bab21bcd0faa26ae67f0cb9244a67e17036af92cf30fe2a5591dcb0_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:2b5f83bbade40b04a7975788743afdb8cec5f72ad8e5eea4c75d5840ce44ef3f_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:7b77b205b95f99383f12e571b391a35ea8f85dfd23f2d4fd67045bbece1ee66e_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:b638f53267de38576f1875ee3379114ba3c2089d8b26901c4a960ec82d35a0b6_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:d0ad53575ddce599c11e959d3590300ab325633951003db4ef2d82a133c8ef19_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang.org/x/crypto/ssh: Misuse of ServerConfig.PublicKeyCallback may cause authorization bypass in golang.org/x/crypto"
},
{
"cve": "CVE-2024-45338",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2024-12-18T21:00:59.938173+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:83c5ad5ebfdd1b389af2fd407d8d6b8da52805cb3212bb2916108001296bb642_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:9403e73ee33102c2f18bcaca03e8eae21a283e47a4f288150db4d105a90b6b8f_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:bb630cb6e6bad937624d772e49a795da457035c7dcb1740c07d54a36f561ad79_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:fec577bc00c5dc32b284c30fb0d2e324a12d0f932b9abf65e70256e3d80bcda8_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:8b475114a5f77f7c041509a30246769a5f9064510724c8fc99ac29164dc3a0bb_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:892bee6e3214a69b8924f840b69a55ac0c8d66443bf042cfa88c13766bd8dce3_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa126c3f4865a2a62cba2734110418c865aa2d32f38147c056732e53fc593715_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b9889747f06f6fe48cd1a79aaf6dcafcf6a9cdd2d2ad986fb10da3f2a51c103b_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f55014b7e95512e2dcad9ebde4d36a39e136093ed22fc3436e66cf9b34091999_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:42e442bf326bf2039f7ead1d13ba0b47e605fce986c241e6fcfca9cc9926b255_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:cf0b723425c76814def9211124d18ce95e58b265185e12c5ae183f9999e51b1a_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:d93675365e51845d5d8a17997395726a4b09952fba42aaccdcfe132fd8e4d31c_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:f3223fc2fef5653947f8e402020c7f332beeee7c6a09d9be0bc7dc31ef3936f8_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:25567f02ee5b0640a12f76bfed9b889334363be402d9bdb14c8b7cc37feb6b28_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:6f893e3537bdc8ac814c5726f5594f4da820973d2246d3b399687d406e9a3952_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:bcc3f8c6589b63a0a162498ea2ab3596971a97b9107ade0ebd3e8d0d372ac84e_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:c6dfd40d71e49b352b39595ad73f06002d3bc448bc93e06def96ab3424451893_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:b82090e9203982de62d995c18eed37838b8ebbb092195a7f58d02526fd04523e_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:03da6ae6711c5238e19daa8ccccd75bc936ab8144b67cb2ccddcd3d1d2e33a40_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:1bd8354520b468f4eb47872a428f56da551e6720f31a41ce6e02df5050b4f8b2_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:ab3aa3fde12c94c24c2c1a3caa08f5d995cc9d3d9cca1af8b46610f6b4ff28ee_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:c7c2192a046c0fde35dcafa363803c085663676224708f4520fd967b3d2c8dd4_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-bundle@sha256:91ce9e64184afb90b00360c64f5ba37d30130ab0344b2439b93db15f2b35b74d_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:2b5f83bbade40b04a7975788743afdb8cec5f72ad8e5eea4c75d5840ce44ef3f_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:7b77b205b95f99383f12e571b391a35ea8f85dfd23f2d4fd67045bbece1ee66e_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:b638f53267de38576f1875ee3379114ba3c2089d8b26901c4a960ec82d35a0b6_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:d0ad53575ddce599c11e959d3590300ab325633951003db4ef2d82a133c8ef19_arm64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2333122"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang.org/x/net/html. This flaw allows an attacker to craft input to the parse functions that would be processed non-linearly with respect to its length, resulting in extremely slow parsing. This issue can cause a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated as an Important severity because an attacker can craft malicious input that causes the parsing functions to process data non-linearly, resulting in significant delays which leads to a denial of service by exhausting system resources.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:3940beeed21aa2c4ae695e7ac40a0373a05246f1dff2d6d829d3111c032a1970_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:96ee14d79f08194aa54cc7e6d1d814dae5af1d7143e513b6f1cb9397b6407ae6_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:cfbfd35f7cd15df266c69d12975f64db2bc38238d2a0a7f9d17b319db20ccbbb_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:e83662cd7bab21bcd0faa26ae67f0cb9244a67e17036af92cf30fe2a5591dcb0_s390x"
],
"known_not_affected": [
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:83c5ad5ebfdd1b389af2fd407d8d6b8da52805cb3212bb2916108001296bb642_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:9403e73ee33102c2f18bcaca03e8eae21a283e47a4f288150db4d105a90b6b8f_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:bb630cb6e6bad937624d772e49a795da457035c7dcb1740c07d54a36f561ad79_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:fec577bc00c5dc32b284c30fb0d2e324a12d0f932b9abf65e70256e3d80bcda8_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:8b475114a5f77f7c041509a30246769a5f9064510724c8fc99ac29164dc3a0bb_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:892bee6e3214a69b8924f840b69a55ac0c8d66443bf042cfa88c13766bd8dce3_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa126c3f4865a2a62cba2734110418c865aa2d32f38147c056732e53fc593715_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b9889747f06f6fe48cd1a79aaf6dcafcf6a9cdd2d2ad986fb10da3f2a51c103b_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f55014b7e95512e2dcad9ebde4d36a39e136093ed22fc3436e66cf9b34091999_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:42e442bf326bf2039f7ead1d13ba0b47e605fce986c241e6fcfca9cc9926b255_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:cf0b723425c76814def9211124d18ce95e58b265185e12c5ae183f9999e51b1a_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:d93675365e51845d5d8a17997395726a4b09952fba42aaccdcfe132fd8e4d31c_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:f3223fc2fef5653947f8e402020c7f332beeee7c6a09d9be0bc7dc31ef3936f8_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:25567f02ee5b0640a12f76bfed9b889334363be402d9bdb14c8b7cc37feb6b28_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:6f893e3537bdc8ac814c5726f5594f4da820973d2246d3b399687d406e9a3952_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:bcc3f8c6589b63a0a162498ea2ab3596971a97b9107ade0ebd3e8d0d372ac84e_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:c6dfd40d71e49b352b39595ad73f06002d3bc448bc93e06def96ab3424451893_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:b82090e9203982de62d995c18eed37838b8ebbb092195a7f58d02526fd04523e_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:03da6ae6711c5238e19daa8ccccd75bc936ab8144b67cb2ccddcd3d1d2e33a40_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:1bd8354520b468f4eb47872a428f56da551e6720f31a41ce6e02df5050b4f8b2_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:ab3aa3fde12c94c24c2c1a3caa08f5d995cc9d3d9cca1af8b46610f6b4ff28ee_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:c7c2192a046c0fde35dcafa363803c085663676224708f4520fd967b3d2c8dd4_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-bundle@sha256:91ce9e64184afb90b00360c64f5ba37d30130ab0344b2439b93db15f2b35b74d_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:2b5f83bbade40b04a7975788743afdb8cec5f72ad8e5eea4c75d5840ce44ef3f_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:7b77b205b95f99383f12e571b391a35ea8f85dfd23f2d4fd67045bbece1ee66e_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:b638f53267de38576f1875ee3379114ba3c2089d8b26901c4a960ec82d35a0b6_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:d0ad53575ddce599c11e959d3590300ab325633951003db4ef2d82a133c8ef19_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-45338"
},
{
"category": "external",
"summary": "RHBZ#2333122",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333122"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-45338",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45338"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-45338",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-45338"
},
{
"category": "external",
"summary": "https://go.dev/cl/637536",
"url": "https://go.dev/cl/637536"
},
{
"category": "external",
"summary": "https://go.dev/issue/70906",
"url": "https://go.dev/issue/70906"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/wSCRmFnNmPA/m/Lvcd0mRMAwAJ",
"url": "https://groups.google.com/g/golang-announce/c/wSCRmFnNmPA/m/Lvcd0mRMAwAJ"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2024-3333",
"url": "https://pkg.go.dev/vuln/GO-2024-3333"
}
],
"release_date": "2024-12-18T20:38:22.660000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-12-10T16:36:13+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:3940beeed21aa2c4ae695e7ac40a0373a05246f1dff2d6d829d3111c032a1970_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:96ee14d79f08194aa54cc7e6d1d814dae5af1d7143e513b6f1cb9397b6407ae6_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:cfbfd35f7cd15df266c69d12975f64db2bc38238d2a0a7f9d17b319db20ccbbb_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:e83662cd7bab21bcd0faa26ae67f0cb9244a67e17036af92cf30fe2a5591dcb0_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:23064"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:83c5ad5ebfdd1b389af2fd407d8d6b8da52805cb3212bb2916108001296bb642_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:9403e73ee33102c2f18bcaca03e8eae21a283e47a4f288150db4d105a90b6b8f_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:bb630cb6e6bad937624d772e49a795da457035c7dcb1740c07d54a36f561ad79_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:fec577bc00c5dc32b284c30fb0d2e324a12d0f932b9abf65e70256e3d80bcda8_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:8b475114a5f77f7c041509a30246769a5f9064510724c8fc99ac29164dc3a0bb_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:892bee6e3214a69b8924f840b69a55ac0c8d66443bf042cfa88c13766bd8dce3_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa126c3f4865a2a62cba2734110418c865aa2d32f38147c056732e53fc593715_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b9889747f06f6fe48cd1a79aaf6dcafcf6a9cdd2d2ad986fb10da3f2a51c103b_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f55014b7e95512e2dcad9ebde4d36a39e136093ed22fc3436e66cf9b34091999_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:42e442bf326bf2039f7ead1d13ba0b47e605fce986c241e6fcfca9cc9926b255_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:cf0b723425c76814def9211124d18ce95e58b265185e12c5ae183f9999e51b1a_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:d93675365e51845d5d8a17997395726a4b09952fba42aaccdcfe132fd8e4d31c_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:f3223fc2fef5653947f8e402020c7f332beeee7c6a09d9be0bc7dc31ef3936f8_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:25567f02ee5b0640a12f76bfed9b889334363be402d9bdb14c8b7cc37feb6b28_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:6f893e3537bdc8ac814c5726f5594f4da820973d2246d3b399687d406e9a3952_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:bcc3f8c6589b63a0a162498ea2ab3596971a97b9107ade0ebd3e8d0d372ac84e_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:c6dfd40d71e49b352b39595ad73f06002d3bc448bc93e06def96ab3424451893_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:b82090e9203982de62d995c18eed37838b8ebbb092195a7f58d02526fd04523e_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:03da6ae6711c5238e19daa8ccccd75bc936ab8144b67cb2ccddcd3d1d2e33a40_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:1bd8354520b468f4eb47872a428f56da551e6720f31a41ce6e02df5050b4f8b2_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:ab3aa3fde12c94c24c2c1a3caa08f5d995cc9d3d9cca1af8b46610f6b4ff28ee_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:c7c2192a046c0fde35dcafa363803c085663676224708f4520fd967b3d2c8dd4_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-bundle@sha256:91ce9e64184afb90b00360c64f5ba37d30130ab0344b2439b93db15f2b35b74d_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:3940beeed21aa2c4ae695e7ac40a0373a05246f1dff2d6d829d3111c032a1970_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:96ee14d79f08194aa54cc7e6d1d814dae5af1d7143e513b6f1cb9397b6407ae6_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:cfbfd35f7cd15df266c69d12975f64db2bc38238d2a0a7f9d17b319db20ccbbb_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:e83662cd7bab21bcd0faa26ae67f0cb9244a67e17036af92cf30fe2a5591dcb0_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:2b5f83bbade40b04a7975788743afdb8cec5f72ad8e5eea4c75d5840ce44ef3f_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:7b77b205b95f99383f12e571b391a35ea8f85dfd23f2d4fd67045bbece1ee66e_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:b638f53267de38576f1875ee3379114ba3c2089d8b26901c4a960ec82d35a0b6_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:d0ad53575ddce599c11e959d3590300ab325633951003db4ef2d82a133c8ef19_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html"
},
{
"cve": "CVE-2025-47913",
"discovery_date": "2025-11-13T22:01:26.092452+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:83c5ad5ebfdd1b389af2fd407d8d6b8da52805cb3212bb2916108001296bb642_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:9403e73ee33102c2f18bcaca03e8eae21a283e47a4f288150db4d105a90b6b8f_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:bb630cb6e6bad937624d772e49a795da457035c7dcb1740c07d54a36f561ad79_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:fec577bc00c5dc32b284c30fb0d2e324a12d0f932b9abf65e70256e3d80bcda8_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:8b475114a5f77f7c041509a30246769a5f9064510724c8fc99ac29164dc3a0bb_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:892bee6e3214a69b8924f840b69a55ac0c8d66443bf042cfa88c13766bd8dce3_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa126c3f4865a2a62cba2734110418c865aa2d32f38147c056732e53fc593715_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b9889747f06f6fe48cd1a79aaf6dcafcf6a9cdd2d2ad986fb10da3f2a51c103b_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f55014b7e95512e2dcad9ebde4d36a39e136093ed22fc3436e66cf9b34091999_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:42e442bf326bf2039f7ead1d13ba0b47e605fce986c241e6fcfca9cc9926b255_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:cf0b723425c76814def9211124d18ce95e58b265185e12c5ae183f9999e51b1a_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:d93675365e51845d5d8a17997395726a4b09952fba42aaccdcfe132fd8e4d31c_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:f3223fc2fef5653947f8e402020c7f332beeee7c6a09d9be0bc7dc31ef3936f8_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:b82090e9203982de62d995c18eed37838b8ebbb092195a7f58d02526fd04523e_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:03da6ae6711c5238e19daa8ccccd75bc936ab8144b67cb2ccddcd3d1d2e33a40_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:1bd8354520b468f4eb47872a428f56da551e6720f31a41ce6e02df5050b4f8b2_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:ab3aa3fde12c94c24c2c1a3caa08f5d995cc9d3d9cca1af8b46610f6b4ff28ee_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:c7c2192a046c0fde35dcafa363803c085663676224708f4520fd967b3d2c8dd4_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-bundle@sha256:91ce9e64184afb90b00360c64f5ba37d30130ab0344b2439b93db15f2b35b74d_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:3940beeed21aa2c4ae695e7ac40a0373a05246f1dff2d6d829d3111c032a1970_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:96ee14d79f08194aa54cc7e6d1d814dae5af1d7143e513b6f1cb9397b6407ae6_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:cfbfd35f7cd15df266c69d12975f64db2bc38238d2a0a7f9d17b319db20ccbbb_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:e83662cd7bab21bcd0faa26ae67f0cb9244a67e17036af92cf30fe2a5591dcb0_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:2b5f83bbade40b04a7975788743afdb8cec5f72ad8e5eea4c75d5840ce44ef3f_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:7b77b205b95f99383f12e571b391a35ea8f85dfd23f2d4fd67045bbece1ee66e_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:b638f53267de38576f1875ee3379114ba3c2089d8b26901c4a960ec82d35a0b6_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:d0ad53575ddce599c11e959d3590300ab325633951003db4ef2d82a133c8ef19_arm64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2414943"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in golang.org/x/crypto/ssh/agent causes the SSH agent client to panic when a peer responds with the generic SSH_AGENT_SUCCESS (0x06) message to requests expecting typed replies (e.g., List, Sign). The unmarshal layer produces an unexpected message type, which the client code does not handle, leading to panic(\"unreachable\") or a nil-pointer dereference. A malicious agent or forwarded connection can exploit this to terminate the client process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang.org/x/crypto/ssh/agent: golang.org/x/crypto/ssh/agent: SSH client panic due to unexpected SSH_AGENT_SUCCESS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability was marked as Important because it allows any malicious or misbehaving SSH agent to force a crash in the client process using a single valid protocol byte. The panic occurs before the client has a chance to validate message structure or recover, which means an attacker controlling\u2014or intercepting\u2014SSH agent traffic can reliably terminate processes that rely on agent interactions. In environments where SSH agents operate over forwarded sockets, shared workspaces, or CI/CD runners, this turns into a reliable, unauthenticated remote denial of service against critical automation or developer tooling. The flaw also stems from unsafe assumptions in the unmarshalling logic, where unexpected but protocol-legal message types drop into \u201cunreachable\u201d code paths instead of being handled gracefully\u2014making it a design-level reliability break rather than a simple error-handling bug. For this reason, it is rated as an important availability-impacting vulnerability rather than a moderate issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:25567f02ee5b0640a12f76bfed9b889334363be402d9bdb14c8b7cc37feb6b28_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:6f893e3537bdc8ac814c5726f5594f4da820973d2246d3b399687d406e9a3952_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:bcc3f8c6589b63a0a162498ea2ab3596971a97b9107ade0ebd3e8d0d372ac84e_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:c6dfd40d71e49b352b39595ad73f06002d3bc448bc93e06def96ab3424451893_ppc64le"
],
"known_not_affected": [
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:83c5ad5ebfdd1b389af2fd407d8d6b8da52805cb3212bb2916108001296bb642_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:9403e73ee33102c2f18bcaca03e8eae21a283e47a4f288150db4d105a90b6b8f_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:bb630cb6e6bad937624d772e49a795da457035c7dcb1740c07d54a36f561ad79_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:fec577bc00c5dc32b284c30fb0d2e324a12d0f932b9abf65e70256e3d80bcda8_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:8b475114a5f77f7c041509a30246769a5f9064510724c8fc99ac29164dc3a0bb_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:892bee6e3214a69b8924f840b69a55ac0c8d66443bf042cfa88c13766bd8dce3_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa126c3f4865a2a62cba2734110418c865aa2d32f38147c056732e53fc593715_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b9889747f06f6fe48cd1a79aaf6dcafcf6a9cdd2d2ad986fb10da3f2a51c103b_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f55014b7e95512e2dcad9ebde4d36a39e136093ed22fc3436e66cf9b34091999_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:42e442bf326bf2039f7ead1d13ba0b47e605fce986c241e6fcfca9cc9926b255_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:cf0b723425c76814def9211124d18ce95e58b265185e12c5ae183f9999e51b1a_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:d93675365e51845d5d8a17997395726a4b09952fba42aaccdcfe132fd8e4d31c_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:f3223fc2fef5653947f8e402020c7f332beeee7c6a09d9be0bc7dc31ef3936f8_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:b82090e9203982de62d995c18eed37838b8ebbb092195a7f58d02526fd04523e_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:03da6ae6711c5238e19daa8ccccd75bc936ab8144b67cb2ccddcd3d1d2e33a40_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:1bd8354520b468f4eb47872a428f56da551e6720f31a41ce6e02df5050b4f8b2_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:ab3aa3fde12c94c24c2c1a3caa08f5d995cc9d3d9cca1af8b46610f6b4ff28ee_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:c7c2192a046c0fde35dcafa363803c085663676224708f4520fd967b3d2c8dd4_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-bundle@sha256:91ce9e64184afb90b00360c64f5ba37d30130ab0344b2439b93db15f2b35b74d_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:3940beeed21aa2c4ae695e7ac40a0373a05246f1dff2d6d829d3111c032a1970_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:96ee14d79f08194aa54cc7e6d1d814dae5af1d7143e513b6f1cb9397b6407ae6_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:cfbfd35f7cd15df266c69d12975f64db2bc38238d2a0a7f9d17b319db20ccbbb_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:e83662cd7bab21bcd0faa26ae67f0cb9244a67e17036af92cf30fe2a5591dcb0_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:2b5f83bbade40b04a7975788743afdb8cec5f72ad8e5eea4c75d5840ce44ef3f_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:7b77b205b95f99383f12e571b391a35ea8f85dfd23f2d4fd67045bbece1ee66e_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:b638f53267de38576f1875ee3379114ba3c2089d8b26901c4a960ec82d35a0b6_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:d0ad53575ddce599c11e959d3590300ab325633951003db4ef2d82a133c8ef19_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-47913"
},
{
"category": "external",
"summary": "RHBZ#2414943",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2414943"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-47913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47913"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-47913",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47913"
},
{
"category": "external",
"summary": "https://github.com/advisories/GHSA-hcg3-q754-cr77",
"url": "https://github.com/advisories/GHSA-hcg3-q754-cr77"
},
{
"category": "external",
"summary": "https://go.dev/cl/700295",
"url": "https://go.dev/cl/700295"
},
{
"category": "external",
"summary": "https://go.dev/issue/75178",
"url": "https://go.dev/issue/75178"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4116",
"url": "https://pkg.go.dev/vuln/GO-2025-4116"
}
],
"release_date": "2025-11-13T21:29:39.907000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-12-10T16:36:13+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:25567f02ee5b0640a12f76bfed9b889334363be402d9bdb14c8b7cc37feb6b28_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:6f893e3537bdc8ac814c5726f5594f4da820973d2246d3b399687d406e9a3952_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:bcc3f8c6589b63a0a162498ea2ab3596971a97b9107ade0ebd3e8d0d372ac84e_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:c6dfd40d71e49b352b39595ad73f06002d3bc448bc93e06def96ab3424451893_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:23064"
},
{
"category": "workaround",
"details": "No mitigation is currently available that meets Red Hat Product Security\u2019s standards for usability, deployment, applicability, or stability.",
"product_ids": [
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:83c5ad5ebfdd1b389af2fd407d8d6b8da52805cb3212bb2916108001296bb642_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:9403e73ee33102c2f18bcaca03e8eae21a283e47a4f288150db4d105a90b6b8f_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:bb630cb6e6bad937624d772e49a795da457035c7dcb1740c07d54a36f561ad79_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:fec577bc00c5dc32b284c30fb0d2e324a12d0f932b9abf65e70256e3d80bcda8_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:8b475114a5f77f7c041509a30246769a5f9064510724c8fc99ac29164dc3a0bb_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:892bee6e3214a69b8924f840b69a55ac0c8d66443bf042cfa88c13766bd8dce3_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa126c3f4865a2a62cba2734110418c865aa2d32f38147c056732e53fc593715_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b9889747f06f6fe48cd1a79aaf6dcafcf6a9cdd2d2ad986fb10da3f2a51c103b_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f55014b7e95512e2dcad9ebde4d36a39e136093ed22fc3436e66cf9b34091999_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:42e442bf326bf2039f7ead1d13ba0b47e605fce986c241e6fcfca9cc9926b255_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:cf0b723425c76814def9211124d18ce95e58b265185e12c5ae183f9999e51b1a_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:d93675365e51845d5d8a17997395726a4b09952fba42aaccdcfe132fd8e4d31c_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:f3223fc2fef5653947f8e402020c7f332beeee7c6a09d9be0bc7dc31ef3936f8_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:25567f02ee5b0640a12f76bfed9b889334363be402d9bdb14c8b7cc37feb6b28_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:6f893e3537bdc8ac814c5726f5594f4da820973d2246d3b399687d406e9a3952_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:bcc3f8c6589b63a0a162498ea2ab3596971a97b9107ade0ebd3e8d0d372ac84e_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:c6dfd40d71e49b352b39595ad73f06002d3bc448bc93e06def96ab3424451893_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:b82090e9203982de62d995c18eed37838b8ebbb092195a7f58d02526fd04523e_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:03da6ae6711c5238e19daa8ccccd75bc936ab8144b67cb2ccddcd3d1d2e33a40_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:1bd8354520b468f4eb47872a428f56da551e6720f31a41ce6e02df5050b4f8b2_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:ab3aa3fde12c94c24c2c1a3caa08f5d995cc9d3d9cca1af8b46610f6b4ff28ee_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:c7c2192a046c0fde35dcafa363803c085663676224708f4520fd967b3d2c8dd4_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-bundle@sha256:91ce9e64184afb90b00360c64f5ba37d30130ab0344b2439b93db15f2b35b74d_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:3940beeed21aa2c4ae695e7ac40a0373a05246f1dff2d6d829d3111c032a1970_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:96ee14d79f08194aa54cc7e6d1d814dae5af1d7143e513b6f1cb9397b6407ae6_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:cfbfd35f7cd15df266c69d12975f64db2bc38238d2a0a7f9d17b319db20ccbbb_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:e83662cd7bab21bcd0faa26ae67f0cb9244a67e17036af92cf30fe2a5591dcb0_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:2b5f83bbade40b04a7975788743afdb8cec5f72ad8e5eea4c75d5840ce44ef3f_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:7b77b205b95f99383f12e571b391a35ea8f85dfd23f2d4fd67045bbece1ee66e_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:b638f53267de38576f1875ee3379114ba3c2089d8b26901c4a960ec82d35a0b6_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:d0ad53575ddce599c11e959d3590300ab325633951003db4ef2d82a133c8ef19_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:83c5ad5ebfdd1b389af2fd407d8d6b8da52805cb3212bb2916108001296bb642_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:9403e73ee33102c2f18bcaca03e8eae21a283e47a4f288150db4d105a90b6b8f_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:bb630cb6e6bad937624d772e49a795da457035c7dcb1740c07d54a36f561ad79_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:fec577bc00c5dc32b284c30fb0d2e324a12d0f932b9abf65e70256e3d80bcda8_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:8b475114a5f77f7c041509a30246769a5f9064510724c8fc99ac29164dc3a0bb_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:892bee6e3214a69b8924f840b69a55ac0c8d66443bf042cfa88c13766bd8dce3_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa126c3f4865a2a62cba2734110418c865aa2d32f38147c056732e53fc593715_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b9889747f06f6fe48cd1a79aaf6dcafcf6a9cdd2d2ad986fb10da3f2a51c103b_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f55014b7e95512e2dcad9ebde4d36a39e136093ed22fc3436e66cf9b34091999_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:42e442bf326bf2039f7ead1d13ba0b47e605fce986c241e6fcfca9cc9926b255_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:cf0b723425c76814def9211124d18ce95e58b265185e12c5ae183f9999e51b1a_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:d93675365e51845d5d8a17997395726a4b09952fba42aaccdcfe132fd8e4d31c_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:f3223fc2fef5653947f8e402020c7f332beeee7c6a09d9be0bc7dc31ef3936f8_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:25567f02ee5b0640a12f76bfed9b889334363be402d9bdb14c8b7cc37feb6b28_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:6f893e3537bdc8ac814c5726f5594f4da820973d2246d3b399687d406e9a3952_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:bcc3f8c6589b63a0a162498ea2ab3596971a97b9107ade0ebd3e8d0d372ac84e_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:c6dfd40d71e49b352b39595ad73f06002d3bc448bc93e06def96ab3424451893_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:b82090e9203982de62d995c18eed37838b8ebbb092195a7f58d02526fd04523e_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:03da6ae6711c5238e19daa8ccccd75bc936ab8144b67cb2ccddcd3d1d2e33a40_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:1bd8354520b468f4eb47872a428f56da551e6720f31a41ce6e02df5050b4f8b2_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:ab3aa3fde12c94c24c2c1a3caa08f5d995cc9d3d9cca1af8b46610f6b4ff28ee_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:c7c2192a046c0fde35dcafa363803c085663676224708f4520fd967b3d2c8dd4_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-bundle@sha256:91ce9e64184afb90b00360c64f5ba37d30130ab0344b2439b93db15f2b35b74d_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:3940beeed21aa2c4ae695e7ac40a0373a05246f1dff2d6d829d3111c032a1970_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:96ee14d79f08194aa54cc7e6d1d814dae5af1d7143e513b6f1cb9397b6407ae6_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:cfbfd35f7cd15df266c69d12975f64db2bc38238d2a0a7f9d17b319db20ccbbb_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:e83662cd7bab21bcd0faa26ae67f0cb9244a67e17036af92cf30fe2a5591dcb0_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:2b5f83bbade40b04a7975788743afdb8cec5f72ad8e5eea4c75d5840ce44ef3f_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:7b77b205b95f99383f12e571b391a35ea8f85dfd23f2d4fd67045bbece1ee66e_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:b638f53267de38576f1875ee3379114ba3c2089d8b26901c4a960ec82d35a0b6_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:d0ad53575ddce599c11e959d3590300ab325633951003db4ef2d82a133c8ef19_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang.org/x/crypto/ssh/agent: golang.org/x/crypto/ssh/agent: SSH client panic due to unexpected SSH_AGENT_SUCCESS"
},
{
"cve": "CVE-2025-59420",
"cwe": {
"id": "CWE-440",
"name": "Expected Behavior Violation"
},
"discovery_date": "2025-09-22T18:01:35.379361+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:83c5ad5ebfdd1b389af2fd407d8d6b8da52805cb3212bb2916108001296bb642_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:9403e73ee33102c2f18bcaca03e8eae21a283e47a4f288150db4d105a90b6b8f_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:bb630cb6e6bad937624d772e49a795da457035c7dcb1740c07d54a36f561ad79_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:fec577bc00c5dc32b284c30fb0d2e324a12d0f932b9abf65e70256e3d80bcda8_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:8b475114a5f77f7c041509a30246769a5f9064510724c8fc99ac29164dc3a0bb_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:892bee6e3214a69b8924f840b69a55ac0c8d66443bf042cfa88c13766bd8dce3_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa126c3f4865a2a62cba2734110418c865aa2d32f38147c056732e53fc593715_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b9889747f06f6fe48cd1a79aaf6dcafcf6a9cdd2d2ad986fb10da3f2a51c103b_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f55014b7e95512e2dcad9ebde4d36a39e136093ed22fc3436e66cf9b34091999_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:42e442bf326bf2039f7ead1d13ba0b47e605fce986c241e6fcfca9cc9926b255_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:cf0b723425c76814def9211124d18ce95e58b265185e12c5ae183f9999e51b1a_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:d93675365e51845d5d8a17997395726a4b09952fba42aaccdcfe132fd8e4d31c_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:f3223fc2fef5653947f8e402020c7f332beeee7c6a09d9be0bc7dc31ef3936f8_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:25567f02ee5b0640a12f76bfed9b889334363be402d9bdb14c8b7cc37feb6b28_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:6f893e3537bdc8ac814c5726f5594f4da820973d2246d3b399687d406e9a3952_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:bcc3f8c6589b63a0a162498ea2ab3596971a97b9107ade0ebd3e8d0d372ac84e_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:c6dfd40d71e49b352b39595ad73f06002d3bc448bc93e06def96ab3424451893_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:b82090e9203982de62d995c18eed37838b8ebbb092195a7f58d02526fd04523e_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:03da6ae6711c5238e19daa8ccccd75bc936ab8144b67cb2ccddcd3d1d2e33a40_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:1bd8354520b468f4eb47872a428f56da551e6720f31a41ce6e02df5050b4f8b2_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:ab3aa3fde12c94c24c2c1a3caa08f5d995cc9d3d9cca1af8b46610f6b4ff28ee_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:c7c2192a046c0fde35dcafa363803c085663676224708f4520fd967b3d2c8dd4_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-bundle@sha256:91ce9e64184afb90b00360c64f5ba37d30130ab0344b2439b93db15f2b35b74d_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:3940beeed21aa2c4ae695e7ac40a0373a05246f1dff2d6d829d3111c032a1970_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:96ee14d79f08194aa54cc7e6d1d814dae5af1d7143e513b6f1cb9397b6407ae6_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:cfbfd35f7cd15df266c69d12975f64db2bc38238d2a0a7f9d17b319db20ccbbb_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:e83662cd7bab21bcd0faa26ae67f0cb9244a67e17036af92cf30fe2a5591dcb0_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2397460"
}
],
"notes": [
{
"category": "description",
"text": "Authlib\u2019s JWS verification accepts tokens that declare unknown critical header parameters (crit), violating RFC 7515 \u201cmust\u2011understand\u201d semantics. An attacker can craft a signed token with a critical header (for example, bork or cnf) that strict verifiers reject but Authlib accepts. In mixed\u2011language fleets, this enables split\u2011brain verification and can lead to policy bypass, replay, or privilege escalation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "authlib: Authlib RFC violation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:2b5f83bbade40b04a7975788743afdb8cec5f72ad8e5eea4c75d5840ce44ef3f_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:7b77b205b95f99383f12e571b391a35ea8f85dfd23f2d4fd67045bbece1ee66e_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:b638f53267de38576f1875ee3379114ba3c2089d8b26901c4a960ec82d35a0b6_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:d0ad53575ddce599c11e959d3590300ab325633951003db4ef2d82a133c8ef19_arm64"
],
"known_not_affected": [
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:83c5ad5ebfdd1b389af2fd407d8d6b8da52805cb3212bb2916108001296bb642_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:9403e73ee33102c2f18bcaca03e8eae21a283e47a4f288150db4d105a90b6b8f_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:bb630cb6e6bad937624d772e49a795da457035c7dcb1740c07d54a36f561ad79_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:fec577bc00c5dc32b284c30fb0d2e324a12d0f932b9abf65e70256e3d80bcda8_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:8b475114a5f77f7c041509a30246769a5f9064510724c8fc99ac29164dc3a0bb_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:892bee6e3214a69b8924f840b69a55ac0c8d66443bf042cfa88c13766bd8dce3_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa126c3f4865a2a62cba2734110418c865aa2d32f38147c056732e53fc593715_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b9889747f06f6fe48cd1a79aaf6dcafcf6a9cdd2d2ad986fb10da3f2a51c103b_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f55014b7e95512e2dcad9ebde4d36a39e136093ed22fc3436e66cf9b34091999_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:42e442bf326bf2039f7ead1d13ba0b47e605fce986c241e6fcfca9cc9926b255_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:cf0b723425c76814def9211124d18ce95e58b265185e12c5ae183f9999e51b1a_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:d93675365e51845d5d8a17997395726a4b09952fba42aaccdcfe132fd8e4d31c_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:f3223fc2fef5653947f8e402020c7f332beeee7c6a09d9be0bc7dc31ef3936f8_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:25567f02ee5b0640a12f76bfed9b889334363be402d9bdb14c8b7cc37feb6b28_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:6f893e3537bdc8ac814c5726f5594f4da820973d2246d3b399687d406e9a3952_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:bcc3f8c6589b63a0a162498ea2ab3596971a97b9107ade0ebd3e8d0d372ac84e_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:c6dfd40d71e49b352b39595ad73f06002d3bc448bc93e06def96ab3424451893_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:b82090e9203982de62d995c18eed37838b8ebbb092195a7f58d02526fd04523e_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:03da6ae6711c5238e19daa8ccccd75bc936ab8144b67cb2ccddcd3d1d2e33a40_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:1bd8354520b468f4eb47872a428f56da551e6720f31a41ce6e02df5050b4f8b2_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:ab3aa3fde12c94c24c2c1a3caa08f5d995cc9d3d9cca1af8b46610f6b4ff28ee_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:c7c2192a046c0fde35dcafa363803c085663676224708f4520fd967b3d2c8dd4_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-bundle@sha256:91ce9e64184afb90b00360c64f5ba37d30130ab0344b2439b93db15f2b35b74d_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:3940beeed21aa2c4ae695e7ac40a0373a05246f1dff2d6d829d3111c032a1970_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:96ee14d79f08194aa54cc7e6d1d814dae5af1d7143e513b6f1cb9397b6407ae6_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:cfbfd35f7cd15df266c69d12975f64db2bc38238d2a0a7f9d17b319db20ccbbb_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:e83662cd7bab21bcd0faa26ae67f0cb9244a67e17036af92cf30fe2a5591dcb0_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-59420"
},
{
"category": "external",
"summary": "RHBZ#2397460",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2397460"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-59420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59420"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-59420",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-59420"
},
{
"category": "external",
"summary": "https://github.com/authlib/authlib/commit/6b1813e4392eb7c168c276099ff7783b176479df",
"url": "https://github.com/authlib/authlib/commit/6b1813e4392eb7c168c276099ff7783b176479df"
},
{
"category": "external",
"summary": "https://github.com/authlib/authlib/security/advisories/GHSA-9ggr-2464-2j32",
"url": "https://github.com/authlib/authlib/security/advisories/GHSA-9ggr-2464-2j32"
}
],
"release_date": "2025-09-22T17:28:53.869000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-12-10T16:36:13+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:2b5f83bbade40b04a7975788743afdb8cec5f72ad8e5eea4c75d5840ce44ef3f_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:7b77b205b95f99383f12e571b391a35ea8f85dfd23f2d4fd67045bbece1ee66e_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:b638f53267de38576f1875ee3379114ba3c2089d8b26901c4a960ec82d35a0b6_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:d0ad53575ddce599c11e959d3590300ab325633951003db4ef2d82a133c8ef19_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:23064"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:83c5ad5ebfdd1b389af2fd407d8d6b8da52805cb3212bb2916108001296bb642_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:9403e73ee33102c2f18bcaca03e8eae21a283e47a4f288150db4d105a90b6b8f_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:bb630cb6e6bad937624d772e49a795da457035c7dcb1740c07d54a36f561ad79_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:fec577bc00c5dc32b284c30fb0d2e324a12d0f932b9abf65e70256e3d80bcda8_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:8b475114a5f77f7c041509a30246769a5f9064510724c8fc99ac29164dc3a0bb_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:892bee6e3214a69b8924f840b69a55ac0c8d66443bf042cfa88c13766bd8dce3_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa126c3f4865a2a62cba2734110418c865aa2d32f38147c056732e53fc593715_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b9889747f06f6fe48cd1a79aaf6dcafcf6a9cdd2d2ad986fb10da3f2a51c103b_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f55014b7e95512e2dcad9ebde4d36a39e136093ed22fc3436e66cf9b34091999_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:42e442bf326bf2039f7ead1d13ba0b47e605fce986c241e6fcfca9cc9926b255_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:cf0b723425c76814def9211124d18ce95e58b265185e12c5ae183f9999e51b1a_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:d93675365e51845d5d8a17997395726a4b09952fba42aaccdcfe132fd8e4d31c_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:f3223fc2fef5653947f8e402020c7f332beeee7c6a09d9be0bc7dc31ef3936f8_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:25567f02ee5b0640a12f76bfed9b889334363be402d9bdb14c8b7cc37feb6b28_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:6f893e3537bdc8ac814c5726f5594f4da820973d2246d3b399687d406e9a3952_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:bcc3f8c6589b63a0a162498ea2ab3596971a97b9107ade0ebd3e8d0d372ac84e_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:c6dfd40d71e49b352b39595ad73f06002d3bc448bc93e06def96ab3424451893_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:b82090e9203982de62d995c18eed37838b8ebbb092195a7f58d02526fd04523e_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:03da6ae6711c5238e19daa8ccccd75bc936ab8144b67cb2ccddcd3d1d2e33a40_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:1bd8354520b468f4eb47872a428f56da551e6720f31a41ce6e02df5050b4f8b2_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:ab3aa3fde12c94c24c2c1a3caa08f5d995cc9d3d9cca1af8b46610f6b4ff28ee_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:c7c2192a046c0fde35dcafa363803c085663676224708f4520fd967b3d2c8dd4_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-bundle@sha256:91ce9e64184afb90b00360c64f5ba37d30130ab0344b2439b93db15f2b35b74d_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:3940beeed21aa2c4ae695e7ac40a0373a05246f1dff2d6d829d3111c032a1970_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:96ee14d79f08194aa54cc7e6d1d814dae5af1d7143e513b6f1cb9397b6407ae6_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:cfbfd35f7cd15df266c69d12975f64db2bc38238d2a0a7f9d17b319db20ccbbb_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:e83662cd7bab21bcd0faa26ae67f0cb9244a67e17036af92cf30fe2a5591dcb0_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:2b5f83bbade40b04a7975788743afdb8cec5f72ad8e5eea4c75d5840ce44ef3f_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:7b77b205b95f99383f12e571b391a35ea8f85dfd23f2d4fd67045bbece1ee66e_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:b638f53267de38576f1875ee3379114ba3c2089d8b26901c4a960ec82d35a0b6_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:d0ad53575ddce599c11e959d3590300ab325633951003db4ef2d82a133c8ef19_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:83c5ad5ebfdd1b389af2fd407d8d6b8da52805cb3212bb2916108001296bb642_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:9403e73ee33102c2f18bcaca03e8eae21a283e47a4f288150db4d105a90b6b8f_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:bb630cb6e6bad937624d772e49a795da457035c7dcb1740c07d54a36f561ad79_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:fec577bc00c5dc32b284c30fb0d2e324a12d0f932b9abf65e70256e3d80bcda8_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:8b475114a5f77f7c041509a30246769a5f9064510724c8fc99ac29164dc3a0bb_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:892bee6e3214a69b8924f840b69a55ac0c8d66443bf042cfa88c13766bd8dce3_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa126c3f4865a2a62cba2734110418c865aa2d32f38147c056732e53fc593715_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b9889747f06f6fe48cd1a79aaf6dcafcf6a9cdd2d2ad986fb10da3f2a51c103b_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f55014b7e95512e2dcad9ebde4d36a39e136093ed22fc3436e66cf9b34091999_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:42e442bf326bf2039f7ead1d13ba0b47e605fce986c241e6fcfca9cc9926b255_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:cf0b723425c76814def9211124d18ce95e58b265185e12c5ae183f9999e51b1a_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:d93675365e51845d5d8a17997395726a4b09952fba42aaccdcfe132fd8e4d31c_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:f3223fc2fef5653947f8e402020c7f332beeee7c6a09d9be0bc7dc31ef3936f8_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:25567f02ee5b0640a12f76bfed9b889334363be402d9bdb14c8b7cc37feb6b28_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:6f893e3537bdc8ac814c5726f5594f4da820973d2246d3b399687d406e9a3952_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:bcc3f8c6589b63a0a162498ea2ab3596971a97b9107ade0ebd3e8d0d372ac84e_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:c6dfd40d71e49b352b39595ad73f06002d3bc448bc93e06def96ab3424451893_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:b82090e9203982de62d995c18eed37838b8ebbb092195a7f58d02526fd04523e_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:03da6ae6711c5238e19daa8ccccd75bc936ab8144b67cb2ccddcd3d1d2e33a40_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:1bd8354520b468f4eb47872a428f56da551e6720f31a41ce6e02df5050b4f8b2_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:ab3aa3fde12c94c24c2c1a3caa08f5d995cc9d3d9cca1af8b46610f6b4ff28ee_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:c7c2192a046c0fde35dcafa363803c085663676224708f4520fd967b3d2c8dd4_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-bundle@sha256:91ce9e64184afb90b00360c64f5ba37d30130ab0344b2439b93db15f2b35b74d_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:3940beeed21aa2c4ae695e7ac40a0373a05246f1dff2d6d829d3111c032a1970_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:96ee14d79f08194aa54cc7e6d1d814dae5af1d7143e513b6f1cb9397b6407ae6_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:cfbfd35f7cd15df266c69d12975f64db2bc38238d2a0a7f9d17b319db20ccbbb_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:e83662cd7bab21bcd0faa26ae67f0cb9244a67e17036af92cf30fe2a5591dcb0_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:2b5f83bbade40b04a7975788743afdb8cec5f72ad8e5eea4c75d5840ce44ef3f_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:7b77b205b95f99383f12e571b391a35ea8f85dfd23f2d4fd67045bbece1ee66e_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:b638f53267de38576f1875ee3379114ba3c2089d8b26901c4a960ec82d35a0b6_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:d0ad53575ddce599c11e959d3590300ab325633951003db4ef2d82a133c8ef19_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "authlib: Authlib RFC violation"
},
{
"cve": "CVE-2025-61920",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2025-10-10T20:01:12.833962+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:83c5ad5ebfdd1b389af2fd407d8d6b8da52805cb3212bb2916108001296bb642_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:9403e73ee33102c2f18bcaca03e8eae21a283e47a4f288150db4d105a90b6b8f_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:bb630cb6e6bad937624d772e49a795da457035c7dcb1740c07d54a36f561ad79_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:fec577bc00c5dc32b284c30fb0d2e324a12d0f932b9abf65e70256e3d80bcda8_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:8b475114a5f77f7c041509a30246769a5f9064510724c8fc99ac29164dc3a0bb_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:892bee6e3214a69b8924f840b69a55ac0c8d66443bf042cfa88c13766bd8dce3_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa126c3f4865a2a62cba2734110418c865aa2d32f38147c056732e53fc593715_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b9889747f06f6fe48cd1a79aaf6dcafcf6a9cdd2d2ad986fb10da3f2a51c103b_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f55014b7e95512e2dcad9ebde4d36a39e136093ed22fc3436e66cf9b34091999_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:42e442bf326bf2039f7ead1d13ba0b47e605fce986c241e6fcfca9cc9926b255_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:cf0b723425c76814def9211124d18ce95e58b265185e12c5ae183f9999e51b1a_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:d93675365e51845d5d8a17997395726a4b09952fba42aaccdcfe132fd8e4d31c_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:f3223fc2fef5653947f8e402020c7f332beeee7c6a09d9be0bc7dc31ef3936f8_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:25567f02ee5b0640a12f76bfed9b889334363be402d9bdb14c8b7cc37feb6b28_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:6f893e3537bdc8ac814c5726f5594f4da820973d2246d3b399687d406e9a3952_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:bcc3f8c6589b63a0a162498ea2ab3596971a97b9107ade0ebd3e8d0d372ac84e_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:c6dfd40d71e49b352b39595ad73f06002d3bc448bc93e06def96ab3424451893_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:b82090e9203982de62d995c18eed37838b8ebbb092195a7f58d02526fd04523e_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:03da6ae6711c5238e19daa8ccccd75bc936ab8144b67cb2ccddcd3d1d2e33a40_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:1bd8354520b468f4eb47872a428f56da551e6720f31a41ce6e02df5050b4f8b2_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:ab3aa3fde12c94c24c2c1a3caa08f5d995cc9d3d9cca1af8b46610f6b4ff28ee_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:c7c2192a046c0fde35dcafa363803c085663676224708f4520fd967b3d2c8dd4_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-bundle@sha256:91ce9e64184afb90b00360c64f5ba37d30130ab0344b2439b93db15f2b35b74d_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:3940beeed21aa2c4ae695e7ac40a0373a05246f1dff2d6d829d3111c032a1970_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:96ee14d79f08194aa54cc7e6d1d814dae5af1d7143e513b6f1cb9397b6407ae6_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:cfbfd35f7cd15df266c69d12975f64db2bc38238d2a0a7f9d17b319db20ccbbb_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:e83662cd7bab21bcd0faa26ae67f0cb9244a67e17036af92cf30fe2a5591dcb0_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2403179"
}
],
"notes": [
{
"category": "description",
"text": "A denial of service flaw has been discovered in the python Authlib package. Authlib\u2019s JOSE implementation accepts unbounded JWS/JWT header and signature segments. A remote attacker can craft a token whose base64url\u2011encoded header or signature spans hundreds of megabytes. During verification, Authlib decodes and parses the full input before it is rejected, driving CPU and memory consumption to hostile levels and enabling denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "authlib: Authlib Denial of Service",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:2b5f83bbade40b04a7975788743afdb8cec5f72ad8e5eea4c75d5840ce44ef3f_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:7b77b205b95f99383f12e571b391a35ea8f85dfd23f2d4fd67045bbece1ee66e_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:b638f53267de38576f1875ee3379114ba3c2089d8b26901c4a960ec82d35a0b6_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:d0ad53575ddce599c11e959d3590300ab325633951003db4ef2d82a133c8ef19_arm64"
],
"known_not_affected": [
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:83c5ad5ebfdd1b389af2fd407d8d6b8da52805cb3212bb2916108001296bb642_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:9403e73ee33102c2f18bcaca03e8eae21a283e47a4f288150db4d105a90b6b8f_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:bb630cb6e6bad937624d772e49a795da457035c7dcb1740c07d54a36f561ad79_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:fec577bc00c5dc32b284c30fb0d2e324a12d0f932b9abf65e70256e3d80bcda8_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:8b475114a5f77f7c041509a30246769a5f9064510724c8fc99ac29164dc3a0bb_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:892bee6e3214a69b8924f840b69a55ac0c8d66443bf042cfa88c13766bd8dce3_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa126c3f4865a2a62cba2734110418c865aa2d32f38147c056732e53fc593715_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b9889747f06f6fe48cd1a79aaf6dcafcf6a9cdd2d2ad986fb10da3f2a51c103b_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f55014b7e95512e2dcad9ebde4d36a39e136093ed22fc3436e66cf9b34091999_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:42e442bf326bf2039f7ead1d13ba0b47e605fce986c241e6fcfca9cc9926b255_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:cf0b723425c76814def9211124d18ce95e58b265185e12c5ae183f9999e51b1a_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:d93675365e51845d5d8a17997395726a4b09952fba42aaccdcfe132fd8e4d31c_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:f3223fc2fef5653947f8e402020c7f332beeee7c6a09d9be0bc7dc31ef3936f8_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:25567f02ee5b0640a12f76bfed9b889334363be402d9bdb14c8b7cc37feb6b28_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:6f893e3537bdc8ac814c5726f5594f4da820973d2246d3b399687d406e9a3952_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:bcc3f8c6589b63a0a162498ea2ab3596971a97b9107ade0ebd3e8d0d372ac84e_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:c6dfd40d71e49b352b39595ad73f06002d3bc448bc93e06def96ab3424451893_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:b82090e9203982de62d995c18eed37838b8ebbb092195a7f58d02526fd04523e_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:03da6ae6711c5238e19daa8ccccd75bc936ab8144b67cb2ccddcd3d1d2e33a40_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:1bd8354520b468f4eb47872a428f56da551e6720f31a41ce6e02df5050b4f8b2_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:ab3aa3fde12c94c24c2c1a3caa08f5d995cc9d3d9cca1af8b46610f6b4ff28ee_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:c7c2192a046c0fde35dcafa363803c085663676224708f4520fd967b3d2c8dd4_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-bundle@sha256:91ce9e64184afb90b00360c64f5ba37d30130ab0344b2439b93db15f2b35b74d_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:3940beeed21aa2c4ae695e7ac40a0373a05246f1dff2d6d829d3111c032a1970_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:96ee14d79f08194aa54cc7e6d1d814dae5af1d7143e513b6f1cb9397b6407ae6_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:cfbfd35f7cd15df266c69d12975f64db2bc38238d2a0a7f9d17b319db20ccbbb_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:e83662cd7bab21bcd0faa26ae67f0cb9244a67e17036af92cf30fe2a5591dcb0_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61920"
},
{
"category": "external",
"summary": "RHBZ#2403179",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2403179"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61920",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61920"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61920",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61920"
},
{
"category": "external",
"summary": "https://github.com/authlib/authlib/commit/867e3f87b072347a1ae9cf6983cc8bbf88447e5e",
"url": "https://github.com/authlib/authlib/commit/867e3f87b072347a1ae9cf6983cc8bbf88447e5e"
},
{
"category": "external",
"summary": "https://github.com/authlib/authlib/security/advisories/GHSA-pq5p-34cr-23v9",
"url": "https://github.com/authlib/authlib/security/advisories/GHSA-pq5p-34cr-23v9"
}
],
"release_date": "2025-10-10T19:25:07.679000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-12-10T16:36:13+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:2b5f83bbade40b04a7975788743afdb8cec5f72ad8e5eea4c75d5840ce44ef3f_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:7b77b205b95f99383f12e571b391a35ea8f85dfd23f2d4fd67045bbece1ee66e_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:b638f53267de38576f1875ee3379114ba3c2089d8b26901c4a960ec82d35a0b6_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:d0ad53575ddce599c11e959d3590300ab325633951003db4ef2d82a133c8ef19_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:23064"
},
{
"category": "workaround",
"details": "Users unable to upgrade may manually enforce input size limits before handing tokens to Authlib and/or use application-level throttling to reduce amplification risk.",
"product_ids": [
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:83c5ad5ebfdd1b389af2fd407d8d6b8da52805cb3212bb2916108001296bb642_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:9403e73ee33102c2f18bcaca03e8eae21a283e47a4f288150db4d105a90b6b8f_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:bb630cb6e6bad937624d772e49a795da457035c7dcb1740c07d54a36f561ad79_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:fec577bc00c5dc32b284c30fb0d2e324a12d0f932b9abf65e70256e3d80bcda8_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:8b475114a5f77f7c041509a30246769a5f9064510724c8fc99ac29164dc3a0bb_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:892bee6e3214a69b8924f840b69a55ac0c8d66443bf042cfa88c13766bd8dce3_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa126c3f4865a2a62cba2734110418c865aa2d32f38147c056732e53fc593715_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b9889747f06f6fe48cd1a79aaf6dcafcf6a9cdd2d2ad986fb10da3f2a51c103b_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f55014b7e95512e2dcad9ebde4d36a39e136093ed22fc3436e66cf9b34091999_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:42e442bf326bf2039f7ead1d13ba0b47e605fce986c241e6fcfca9cc9926b255_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:cf0b723425c76814def9211124d18ce95e58b265185e12c5ae183f9999e51b1a_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:d93675365e51845d5d8a17997395726a4b09952fba42aaccdcfe132fd8e4d31c_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:f3223fc2fef5653947f8e402020c7f332beeee7c6a09d9be0bc7dc31ef3936f8_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:25567f02ee5b0640a12f76bfed9b889334363be402d9bdb14c8b7cc37feb6b28_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:6f893e3537bdc8ac814c5726f5594f4da820973d2246d3b399687d406e9a3952_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:bcc3f8c6589b63a0a162498ea2ab3596971a97b9107ade0ebd3e8d0d372ac84e_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:c6dfd40d71e49b352b39595ad73f06002d3bc448bc93e06def96ab3424451893_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:b82090e9203982de62d995c18eed37838b8ebbb092195a7f58d02526fd04523e_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:03da6ae6711c5238e19daa8ccccd75bc936ab8144b67cb2ccddcd3d1d2e33a40_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:1bd8354520b468f4eb47872a428f56da551e6720f31a41ce6e02df5050b4f8b2_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:ab3aa3fde12c94c24c2c1a3caa08f5d995cc9d3d9cca1af8b46610f6b4ff28ee_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:c7c2192a046c0fde35dcafa363803c085663676224708f4520fd967b3d2c8dd4_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-bundle@sha256:91ce9e64184afb90b00360c64f5ba37d30130ab0344b2439b93db15f2b35b74d_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:3940beeed21aa2c4ae695e7ac40a0373a05246f1dff2d6d829d3111c032a1970_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:96ee14d79f08194aa54cc7e6d1d814dae5af1d7143e513b6f1cb9397b6407ae6_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:cfbfd35f7cd15df266c69d12975f64db2bc38238d2a0a7f9d17b319db20ccbbb_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:e83662cd7bab21bcd0faa26ae67f0cb9244a67e17036af92cf30fe2a5591dcb0_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:2b5f83bbade40b04a7975788743afdb8cec5f72ad8e5eea4c75d5840ce44ef3f_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:7b77b205b95f99383f12e571b391a35ea8f85dfd23f2d4fd67045bbece1ee66e_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:b638f53267de38576f1875ee3379114ba3c2089d8b26901c4a960ec82d35a0b6_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:d0ad53575ddce599c11e959d3590300ab325633951003db4ef2d82a133c8ef19_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:83c5ad5ebfdd1b389af2fd407d8d6b8da52805cb3212bb2916108001296bb642_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:9403e73ee33102c2f18bcaca03e8eae21a283e47a4f288150db4d105a90b6b8f_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:bb630cb6e6bad937624d772e49a795da457035c7dcb1740c07d54a36f561ad79_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/clair-rhel8@sha256:fec577bc00c5dc32b284c30fb0d2e324a12d0f932b9abf65e70256e3d80bcda8_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:8b475114a5f77f7c041509a30246769a5f9064510724c8fc99ac29164dc3a0bb_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:892bee6e3214a69b8924f840b69a55ac0c8d66443bf042cfa88c13766bd8dce3_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa126c3f4865a2a62cba2734110418c865aa2d32f38147c056732e53fc593715_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b9889747f06f6fe48cd1a79aaf6dcafcf6a9cdd2d2ad986fb10da3f2a51c103b_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f55014b7e95512e2dcad9ebde4d36a39e136093ed22fc3436e66cf9b34091999_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:42e442bf326bf2039f7ead1d13ba0b47e605fce986c241e6fcfca9cc9926b255_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:cf0b723425c76814def9211124d18ce95e58b265185e12c5ae183f9999e51b1a_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:d93675365e51845d5d8a17997395726a4b09952fba42aaccdcfe132fd8e4d31c_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:f3223fc2fef5653947f8e402020c7f332beeee7c6a09d9be0bc7dc31ef3936f8_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:25567f02ee5b0640a12f76bfed9b889334363be402d9bdb14c8b7cc37feb6b28_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:6f893e3537bdc8ac814c5726f5594f4da820973d2246d3b399687d406e9a3952_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:bcc3f8c6589b63a0a162498ea2ab3596971a97b9107ade0ebd3e8d0d372ac84e_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-builder-rhel8@sha256:c6dfd40d71e49b352b39595ad73f06002d3bc448bc93e06def96ab3424451893_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:b82090e9203982de62d995c18eed37838b8ebbb092195a7f58d02526fd04523e_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:03da6ae6711c5238e19daa8ccccd75bc936ab8144b67cb2ccddcd3d1d2e33a40_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:1bd8354520b468f4eb47872a428f56da551e6720f31a41ce6e02df5050b4f8b2_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:ab3aa3fde12c94c24c2c1a3caa08f5d995cc9d3d9cca1af8b46610f6b4ff28ee_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:c7c2192a046c0fde35dcafa363803c085663676224708f4520fd967b3d2c8dd4_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-bundle@sha256:91ce9e64184afb90b00360c64f5ba37d30130ab0344b2439b93db15f2b35b74d_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:3940beeed21aa2c4ae695e7ac40a0373a05246f1dff2d6d829d3111c032a1970_arm64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:96ee14d79f08194aa54cc7e6d1d814dae5af1d7143e513b6f1cb9397b6407ae6_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:cfbfd35f7cd15df266c69d12975f64db2bc38238d2a0a7f9d17b319db20ccbbb_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-operator-rhel8@sha256:e83662cd7bab21bcd0faa26ae67f0cb9244a67e17036af92cf30fe2a5591dcb0_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:2b5f83bbade40b04a7975788743afdb8cec5f72ad8e5eea4c75d5840ce44ef3f_s390x",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:7b77b205b95f99383f12e571b391a35ea8f85dfd23f2d4fd67045bbece1ee66e_amd64",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:b638f53267de38576f1875ee3379114ba3c2089d8b26901c4a960ec82d35a0b6_ppc64le",
"Red Hat Quay 3.1:registry.redhat.io/quay/quay-rhel8@sha256:d0ad53575ddce599c11e959d3590300ab325633951003db4ef2d82a133c8ef19_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "authlib: Authlib Denial of Service"
}
]
}
RHSA-2025:23060
Vulnerability from csaf_redhat - Published: 2025-12-10 16:11 - Updated: 2026-03-16 06:38Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat Quay 3.12 is now available with bug fixes.",
"title": "Topic"
},
{
"category": "general",
"text": "Quay 3.12",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:23060",
"url": "https://access.redhat.com/errata/RHSA-2025:23060"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2024-34156",
"url": "https://access.redhat.com/security/cve/CVE-2024-34156"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-47913",
"url": "https://access.redhat.com/security/cve/CVE-2025-47913"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-59420",
"url": "https://access.redhat.com/security/cve/CVE-2025-59420"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61920",
"url": "https://access.redhat.com/security/cve/CVE-2025-61920"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_23060.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Quay 3.12",
"tracking": {
"current_release_date": "2026-03-16T06:38:43+00:00",
"generator": {
"date": "2026-03-16T06:38:43+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.3"
}
},
"id": "RHSA-2025:23060",
"initial_release_date": "2025-12-10T16:11:04+00:00",
"revision_history": [
{
"date": "2025-12-10T16:11:04+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-12-10T16:11:15+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-16T06:38:43+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Quay 3.12",
"product": {
"name": "Red Hat Quay 3.12",
"product_id": "Red Hat Quay 3.12",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:quay:3.12::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat Quay"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:53c387293b92691eb66ea73b1d29781cf275f01b4254c38e21620c0502987272_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:53c387293b92691eb66ea73b1d29781cf275f01b4254c38e21620c0502987272_amd64",
"product_id": "registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:53c387293b92691eb66ea73b1d29781cf275f01b4254c38e21620c0502987272_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-container-security-operator-bundle@sha256%3A53c387293b92691eb66ea73b1d29781cf275f01b4254c38e21620c0502987272?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=3.12.13-1765382602"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7814f04947e8e98d3c4870894e320b12c557976495bdf28a89b55bf061bacf79_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7814f04947e8e98d3c4870894e320b12c557976495bdf28a89b55bf061bacf79_amd64",
"product_id": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7814f04947e8e98d3c4870894e320b12c557976495bdf28a89b55bf061bacf79_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-container-security-operator-rhel8@sha256%3A7814f04947e8e98d3c4870894e320b12c557976495bdf28a89b55bf061bacf79?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=3.12.13-1765382602"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:0a978bbe91e0e0b8bab6862522f8a0aa8e974b778cc36b83f0781081621c8e23_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:0a978bbe91e0e0b8bab6862522f8a0aa8e974b778cc36b83f0781081621c8e23_amd64",
"product_id": "registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:0a978bbe91e0e0b8bab6862522f8a0aa8e974b778cc36b83f0781081621c8e23_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-bridge-operator-bundle@sha256%3A0a978bbe91e0e0b8bab6862522f8a0aa8e974b778cc36b83f0781081621c8e23?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=3.12.13-1765382602"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:ad2119941c2e8db1691a9bfee085425c7203ab00c2cdf0a6441b1102109cfd21_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:ad2119941c2e8db1691a9bfee085425c7203ab00c2cdf0a6441b1102109cfd21_amd64",
"product_id": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:ad2119941c2e8db1691a9bfee085425c7203ab00c2cdf0a6441b1102109cfd21_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-bridge-operator-rhel8@sha256%3Aad2119941c2e8db1691a9bfee085425c7203ab00c2cdf0a6441b1102109cfd21?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=3.12.13-1765382602"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:1f769259f2b91d47f4d4fbf92414903a62380a358737e7100a1166ccd8c89b85_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:1f769259f2b91d47f4d4fbf92414903a62380a358737e7100a1166ccd8c89b85_amd64",
"product_id": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:1f769259f2b91d47f4d4fbf92414903a62380a358737e7100a1166ccd8c89b85_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-builder-qemu-rhcos-rhel8@sha256%3A1f769259f2b91d47f4d4fbf92414903a62380a358737e7100a1166ccd8c89b85?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=3.14-1765382602"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:7a338bb18181535a2644bf70cae05042e1ef2af5a80e70a6cab6516e8f054896_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:7a338bb18181535a2644bf70cae05042e1ef2af5a80e70a6cab6516e8f054896_amd64",
"product_id": "registry.redhat.io/quay/quay-builder-rhel8@sha256:7a338bb18181535a2644bf70cae05042e1ef2af5a80e70a6cab6516e8f054896_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-builder-rhel8@sha256%3A7a338bb18181535a2644bf70cae05042e1ef2af5a80e70a6cab6516e8f054896?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=8.10-1765382602"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/clair-rhel8@sha256:c5cb9d3d0f970ad36005f2d376547e967e4a89574cca1cf8806bb92d05199d70_amd64",
"product": {
"name": "registry.redhat.io/quay/clair-rhel8@sha256:c5cb9d3d0f970ad36005f2d376547e967e4a89574cca1cf8806bb92d05199d70_amd64",
"product_id": "registry.redhat.io/quay/clair-rhel8@sha256:c5cb9d3d0f970ad36005f2d376547e967e4a89574cca1cf8806bb92d05199d70_amd64",
"product_identification_helper": {
"purl": "pkg:oci/clair-rhel8@sha256%3Ac5cb9d3d0f970ad36005f2d376547e967e4a89574cca1cf8806bb92d05199d70?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=v3.12.0-1765382602"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-operator-bundle@sha256:1c915a6f813564b9bf8062ea5c6a83097a8dd78a38fda0171fae9cc8d81299c7_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-operator-bundle@sha256:1c915a6f813564b9bf8062ea5c6a83097a8dd78a38fda0171fae9cc8d81299c7_amd64",
"product_id": "registry.redhat.io/quay/quay-operator-bundle@sha256:1c915a6f813564b9bf8062ea5c6a83097a8dd78a38fda0171fae9cc8d81299c7_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-operator-bundle@sha256%3A1c915a6f813564b9bf8062ea5c6a83097a8dd78a38fda0171fae9cc8d81299c7?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=3.12.13-1765382602"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:f960e1816f8babb590a55ccab9f2db1b567df749e73c70067269d32f6200bca6_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:f960e1816f8babb590a55ccab9f2db1b567df749e73c70067269d32f6200bca6_amd64",
"product_id": "registry.redhat.io/quay/quay-operator-rhel8@sha256:f960e1816f8babb590a55ccab9f2db1b567df749e73c70067269d32f6200bca6_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-operator-rhel8@sha256%3Af960e1816f8babb590a55ccab9f2db1b567df749e73c70067269d32f6200bca6?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=3.12.13-1765382602"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-rhel8@sha256:a40309477f7286b6c00381012eec8d3ececb557a4b8db38e5b4ea7f321a17c79_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-rhel8@sha256:a40309477f7286b6c00381012eec8d3ececb557a4b8db38e5b4ea7f321a17c79_amd64",
"product_id": "registry.redhat.io/quay/quay-rhel8@sha256:a40309477f7286b6c00381012eec8d3ececb557a4b8db38e5b4ea7f321a17c79_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-rhel8@sha256%3Aa40309477f7286b6c00381012eec8d3ececb557a4b8db38e5b4ea7f321a17c79?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=3.12-1765382602"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:b2a263d3cbf303d0dffb2c36ee2a4187c29902ce96ca1ded6f33b2edcc68fda9_arm64",
"product": {
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:b2a263d3cbf303d0dffb2c36ee2a4187c29902ce96ca1ded6f33b2edcc68fda9_arm64",
"product_id": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:b2a263d3cbf303d0dffb2c36ee2a4187c29902ce96ca1ded6f33b2edcc68fda9_arm64",
"product_identification_helper": {
"purl": "pkg:oci/quay-container-security-operator-rhel8@sha256%3Ab2a263d3cbf303d0dffb2c36ee2a4187c29902ce96ca1ded6f33b2edcc68fda9?arch=arm64\u0026repository_url=registry.redhat.io/quay\u0026tag=3.12.13-1765382602"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8b3684c92affc7acadcd5dc8eb80e5727081c7ecf4cc6eeafe5ecc5ea60970bb_arm64",
"product": {
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8b3684c92affc7acadcd5dc8eb80e5727081c7ecf4cc6eeafe5ecc5ea60970bb_arm64",
"product_id": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8b3684c92affc7acadcd5dc8eb80e5727081c7ecf4cc6eeafe5ecc5ea60970bb_arm64",
"product_identification_helper": {
"purl": "pkg:oci/quay-bridge-operator-rhel8@sha256%3A8b3684c92affc7acadcd5dc8eb80e5727081c7ecf4cc6eeafe5ecc5ea60970bb?arch=arm64\u0026repository_url=registry.redhat.io/quay\u0026tag=3.12.13-1765382602"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0c7a94928e8ef89aebdd9b30a47aaf0fe4dfb3a716603362b5c7d52255c4e842_arm64",
"product": {
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0c7a94928e8ef89aebdd9b30a47aaf0fe4dfb3a716603362b5c7d52255c4e842_arm64",
"product_id": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0c7a94928e8ef89aebdd9b30a47aaf0fe4dfb3a716603362b5c7d52255c4e842_arm64",
"product_identification_helper": {
"purl": "pkg:oci/quay-builder-qemu-rhcos-rhel8@sha256%3A0c7a94928e8ef89aebdd9b30a47aaf0fe4dfb3a716603362b5c7d52255c4e842?arch=arm64\u0026repository_url=registry.redhat.io/quay\u0026tag=3.14-1765382602"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:00eb13b3cccf326292589a680a964160c58f83391d0036c4ebcb34fad32b6189_arm64",
"product": {
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:00eb13b3cccf326292589a680a964160c58f83391d0036c4ebcb34fad32b6189_arm64",
"product_id": "registry.redhat.io/quay/quay-builder-rhel8@sha256:00eb13b3cccf326292589a680a964160c58f83391d0036c4ebcb34fad32b6189_arm64",
"product_identification_helper": {
"purl": "pkg:oci/quay-builder-rhel8@sha256%3A00eb13b3cccf326292589a680a964160c58f83391d0036c4ebcb34fad32b6189?arch=arm64\u0026repository_url=registry.redhat.io/quay\u0026tag=8.10-1765382602"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/clair-rhel8@sha256:11091b652f65868606c3d4d3e30a04cea7396f06f119bcd0a4cf664db2aa790e_arm64",
"product": {
"name": "registry.redhat.io/quay/clair-rhel8@sha256:11091b652f65868606c3d4d3e30a04cea7396f06f119bcd0a4cf664db2aa790e_arm64",
"product_id": "registry.redhat.io/quay/clair-rhel8@sha256:11091b652f65868606c3d4d3e30a04cea7396f06f119bcd0a4cf664db2aa790e_arm64",
"product_identification_helper": {
"purl": "pkg:oci/clair-rhel8@sha256%3A11091b652f65868606c3d4d3e30a04cea7396f06f119bcd0a4cf664db2aa790e?arch=arm64\u0026repository_url=registry.redhat.io/quay\u0026tag=v3.12.0-1765382602"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:b2e2d245c7ba3d1528e73b59bad428f023eeb17a1983d61edcf6a22db58911cf_arm64",
"product": {
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:b2e2d245c7ba3d1528e73b59bad428f023eeb17a1983d61edcf6a22db58911cf_arm64",
"product_id": "registry.redhat.io/quay/quay-operator-rhel8@sha256:b2e2d245c7ba3d1528e73b59bad428f023eeb17a1983d61edcf6a22db58911cf_arm64",
"product_identification_helper": {
"purl": "pkg:oci/quay-operator-rhel8@sha256%3Ab2e2d245c7ba3d1528e73b59bad428f023eeb17a1983d61edcf6a22db58911cf?arch=arm64\u0026repository_url=registry.redhat.io/quay\u0026tag=3.12.13-1765382602"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-rhel8@sha256:30152d31da209c034ec39b52a32063437097eec9a4fac2eaf4a4110fea97cb70_arm64",
"product": {
"name": "registry.redhat.io/quay/quay-rhel8@sha256:30152d31da209c034ec39b52a32063437097eec9a4fac2eaf4a4110fea97cb70_arm64",
"product_id": "registry.redhat.io/quay/quay-rhel8@sha256:30152d31da209c034ec39b52a32063437097eec9a4fac2eaf4a4110fea97cb70_arm64",
"product_identification_helper": {
"purl": "pkg:oci/quay-rhel8@sha256%3A30152d31da209c034ec39b52a32063437097eec9a4fac2eaf4a4110fea97cb70?arch=arm64\u0026repository_url=registry.redhat.io/quay\u0026tag=3.12-1765382602"
}
}
}
],
"category": "architecture",
"name": "arm64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:33d0912dbad0b1702fd91abf87e38910d2b983334062044c292a0cb1714187a0_ppc64le",
"product": {
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:33d0912dbad0b1702fd91abf87e38910d2b983334062044c292a0cb1714187a0_ppc64le",
"product_id": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:33d0912dbad0b1702fd91abf87e38910d2b983334062044c292a0cb1714187a0_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/quay-container-security-operator-rhel8@sha256%3A33d0912dbad0b1702fd91abf87e38910d2b983334062044c292a0cb1714187a0?arch=ppc64le\u0026repository_url=registry.redhat.io/quay\u0026tag=3.12.13-1765382602"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8d474498354d438fc9deeceb3bc89649f35d4e382e930ee721059bfeaf0f8279_ppc64le",
"product": {
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8d474498354d438fc9deeceb3bc89649f35d4e382e930ee721059bfeaf0f8279_ppc64le",
"product_id": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8d474498354d438fc9deeceb3bc89649f35d4e382e930ee721059bfeaf0f8279_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/quay-bridge-operator-rhel8@sha256%3A8d474498354d438fc9deeceb3bc89649f35d4e382e930ee721059bfeaf0f8279?arch=ppc64le\u0026repository_url=registry.redhat.io/quay\u0026tag=3.12.13-1765382602"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bd796d2de4d02f63adc767aa22b9a388b3adea40c12b0d8f158ebffabed6fee9_ppc64le",
"product": {
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bd796d2de4d02f63adc767aa22b9a388b3adea40c12b0d8f158ebffabed6fee9_ppc64le",
"product_id": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bd796d2de4d02f63adc767aa22b9a388b3adea40c12b0d8f158ebffabed6fee9_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/quay-builder-qemu-rhcos-rhel8@sha256%3Abd796d2de4d02f63adc767aa22b9a388b3adea40c12b0d8f158ebffabed6fee9?arch=ppc64le\u0026repository_url=registry.redhat.io/quay\u0026tag=3.14-1765382602"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:3facbc804376b505181c2f52f0c7a433111bcedcb5699a0fcdffd7e9a2bdfbbe_ppc64le",
"product": {
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:3facbc804376b505181c2f52f0c7a433111bcedcb5699a0fcdffd7e9a2bdfbbe_ppc64le",
"product_id": "registry.redhat.io/quay/quay-builder-rhel8@sha256:3facbc804376b505181c2f52f0c7a433111bcedcb5699a0fcdffd7e9a2bdfbbe_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/quay-builder-rhel8@sha256%3A3facbc804376b505181c2f52f0c7a433111bcedcb5699a0fcdffd7e9a2bdfbbe?arch=ppc64le\u0026repository_url=registry.redhat.io/quay\u0026tag=8.10-1765382602"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/clair-rhel8@sha256:212ceac279067567409c47acf7792e0c4d1955395f045e3b717040321dc1b88f_ppc64le",
"product": {
"name": "registry.redhat.io/quay/clair-rhel8@sha256:212ceac279067567409c47acf7792e0c4d1955395f045e3b717040321dc1b88f_ppc64le",
"product_id": "registry.redhat.io/quay/clair-rhel8@sha256:212ceac279067567409c47acf7792e0c4d1955395f045e3b717040321dc1b88f_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/clair-rhel8@sha256%3A212ceac279067567409c47acf7792e0c4d1955395f045e3b717040321dc1b88f?arch=ppc64le\u0026repository_url=registry.redhat.io/quay\u0026tag=v3.12.0-1765382602"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:37039569fe73c3975468ffb8640c42becdd9b5304fb5e54789bf59dc67c52c9b_ppc64le",
"product": {
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:37039569fe73c3975468ffb8640c42becdd9b5304fb5e54789bf59dc67c52c9b_ppc64le",
"product_id": "registry.redhat.io/quay/quay-operator-rhel8@sha256:37039569fe73c3975468ffb8640c42becdd9b5304fb5e54789bf59dc67c52c9b_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/quay-operator-rhel8@sha256%3A37039569fe73c3975468ffb8640c42becdd9b5304fb5e54789bf59dc67c52c9b?arch=ppc64le\u0026repository_url=registry.redhat.io/quay\u0026tag=3.12.13-1765382602"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-rhel8@sha256:38f094f62eed92d88eae0e7a9be410ef908bd0194b30240d49087ae76250e0ee_ppc64le",
"product": {
"name": "registry.redhat.io/quay/quay-rhel8@sha256:38f094f62eed92d88eae0e7a9be410ef908bd0194b30240d49087ae76250e0ee_ppc64le",
"product_id": "registry.redhat.io/quay/quay-rhel8@sha256:38f094f62eed92d88eae0e7a9be410ef908bd0194b30240d49087ae76250e0ee_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/quay-rhel8@sha256%3A38f094f62eed92d88eae0e7a9be410ef908bd0194b30240d49087ae76250e0ee?arch=ppc64le\u0026repository_url=registry.redhat.io/quay\u0026tag=3.12-1765382602"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:1b0a31b5f6d1e1493974efb8c7ca5112e6e4d8f0b8e1de8e55b7b8c1184b2293_s390x",
"product": {
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:1b0a31b5f6d1e1493974efb8c7ca5112e6e4d8f0b8e1de8e55b7b8c1184b2293_s390x",
"product_id": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:1b0a31b5f6d1e1493974efb8c7ca5112e6e4d8f0b8e1de8e55b7b8c1184b2293_s390x",
"product_identification_helper": {
"purl": "pkg:oci/quay-container-security-operator-rhel8@sha256%3A1b0a31b5f6d1e1493974efb8c7ca5112e6e4d8f0b8e1de8e55b7b8c1184b2293?arch=s390x\u0026repository_url=registry.redhat.io/quay\u0026tag=3.12.13-1765382602"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:cdf96fe7a1ad4c192b4313e804d40d5c656c3f0ced498bae2427e449f0b2df02_s390x",
"product": {
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:cdf96fe7a1ad4c192b4313e804d40d5c656c3f0ced498bae2427e449f0b2df02_s390x",
"product_id": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:cdf96fe7a1ad4c192b4313e804d40d5c656c3f0ced498bae2427e449f0b2df02_s390x",
"product_identification_helper": {
"purl": "pkg:oci/quay-bridge-operator-rhel8@sha256%3Acdf96fe7a1ad4c192b4313e804d40d5c656c3f0ced498bae2427e449f0b2df02?arch=s390x\u0026repository_url=registry.redhat.io/quay\u0026tag=3.12.13-1765382602"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:a71b5493009863c4f1e9ae9393ff236dc262d84ee028482ee58840fbfe392c83_s390x",
"product": {
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:a71b5493009863c4f1e9ae9393ff236dc262d84ee028482ee58840fbfe392c83_s390x",
"product_id": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:a71b5493009863c4f1e9ae9393ff236dc262d84ee028482ee58840fbfe392c83_s390x",
"product_identification_helper": {
"purl": "pkg:oci/quay-builder-qemu-rhcos-rhel8@sha256%3Aa71b5493009863c4f1e9ae9393ff236dc262d84ee028482ee58840fbfe392c83?arch=s390x\u0026repository_url=registry.redhat.io/quay\u0026tag=3.14-1765382602"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:0ca5a583ca7ff0161ed35deeae94be78adc74100d0343b778f1edf5b77e90925_s390x",
"product": {
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:0ca5a583ca7ff0161ed35deeae94be78adc74100d0343b778f1edf5b77e90925_s390x",
"product_id": "registry.redhat.io/quay/quay-builder-rhel8@sha256:0ca5a583ca7ff0161ed35deeae94be78adc74100d0343b778f1edf5b77e90925_s390x",
"product_identification_helper": {
"purl": "pkg:oci/quay-builder-rhel8@sha256%3A0ca5a583ca7ff0161ed35deeae94be78adc74100d0343b778f1edf5b77e90925?arch=s390x\u0026repository_url=registry.redhat.io/quay\u0026tag=8.10-1765382602"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/clair-rhel8@sha256:451da4b858587adcef52b5f1c9b7c92985bd7cc7c90f651b9e38825b81b38fb0_s390x",
"product": {
"name": "registry.redhat.io/quay/clair-rhel8@sha256:451da4b858587adcef52b5f1c9b7c92985bd7cc7c90f651b9e38825b81b38fb0_s390x",
"product_id": "registry.redhat.io/quay/clair-rhel8@sha256:451da4b858587adcef52b5f1c9b7c92985bd7cc7c90f651b9e38825b81b38fb0_s390x",
"product_identification_helper": {
"purl": "pkg:oci/clair-rhel8@sha256%3A451da4b858587adcef52b5f1c9b7c92985bd7cc7c90f651b9e38825b81b38fb0?arch=s390x\u0026repository_url=registry.redhat.io/quay\u0026tag=v3.12.0-1765382602"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:4e2ef7cca978574e1715c24b9874c7a0a1a46a6319884a91fe54df06efe97df1_s390x",
"product": {
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:4e2ef7cca978574e1715c24b9874c7a0a1a46a6319884a91fe54df06efe97df1_s390x",
"product_id": "registry.redhat.io/quay/quay-operator-rhel8@sha256:4e2ef7cca978574e1715c24b9874c7a0a1a46a6319884a91fe54df06efe97df1_s390x",
"product_identification_helper": {
"purl": "pkg:oci/quay-operator-rhel8@sha256%3A4e2ef7cca978574e1715c24b9874c7a0a1a46a6319884a91fe54df06efe97df1?arch=s390x\u0026repository_url=registry.redhat.io/quay\u0026tag=3.12.13-1765382602"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-rhel8@sha256:4d0a86e557e93eb8e7d70d538f181c2d33176b3537fb8d9e3a1e76a16ee2eed5_s390x",
"product": {
"name": "registry.redhat.io/quay/quay-rhel8@sha256:4d0a86e557e93eb8e7d70d538f181c2d33176b3537fb8d9e3a1e76a16ee2eed5_s390x",
"product_id": "registry.redhat.io/quay/quay-rhel8@sha256:4d0a86e557e93eb8e7d70d538f181c2d33176b3537fb8d9e3a1e76a16ee2eed5_s390x",
"product_identification_helper": {
"purl": "pkg:oci/quay-rhel8@sha256%3A4d0a86e557e93eb8e7d70d538f181c2d33176b3537fb8d9e3a1e76a16ee2eed5?arch=s390x\u0026repository_url=registry.redhat.io/quay\u0026tag=3.12-1765382602"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/clair-rhel8@sha256:11091b652f65868606c3d4d3e30a04cea7396f06f119bcd0a4cf664db2aa790e_arm64 as a component of Red Hat Quay 3.12",
"product_id": "Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:11091b652f65868606c3d4d3e30a04cea7396f06f119bcd0a4cf664db2aa790e_arm64"
},
"product_reference": "registry.redhat.io/quay/clair-rhel8@sha256:11091b652f65868606c3d4d3e30a04cea7396f06f119bcd0a4cf664db2aa790e_arm64",
"relates_to_product_reference": "Red Hat Quay 3.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/clair-rhel8@sha256:212ceac279067567409c47acf7792e0c4d1955395f045e3b717040321dc1b88f_ppc64le as a component of Red Hat Quay 3.12",
"product_id": "Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:212ceac279067567409c47acf7792e0c4d1955395f045e3b717040321dc1b88f_ppc64le"
},
"product_reference": "registry.redhat.io/quay/clair-rhel8@sha256:212ceac279067567409c47acf7792e0c4d1955395f045e3b717040321dc1b88f_ppc64le",
"relates_to_product_reference": "Red Hat Quay 3.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/clair-rhel8@sha256:451da4b858587adcef52b5f1c9b7c92985bd7cc7c90f651b9e38825b81b38fb0_s390x as a component of Red Hat Quay 3.12",
"product_id": "Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:451da4b858587adcef52b5f1c9b7c92985bd7cc7c90f651b9e38825b81b38fb0_s390x"
},
"product_reference": "registry.redhat.io/quay/clair-rhel8@sha256:451da4b858587adcef52b5f1c9b7c92985bd7cc7c90f651b9e38825b81b38fb0_s390x",
"relates_to_product_reference": "Red Hat Quay 3.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/clair-rhel8@sha256:c5cb9d3d0f970ad36005f2d376547e967e4a89574cca1cf8806bb92d05199d70_amd64 as a component of Red Hat Quay 3.12",
"product_id": "Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:c5cb9d3d0f970ad36005f2d376547e967e4a89574cca1cf8806bb92d05199d70_amd64"
},
"product_reference": "registry.redhat.io/quay/clair-rhel8@sha256:c5cb9d3d0f970ad36005f2d376547e967e4a89574cca1cf8806bb92d05199d70_amd64",
"relates_to_product_reference": "Red Hat Quay 3.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:0a978bbe91e0e0b8bab6862522f8a0aa8e974b778cc36b83f0781081621c8e23_amd64 as a component of Red Hat Quay 3.12",
"product_id": "Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:0a978bbe91e0e0b8bab6862522f8a0aa8e974b778cc36b83f0781081621c8e23_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:0a978bbe91e0e0b8bab6862522f8a0aa8e974b778cc36b83f0781081621c8e23_amd64",
"relates_to_product_reference": "Red Hat Quay 3.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8b3684c92affc7acadcd5dc8eb80e5727081c7ecf4cc6eeafe5ecc5ea60970bb_arm64 as a component of Red Hat Quay 3.12",
"product_id": "Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8b3684c92affc7acadcd5dc8eb80e5727081c7ecf4cc6eeafe5ecc5ea60970bb_arm64"
},
"product_reference": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8b3684c92affc7acadcd5dc8eb80e5727081c7ecf4cc6eeafe5ecc5ea60970bb_arm64",
"relates_to_product_reference": "Red Hat Quay 3.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8d474498354d438fc9deeceb3bc89649f35d4e382e930ee721059bfeaf0f8279_ppc64le as a component of Red Hat Quay 3.12",
"product_id": "Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8d474498354d438fc9deeceb3bc89649f35d4e382e930ee721059bfeaf0f8279_ppc64le"
},
"product_reference": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8d474498354d438fc9deeceb3bc89649f35d4e382e930ee721059bfeaf0f8279_ppc64le",
"relates_to_product_reference": "Red Hat Quay 3.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:ad2119941c2e8db1691a9bfee085425c7203ab00c2cdf0a6441b1102109cfd21_amd64 as a component of Red Hat Quay 3.12",
"product_id": "Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:ad2119941c2e8db1691a9bfee085425c7203ab00c2cdf0a6441b1102109cfd21_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:ad2119941c2e8db1691a9bfee085425c7203ab00c2cdf0a6441b1102109cfd21_amd64",
"relates_to_product_reference": "Red Hat Quay 3.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:cdf96fe7a1ad4c192b4313e804d40d5c656c3f0ced498bae2427e449f0b2df02_s390x as a component of Red Hat Quay 3.12",
"product_id": "Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:cdf96fe7a1ad4c192b4313e804d40d5c656c3f0ced498bae2427e449f0b2df02_s390x"
},
"product_reference": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:cdf96fe7a1ad4c192b4313e804d40d5c656c3f0ced498bae2427e449f0b2df02_s390x",
"relates_to_product_reference": "Red Hat Quay 3.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0c7a94928e8ef89aebdd9b30a47aaf0fe4dfb3a716603362b5c7d52255c4e842_arm64 as a component of Red Hat Quay 3.12",
"product_id": "Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0c7a94928e8ef89aebdd9b30a47aaf0fe4dfb3a716603362b5c7d52255c4e842_arm64"
},
"product_reference": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0c7a94928e8ef89aebdd9b30a47aaf0fe4dfb3a716603362b5c7d52255c4e842_arm64",
"relates_to_product_reference": "Red Hat Quay 3.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:1f769259f2b91d47f4d4fbf92414903a62380a358737e7100a1166ccd8c89b85_amd64 as a component of Red Hat Quay 3.12",
"product_id": "Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:1f769259f2b91d47f4d4fbf92414903a62380a358737e7100a1166ccd8c89b85_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:1f769259f2b91d47f4d4fbf92414903a62380a358737e7100a1166ccd8c89b85_amd64",
"relates_to_product_reference": "Red Hat Quay 3.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:a71b5493009863c4f1e9ae9393ff236dc262d84ee028482ee58840fbfe392c83_s390x as a component of Red Hat Quay 3.12",
"product_id": "Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:a71b5493009863c4f1e9ae9393ff236dc262d84ee028482ee58840fbfe392c83_s390x"
},
"product_reference": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:a71b5493009863c4f1e9ae9393ff236dc262d84ee028482ee58840fbfe392c83_s390x",
"relates_to_product_reference": "Red Hat Quay 3.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bd796d2de4d02f63adc767aa22b9a388b3adea40c12b0d8f158ebffabed6fee9_ppc64le as a component of Red Hat Quay 3.12",
"product_id": "Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bd796d2de4d02f63adc767aa22b9a388b3adea40c12b0d8f158ebffabed6fee9_ppc64le"
},
"product_reference": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bd796d2de4d02f63adc767aa22b9a388b3adea40c12b0d8f158ebffabed6fee9_ppc64le",
"relates_to_product_reference": "Red Hat Quay 3.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:00eb13b3cccf326292589a680a964160c58f83391d0036c4ebcb34fad32b6189_arm64 as a component of Red Hat Quay 3.12",
"product_id": "Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:00eb13b3cccf326292589a680a964160c58f83391d0036c4ebcb34fad32b6189_arm64"
},
"product_reference": "registry.redhat.io/quay/quay-builder-rhel8@sha256:00eb13b3cccf326292589a680a964160c58f83391d0036c4ebcb34fad32b6189_arm64",
"relates_to_product_reference": "Red Hat Quay 3.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:0ca5a583ca7ff0161ed35deeae94be78adc74100d0343b778f1edf5b77e90925_s390x as a component of Red Hat Quay 3.12",
"product_id": "Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:0ca5a583ca7ff0161ed35deeae94be78adc74100d0343b778f1edf5b77e90925_s390x"
},
"product_reference": "registry.redhat.io/quay/quay-builder-rhel8@sha256:0ca5a583ca7ff0161ed35deeae94be78adc74100d0343b778f1edf5b77e90925_s390x",
"relates_to_product_reference": "Red Hat Quay 3.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:3facbc804376b505181c2f52f0c7a433111bcedcb5699a0fcdffd7e9a2bdfbbe_ppc64le as a component of Red Hat Quay 3.12",
"product_id": "Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:3facbc804376b505181c2f52f0c7a433111bcedcb5699a0fcdffd7e9a2bdfbbe_ppc64le"
},
"product_reference": "registry.redhat.io/quay/quay-builder-rhel8@sha256:3facbc804376b505181c2f52f0c7a433111bcedcb5699a0fcdffd7e9a2bdfbbe_ppc64le",
"relates_to_product_reference": "Red Hat Quay 3.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:7a338bb18181535a2644bf70cae05042e1ef2af5a80e70a6cab6516e8f054896_amd64 as a component of Red Hat Quay 3.12",
"product_id": "Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:7a338bb18181535a2644bf70cae05042e1ef2af5a80e70a6cab6516e8f054896_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-builder-rhel8@sha256:7a338bb18181535a2644bf70cae05042e1ef2af5a80e70a6cab6516e8f054896_amd64",
"relates_to_product_reference": "Red Hat Quay 3.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:53c387293b92691eb66ea73b1d29781cf275f01b4254c38e21620c0502987272_amd64 as a component of Red Hat Quay 3.12",
"product_id": "Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:53c387293b92691eb66ea73b1d29781cf275f01b4254c38e21620c0502987272_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:53c387293b92691eb66ea73b1d29781cf275f01b4254c38e21620c0502987272_amd64",
"relates_to_product_reference": "Red Hat Quay 3.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:1b0a31b5f6d1e1493974efb8c7ca5112e6e4d8f0b8e1de8e55b7b8c1184b2293_s390x as a component of Red Hat Quay 3.12",
"product_id": "Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:1b0a31b5f6d1e1493974efb8c7ca5112e6e4d8f0b8e1de8e55b7b8c1184b2293_s390x"
},
"product_reference": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:1b0a31b5f6d1e1493974efb8c7ca5112e6e4d8f0b8e1de8e55b7b8c1184b2293_s390x",
"relates_to_product_reference": "Red Hat Quay 3.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:33d0912dbad0b1702fd91abf87e38910d2b983334062044c292a0cb1714187a0_ppc64le as a component of Red Hat Quay 3.12",
"product_id": "Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:33d0912dbad0b1702fd91abf87e38910d2b983334062044c292a0cb1714187a0_ppc64le"
},
"product_reference": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:33d0912dbad0b1702fd91abf87e38910d2b983334062044c292a0cb1714187a0_ppc64le",
"relates_to_product_reference": "Red Hat Quay 3.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7814f04947e8e98d3c4870894e320b12c557976495bdf28a89b55bf061bacf79_amd64 as a component of Red Hat Quay 3.12",
"product_id": "Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7814f04947e8e98d3c4870894e320b12c557976495bdf28a89b55bf061bacf79_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7814f04947e8e98d3c4870894e320b12c557976495bdf28a89b55bf061bacf79_amd64",
"relates_to_product_reference": "Red Hat Quay 3.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:b2a263d3cbf303d0dffb2c36ee2a4187c29902ce96ca1ded6f33b2edcc68fda9_arm64 as a component of Red Hat Quay 3.12",
"product_id": "Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:b2a263d3cbf303d0dffb2c36ee2a4187c29902ce96ca1ded6f33b2edcc68fda9_arm64"
},
"product_reference": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:b2a263d3cbf303d0dffb2c36ee2a4187c29902ce96ca1ded6f33b2edcc68fda9_arm64",
"relates_to_product_reference": "Red Hat Quay 3.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-operator-bundle@sha256:1c915a6f813564b9bf8062ea5c6a83097a8dd78a38fda0171fae9cc8d81299c7_amd64 as a component of Red Hat Quay 3.12",
"product_id": "Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-bundle@sha256:1c915a6f813564b9bf8062ea5c6a83097a8dd78a38fda0171fae9cc8d81299c7_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-operator-bundle@sha256:1c915a6f813564b9bf8062ea5c6a83097a8dd78a38fda0171fae9cc8d81299c7_amd64",
"relates_to_product_reference": "Red Hat Quay 3.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:37039569fe73c3975468ffb8640c42becdd9b5304fb5e54789bf59dc67c52c9b_ppc64le as a component of Red Hat Quay 3.12",
"product_id": "Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:37039569fe73c3975468ffb8640c42becdd9b5304fb5e54789bf59dc67c52c9b_ppc64le"
},
"product_reference": "registry.redhat.io/quay/quay-operator-rhel8@sha256:37039569fe73c3975468ffb8640c42becdd9b5304fb5e54789bf59dc67c52c9b_ppc64le",
"relates_to_product_reference": "Red Hat Quay 3.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:4e2ef7cca978574e1715c24b9874c7a0a1a46a6319884a91fe54df06efe97df1_s390x as a component of Red Hat Quay 3.12",
"product_id": "Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:4e2ef7cca978574e1715c24b9874c7a0a1a46a6319884a91fe54df06efe97df1_s390x"
},
"product_reference": "registry.redhat.io/quay/quay-operator-rhel8@sha256:4e2ef7cca978574e1715c24b9874c7a0a1a46a6319884a91fe54df06efe97df1_s390x",
"relates_to_product_reference": "Red Hat Quay 3.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:b2e2d245c7ba3d1528e73b59bad428f023eeb17a1983d61edcf6a22db58911cf_arm64 as a component of Red Hat Quay 3.12",
"product_id": "Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:b2e2d245c7ba3d1528e73b59bad428f023eeb17a1983d61edcf6a22db58911cf_arm64"
},
"product_reference": "registry.redhat.io/quay/quay-operator-rhel8@sha256:b2e2d245c7ba3d1528e73b59bad428f023eeb17a1983d61edcf6a22db58911cf_arm64",
"relates_to_product_reference": "Red Hat Quay 3.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:f960e1816f8babb590a55ccab9f2db1b567df749e73c70067269d32f6200bca6_amd64 as a component of Red Hat Quay 3.12",
"product_id": "Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:f960e1816f8babb590a55ccab9f2db1b567df749e73c70067269d32f6200bca6_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-operator-rhel8@sha256:f960e1816f8babb590a55ccab9f2db1b567df749e73c70067269d32f6200bca6_amd64",
"relates_to_product_reference": "Red Hat Quay 3.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-rhel8@sha256:30152d31da209c034ec39b52a32063437097eec9a4fac2eaf4a4110fea97cb70_arm64 as a component of Red Hat Quay 3.12",
"product_id": "Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:30152d31da209c034ec39b52a32063437097eec9a4fac2eaf4a4110fea97cb70_arm64"
},
"product_reference": "registry.redhat.io/quay/quay-rhel8@sha256:30152d31da209c034ec39b52a32063437097eec9a4fac2eaf4a4110fea97cb70_arm64",
"relates_to_product_reference": "Red Hat Quay 3.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-rhel8@sha256:38f094f62eed92d88eae0e7a9be410ef908bd0194b30240d49087ae76250e0ee_ppc64le as a component of Red Hat Quay 3.12",
"product_id": "Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:38f094f62eed92d88eae0e7a9be410ef908bd0194b30240d49087ae76250e0ee_ppc64le"
},
"product_reference": "registry.redhat.io/quay/quay-rhel8@sha256:38f094f62eed92d88eae0e7a9be410ef908bd0194b30240d49087ae76250e0ee_ppc64le",
"relates_to_product_reference": "Red Hat Quay 3.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-rhel8@sha256:4d0a86e557e93eb8e7d70d538f181c2d33176b3537fb8d9e3a1e76a16ee2eed5_s390x as a component of Red Hat Quay 3.12",
"product_id": "Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:4d0a86e557e93eb8e7d70d538f181c2d33176b3537fb8d9e3a1e76a16ee2eed5_s390x"
},
"product_reference": "registry.redhat.io/quay/quay-rhel8@sha256:4d0a86e557e93eb8e7d70d538f181c2d33176b3537fb8d9e3a1e76a16ee2eed5_s390x",
"relates_to_product_reference": "Red Hat Quay 3.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-rhel8@sha256:a40309477f7286b6c00381012eec8d3ececb557a4b8db38e5b4ea7f321a17c79_amd64 as a component of Red Hat Quay 3.12",
"product_id": "Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:a40309477f7286b6c00381012eec8d3ececb557a4b8db38e5b4ea7f321a17c79_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-rhel8@sha256:a40309477f7286b6c00381012eec8d3ececb557a4b8db38e5b4ea7f321a17c79_amd64",
"relates_to_product_reference": "Red Hat Quay 3.12"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-34156",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"discovery_date": "2024-09-06T21:20:09.377905+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:11091b652f65868606c3d4d3e30a04cea7396f06f119bcd0a4cf664db2aa790e_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:212ceac279067567409c47acf7792e0c4d1955395f045e3b717040321dc1b88f_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:451da4b858587adcef52b5f1c9b7c92985bd7cc7c90f651b9e38825b81b38fb0_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:c5cb9d3d0f970ad36005f2d376547e967e4a89574cca1cf8806bb92d05199d70_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:0a978bbe91e0e0b8bab6862522f8a0aa8e974b778cc36b83f0781081621c8e23_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8b3684c92affc7acadcd5dc8eb80e5727081c7ecf4cc6eeafe5ecc5ea60970bb_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8d474498354d438fc9deeceb3bc89649f35d4e382e930ee721059bfeaf0f8279_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:ad2119941c2e8db1691a9bfee085425c7203ab00c2cdf0a6441b1102109cfd21_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:cdf96fe7a1ad4c192b4313e804d40d5c656c3f0ced498bae2427e449f0b2df02_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0c7a94928e8ef89aebdd9b30a47aaf0fe4dfb3a716603362b5c7d52255c4e842_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:1f769259f2b91d47f4d4fbf92414903a62380a358737e7100a1166ccd8c89b85_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:a71b5493009863c4f1e9ae9393ff236dc262d84ee028482ee58840fbfe392c83_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bd796d2de4d02f63adc767aa22b9a388b3adea40c12b0d8f158ebffabed6fee9_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:00eb13b3cccf326292589a680a964160c58f83391d0036c4ebcb34fad32b6189_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:0ca5a583ca7ff0161ed35deeae94be78adc74100d0343b778f1edf5b77e90925_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:3facbc804376b505181c2f52f0c7a433111bcedcb5699a0fcdffd7e9a2bdfbbe_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:7a338bb18181535a2644bf70cae05042e1ef2af5a80e70a6cab6516e8f054896_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:53c387293b92691eb66ea73b1d29781cf275f01b4254c38e21620c0502987272_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-bundle@sha256:1c915a6f813564b9bf8062ea5c6a83097a8dd78a38fda0171fae9cc8d81299c7_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:37039569fe73c3975468ffb8640c42becdd9b5304fb5e54789bf59dc67c52c9b_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:4e2ef7cca978574e1715c24b9874c7a0a1a46a6319884a91fe54df06efe97df1_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:b2e2d245c7ba3d1528e73b59bad428f023eeb17a1983d61edcf6a22db58911cf_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:f960e1816f8babb590a55ccab9f2db1b567df749e73c70067269d32f6200bca6_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:30152d31da209c034ec39b52a32063437097eec9a4fac2eaf4a4110fea97cb70_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:38f094f62eed92d88eae0e7a9be410ef908bd0194b30240d49087ae76250e0ee_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:4d0a86e557e93eb8e7d70d538f181c2d33176b3537fb8d9e3a1e76a16ee2eed5_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:a40309477f7286b6c00381012eec8d3ececb557a4b8db38e5b4ea7f321a17c79_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2310528"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the encoding/gob package of the Golang standard library. Calling Decoder.Decoding, a message that contains deeply nested structures, can cause a panic due to stack exhaustion. This is a follow-up to CVE-2022-30635.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability in Go\u0027s `encoding/gob` package is of high severity because it exposes applications to potential Denial of Service (DoS) attacks through stack exhaustion. Since `gob` relies on recursive function calls to decode nested structures, an attacker could exploit this by sending crafted messages with excessively deep nesting, causing the application to panic due to stack overflow. This risk is particularly important in scenarios where untrusted or external input is processed, as it can lead to system unavailability or crashes, undermining the reliability and availability of services.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:1b0a31b5f6d1e1493974efb8c7ca5112e6e4d8f0b8e1de8e55b7b8c1184b2293_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:33d0912dbad0b1702fd91abf87e38910d2b983334062044c292a0cb1714187a0_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7814f04947e8e98d3c4870894e320b12c557976495bdf28a89b55bf061bacf79_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:b2a263d3cbf303d0dffb2c36ee2a4187c29902ce96ca1ded6f33b2edcc68fda9_arm64"
],
"known_not_affected": [
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:11091b652f65868606c3d4d3e30a04cea7396f06f119bcd0a4cf664db2aa790e_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:212ceac279067567409c47acf7792e0c4d1955395f045e3b717040321dc1b88f_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:451da4b858587adcef52b5f1c9b7c92985bd7cc7c90f651b9e38825b81b38fb0_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:c5cb9d3d0f970ad36005f2d376547e967e4a89574cca1cf8806bb92d05199d70_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:0a978bbe91e0e0b8bab6862522f8a0aa8e974b778cc36b83f0781081621c8e23_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8b3684c92affc7acadcd5dc8eb80e5727081c7ecf4cc6eeafe5ecc5ea60970bb_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8d474498354d438fc9deeceb3bc89649f35d4e382e930ee721059bfeaf0f8279_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:ad2119941c2e8db1691a9bfee085425c7203ab00c2cdf0a6441b1102109cfd21_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:cdf96fe7a1ad4c192b4313e804d40d5c656c3f0ced498bae2427e449f0b2df02_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0c7a94928e8ef89aebdd9b30a47aaf0fe4dfb3a716603362b5c7d52255c4e842_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:1f769259f2b91d47f4d4fbf92414903a62380a358737e7100a1166ccd8c89b85_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:a71b5493009863c4f1e9ae9393ff236dc262d84ee028482ee58840fbfe392c83_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bd796d2de4d02f63adc767aa22b9a388b3adea40c12b0d8f158ebffabed6fee9_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:00eb13b3cccf326292589a680a964160c58f83391d0036c4ebcb34fad32b6189_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:0ca5a583ca7ff0161ed35deeae94be78adc74100d0343b778f1edf5b77e90925_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:3facbc804376b505181c2f52f0c7a433111bcedcb5699a0fcdffd7e9a2bdfbbe_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:7a338bb18181535a2644bf70cae05042e1ef2af5a80e70a6cab6516e8f054896_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:53c387293b92691eb66ea73b1d29781cf275f01b4254c38e21620c0502987272_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-bundle@sha256:1c915a6f813564b9bf8062ea5c6a83097a8dd78a38fda0171fae9cc8d81299c7_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:37039569fe73c3975468ffb8640c42becdd9b5304fb5e54789bf59dc67c52c9b_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:4e2ef7cca978574e1715c24b9874c7a0a1a46a6319884a91fe54df06efe97df1_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:b2e2d245c7ba3d1528e73b59bad428f023eeb17a1983d61edcf6a22db58911cf_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:f960e1816f8babb590a55ccab9f2db1b567df749e73c70067269d32f6200bca6_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:30152d31da209c034ec39b52a32063437097eec9a4fac2eaf4a4110fea97cb70_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:38f094f62eed92d88eae0e7a9be410ef908bd0194b30240d49087ae76250e0ee_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:4d0a86e557e93eb8e7d70d538f181c2d33176b3537fb8d9e3a1e76a16ee2eed5_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:a40309477f7286b6c00381012eec8d3ececb557a4b8db38e5b4ea7f321a17c79_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-34156"
},
{
"category": "external",
"summary": "RHBZ#2310528",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2310528"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-34156",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34156"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-34156",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-34156"
},
{
"category": "external",
"summary": "https://go.dev/cl/611239",
"url": "https://go.dev/cl/611239"
},
{
"category": "external",
"summary": "https://go.dev/issue/69139",
"url": "https://go.dev/issue/69139"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-dev/c/S9POB9NCTdk",
"url": "https://groups.google.com/g/golang-dev/c/S9POB9NCTdk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2024-3106",
"url": "https://pkg.go.dev/vuln/GO-2024-3106"
}
],
"release_date": "2024-09-06T21:15:12.020000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-12-10T16:11:04+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:1b0a31b5f6d1e1493974efb8c7ca5112e6e4d8f0b8e1de8e55b7b8c1184b2293_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:33d0912dbad0b1702fd91abf87e38910d2b983334062044c292a0cb1714187a0_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7814f04947e8e98d3c4870894e320b12c557976495bdf28a89b55bf061bacf79_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:b2a263d3cbf303d0dffb2c36ee2a4187c29902ce96ca1ded6f33b2edcc68fda9_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:23060"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:11091b652f65868606c3d4d3e30a04cea7396f06f119bcd0a4cf664db2aa790e_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:212ceac279067567409c47acf7792e0c4d1955395f045e3b717040321dc1b88f_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:451da4b858587adcef52b5f1c9b7c92985bd7cc7c90f651b9e38825b81b38fb0_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:c5cb9d3d0f970ad36005f2d376547e967e4a89574cca1cf8806bb92d05199d70_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:0a978bbe91e0e0b8bab6862522f8a0aa8e974b778cc36b83f0781081621c8e23_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8b3684c92affc7acadcd5dc8eb80e5727081c7ecf4cc6eeafe5ecc5ea60970bb_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8d474498354d438fc9deeceb3bc89649f35d4e382e930ee721059bfeaf0f8279_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:ad2119941c2e8db1691a9bfee085425c7203ab00c2cdf0a6441b1102109cfd21_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:cdf96fe7a1ad4c192b4313e804d40d5c656c3f0ced498bae2427e449f0b2df02_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0c7a94928e8ef89aebdd9b30a47aaf0fe4dfb3a716603362b5c7d52255c4e842_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:1f769259f2b91d47f4d4fbf92414903a62380a358737e7100a1166ccd8c89b85_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:a71b5493009863c4f1e9ae9393ff236dc262d84ee028482ee58840fbfe392c83_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bd796d2de4d02f63adc767aa22b9a388b3adea40c12b0d8f158ebffabed6fee9_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:00eb13b3cccf326292589a680a964160c58f83391d0036c4ebcb34fad32b6189_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:0ca5a583ca7ff0161ed35deeae94be78adc74100d0343b778f1edf5b77e90925_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:3facbc804376b505181c2f52f0c7a433111bcedcb5699a0fcdffd7e9a2bdfbbe_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:7a338bb18181535a2644bf70cae05042e1ef2af5a80e70a6cab6516e8f054896_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:53c387293b92691eb66ea73b1d29781cf275f01b4254c38e21620c0502987272_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:1b0a31b5f6d1e1493974efb8c7ca5112e6e4d8f0b8e1de8e55b7b8c1184b2293_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:33d0912dbad0b1702fd91abf87e38910d2b983334062044c292a0cb1714187a0_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7814f04947e8e98d3c4870894e320b12c557976495bdf28a89b55bf061bacf79_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:b2a263d3cbf303d0dffb2c36ee2a4187c29902ce96ca1ded6f33b2edcc68fda9_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-bundle@sha256:1c915a6f813564b9bf8062ea5c6a83097a8dd78a38fda0171fae9cc8d81299c7_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:37039569fe73c3975468ffb8640c42becdd9b5304fb5e54789bf59dc67c52c9b_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:4e2ef7cca978574e1715c24b9874c7a0a1a46a6319884a91fe54df06efe97df1_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:b2e2d245c7ba3d1528e73b59bad428f023eeb17a1983d61edcf6a22db58911cf_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:f960e1816f8babb590a55ccab9f2db1b567df749e73c70067269d32f6200bca6_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:30152d31da209c034ec39b52a32063437097eec9a4fac2eaf4a4110fea97cb70_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:38f094f62eed92d88eae0e7a9be410ef908bd0194b30240d49087ae76250e0ee_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:4d0a86e557e93eb8e7d70d538f181c2d33176b3537fb8d9e3a1e76a16ee2eed5_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:a40309477f7286b6c00381012eec8d3ececb557a4b8db38e5b4ea7f321a17c79_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:11091b652f65868606c3d4d3e30a04cea7396f06f119bcd0a4cf664db2aa790e_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:212ceac279067567409c47acf7792e0c4d1955395f045e3b717040321dc1b88f_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:451da4b858587adcef52b5f1c9b7c92985bd7cc7c90f651b9e38825b81b38fb0_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:c5cb9d3d0f970ad36005f2d376547e967e4a89574cca1cf8806bb92d05199d70_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:0a978bbe91e0e0b8bab6862522f8a0aa8e974b778cc36b83f0781081621c8e23_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8b3684c92affc7acadcd5dc8eb80e5727081c7ecf4cc6eeafe5ecc5ea60970bb_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8d474498354d438fc9deeceb3bc89649f35d4e382e930ee721059bfeaf0f8279_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:ad2119941c2e8db1691a9bfee085425c7203ab00c2cdf0a6441b1102109cfd21_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:cdf96fe7a1ad4c192b4313e804d40d5c656c3f0ced498bae2427e449f0b2df02_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0c7a94928e8ef89aebdd9b30a47aaf0fe4dfb3a716603362b5c7d52255c4e842_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:1f769259f2b91d47f4d4fbf92414903a62380a358737e7100a1166ccd8c89b85_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:a71b5493009863c4f1e9ae9393ff236dc262d84ee028482ee58840fbfe392c83_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bd796d2de4d02f63adc767aa22b9a388b3adea40c12b0d8f158ebffabed6fee9_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:00eb13b3cccf326292589a680a964160c58f83391d0036c4ebcb34fad32b6189_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:0ca5a583ca7ff0161ed35deeae94be78adc74100d0343b778f1edf5b77e90925_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:3facbc804376b505181c2f52f0c7a433111bcedcb5699a0fcdffd7e9a2bdfbbe_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:7a338bb18181535a2644bf70cae05042e1ef2af5a80e70a6cab6516e8f054896_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:53c387293b92691eb66ea73b1d29781cf275f01b4254c38e21620c0502987272_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:1b0a31b5f6d1e1493974efb8c7ca5112e6e4d8f0b8e1de8e55b7b8c1184b2293_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:33d0912dbad0b1702fd91abf87e38910d2b983334062044c292a0cb1714187a0_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7814f04947e8e98d3c4870894e320b12c557976495bdf28a89b55bf061bacf79_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:b2a263d3cbf303d0dffb2c36ee2a4187c29902ce96ca1ded6f33b2edcc68fda9_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-bundle@sha256:1c915a6f813564b9bf8062ea5c6a83097a8dd78a38fda0171fae9cc8d81299c7_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:37039569fe73c3975468ffb8640c42becdd9b5304fb5e54789bf59dc67c52c9b_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:4e2ef7cca978574e1715c24b9874c7a0a1a46a6319884a91fe54df06efe97df1_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:b2e2d245c7ba3d1528e73b59bad428f023eeb17a1983d61edcf6a22db58911cf_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:f960e1816f8babb590a55ccab9f2db1b567df749e73c70067269d32f6200bca6_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:30152d31da209c034ec39b52a32063437097eec9a4fac2eaf4a4110fea97cb70_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:38f094f62eed92d88eae0e7a9be410ef908bd0194b30240d49087ae76250e0ee_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:4d0a86e557e93eb8e7d70d538f181c2d33176b3537fb8d9e3a1e76a16ee2eed5_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:a40309477f7286b6c00381012eec8d3ececb557a4b8db38e5b4ea7f321a17c79_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion"
},
{
"cve": "CVE-2025-47913",
"discovery_date": "2025-11-13T22:01:26.092452+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:11091b652f65868606c3d4d3e30a04cea7396f06f119bcd0a4cf664db2aa790e_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:212ceac279067567409c47acf7792e0c4d1955395f045e3b717040321dc1b88f_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:451da4b858587adcef52b5f1c9b7c92985bd7cc7c90f651b9e38825b81b38fb0_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:c5cb9d3d0f970ad36005f2d376547e967e4a89574cca1cf8806bb92d05199d70_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:0a978bbe91e0e0b8bab6862522f8a0aa8e974b778cc36b83f0781081621c8e23_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8b3684c92affc7acadcd5dc8eb80e5727081c7ecf4cc6eeafe5ecc5ea60970bb_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8d474498354d438fc9deeceb3bc89649f35d4e382e930ee721059bfeaf0f8279_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:ad2119941c2e8db1691a9bfee085425c7203ab00c2cdf0a6441b1102109cfd21_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:cdf96fe7a1ad4c192b4313e804d40d5c656c3f0ced498bae2427e449f0b2df02_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0c7a94928e8ef89aebdd9b30a47aaf0fe4dfb3a716603362b5c7d52255c4e842_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:1f769259f2b91d47f4d4fbf92414903a62380a358737e7100a1166ccd8c89b85_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:a71b5493009863c4f1e9ae9393ff236dc262d84ee028482ee58840fbfe392c83_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bd796d2de4d02f63adc767aa22b9a388b3adea40c12b0d8f158ebffabed6fee9_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:53c387293b92691eb66ea73b1d29781cf275f01b4254c38e21620c0502987272_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:1b0a31b5f6d1e1493974efb8c7ca5112e6e4d8f0b8e1de8e55b7b8c1184b2293_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:33d0912dbad0b1702fd91abf87e38910d2b983334062044c292a0cb1714187a0_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7814f04947e8e98d3c4870894e320b12c557976495bdf28a89b55bf061bacf79_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:b2a263d3cbf303d0dffb2c36ee2a4187c29902ce96ca1ded6f33b2edcc68fda9_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-bundle@sha256:1c915a6f813564b9bf8062ea5c6a83097a8dd78a38fda0171fae9cc8d81299c7_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:37039569fe73c3975468ffb8640c42becdd9b5304fb5e54789bf59dc67c52c9b_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:4e2ef7cca978574e1715c24b9874c7a0a1a46a6319884a91fe54df06efe97df1_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:b2e2d245c7ba3d1528e73b59bad428f023eeb17a1983d61edcf6a22db58911cf_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:f960e1816f8babb590a55ccab9f2db1b567df749e73c70067269d32f6200bca6_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:30152d31da209c034ec39b52a32063437097eec9a4fac2eaf4a4110fea97cb70_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:38f094f62eed92d88eae0e7a9be410ef908bd0194b30240d49087ae76250e0ee_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:4d0a86e557e93eb8e7d70d538f181c2d33176b3537fb8d9e3a1e76a16ee2eed5_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:a40309477f7286b6c00381012eec8d3ececb557a4b8db38e5b4ea7f321a17c79_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2414943"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in golang.org/x/crypto/ssh/agent causes the SSH agent client to panic when a peer responds with the generic SSH_AGENT_SUCCESS (0x06) message to requests expecting typed replies (e.g., List, Sign). The unmarshal layer produces an unexpected message type, which the client code does not handle, leading to panic(\"unreachable\") or a nil-pointer dereference. A malicious agent or forwarded connection can exploit this to terminate the client process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang.org/x/crypto/ssh/agent: golang.org/x/crypto/ssh/agent: SSH client panic due to unexpected SSH_AGENT_SUCCESS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability was marked as Important because it allows any malicious or misbehaving SSH agent to force a crash in the client process using a single valid protocol byte. The panic occurs before the client has a chance to validate message structure or recover, which means an attacker controlling\u2014or intercepting\u2014SSH agent traffic can reliably terminate processes that rely on agent interactions. In environments where SSH agents operate over forwarded sockets, shared workspaces, or CI/CD runners, this turns into a reliable, unauthenticated remote denial of service against critical automation or developer tooling. The flaw also stems from unsafe assumptions in the unmarshalling logic, where unexpected but protocol-legal message types drop into \u201cunreachable\u201d code paths instead of being handled gracefully\u2014making it a design-level reliability break rather than a simple error-handling bug. For this reason, it is rated as an important availability-impacting vulnerability rather than a moderate issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:00eb13b3cccf326292589a680a964160c58f83391d0036c4ebcb34fad32b6189_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:0ca5a583ca7ff0161ed35deeae94be78adc74100d0343b778f1edf5b77e90925_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:3facbc804376b505181c2f52f0c7a433111bcedcb5699a0fcdffd7e9a2bdfbbe_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:7a338bb18181535a2644bf70cae05042e1ef2af5a80e70a6cab6516e8f054896_amd64"
],
"known_not_affected": [
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:11091b652f65868606c3d4d3e30a04cea7396f06f119bcd0a4cf664db2aa790e_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:212ceac279067567409c47acf7792e0c4d1955395f045e3b717040321dc1b88f_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:451da4b858587adcef52b5f1c9b7c92985bd7cc7c90f651b9e38825b81b38fb0_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:c5cb9d3d0f970ad36005f2d376547e967e4a89574cca1cf8806bb92d05199d70_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:0a978bbe91e0e0b8bab6862522f8a0aa8e974b778cc36b83f0781081621c8e23_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8b3684c92affc7acadcd5dc8eb80e5727081c7ecf4cc6eeafe5ecc5ea60970bb_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8d474498354d438fc9deeceb3bc89649f35d4e382e930ee721059bfeaf0f8279_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:ad2119941c2e8db1691a9bfee085425c7203ab00c2cdf0a6441b1102109cfd21_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:cdf96fe7a1ad4c192b4313e804d40d5c656c3f0ced498bae2427e449f0b2df02_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0c7a94928e8ef89aebdd9b30a47aaf0fe4dfb3a716603362b5c7d52255c4e842_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:1f769259f2b91d47f4d4fbf92414903a62380a358737e7100a1166ccd8c89b85_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:a71b5493009863c4f1e9ae9393ff236dc262d84ee028482ee58840fbfe392c83_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bd796d2de4d02f63adc767aa22b9a388b3adea40c12b0d8f158ebffabed6fee9_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:53c387293b92691eb66ea73b1d29781cf275f01b4254c38e21620c0502987272_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:1b0a31b5f6d1e1493974efb8c7ca5112e6e4d8f0b8e1de8e55b7b8c1184b2293_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:33d0912dbad0b1702fd91abf87e38910d2b983334062044c292a0cb1714187a0_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7814f04947e8e98d3c4870894e320b12c557976495bdf28a89b55bf061bacf79_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:b2a263d3cbf303d0dffb2c36ee2a4187c29902ce96ca1ded6f33b2edcc68fda9_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-bundle@sha256:1c915a6f813564b9bf8062ea5c6a83097a8dd78a38fda0171fae9cc8d81299c7_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:37039569fe73c3975468ffb8640c42becdd9b5304fb5e54789bf59dc67c52c9b_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:4e2ef7cca978574e1715c24b9874c7a0a1a46a6319884a91fe54df06efe97df1_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:b2e2d245c7ba3d1528e73b59bad428f023eeb17a1983d61edcf6a22db58911cf_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:f960e1816f8babb590a55ccab9f2db1b567df749e73c70067269d32f6200bca6_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:30152d31da209c034ec39b52a32063437097eec9a4fac2eaf4a4110fea97cb70_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:38f094f62eed92d88eae0e7a9be410ef908bd0194b30240d49087ae76250e0ee_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:4d0a86e557e93eb8e7d70d538f181c2d33176b3537fb8d9e3a1e76a16ee2eed5_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:a40309477f7286b6c00381012eec8d3ececb557a4b8db38e5b4ea7f321a17c79_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-47913"
},
{
"category": "external",
"summary": "RHBZ#2414943",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2414943"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-47913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47913"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-47913",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47913"
},
{
"category": "external",
"summary": "https://github.com/advisories/GHSA-hcg3-q754-cr77",
"url": "https://github.com/advisories/GHSA-hcg3-q754-cr77"
},
{
"category": "external",
"summary": "https://go.dev/cl/700295",
"url": "https://go.dev/cl/700295"
},
{
"category": "external",
"summary": "https://go.dev/issue/75178",
"url": "https://go.dev/issue/75178"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4116",
"url": "https://pkg.go.dev/vuln/GO-2025-4116"
}
],
"release_date": "2025-11-13T21:29:39.907000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-12-10T16:11:04+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:00eb13b3cccf326292589a680a964160c58f83391d0036c4ebcb34fad32b6189_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:0ca5a583ca7ff0161ed35deeae94be78adc74100d0343b778f1edf5b77e90925_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:3facbc804376b505181c2f52f0c7a433111bcedcb5699a0fcdffd7e9a2bdfbbe_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:7a338bb18181535a2644bf70cae05042e1ef2af5a80e70a6cab6516e8f054896_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:23060"
},
{
"category": "workaround",
"details": "No mitigation is currently available that meets Red Hat Product Security\u2019s standards for usability, deployment, applicability, or stability.",
"product_ids": [
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:11091b652f65868606c3d4d3e30a04cea7396f06f119bcd0a4cf664db2aa790e_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:212ceac279067567409c47acf7792e0c4d1955395f045e3b717040321dc1b88f_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:451da4b858587adcef52b5f1c9b7c92985bd7cc7c90f651b9e38825b81b38fb0_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:c5cb9d3d0f970ad36005f2d376547e967e4a89574cca1cf8806bb92d05199d70_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:0a978bbe91e0e0b8bab6862522f8a0aa8e974b778cc36b83f0781081621c8e23_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8b3684c92affc7acadcd5dc8eb80e5727081c7ecf4cc6eeafe5ecc5ea60970bb_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8d474498354d438fc9deeceb3bc89649f35d4e382e930ee721059bfeaf0f8279_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:ad2119941c2e8db1691a9bfee085425c7203ab00c2cdf0a6441b1102109cfd21_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:cdf96fe7a1ad4c192b4313e804d40d5c656c3f0ced498bae2427e449f0b2df02_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0c7a94928e8ef89aebdd9b30a47aaf0fe4dfb3a716603362b5c7d52255c4e842_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:1f769259f2b91d47f4d4fbf92414903a62380a358737e7100a1166ccd8c89b85_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:a71b5493009863c4f1e9ae9393ff236dc262d84ee028482ee58840fbfe392c83_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bd796d2de4d02f63adc767aa22b9a388b3adea40c12b0d8f158ebffabed6fee9_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:00eb13b3cccf326292589a680a964160c58f83391d0036c4ebcb34fad32b6189_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:0ca5a583ca7ff0161ed35deeae94be78adc74100d0343b778f1edf5b77e90925_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:3facbc804376b505181c2f52f0c7a433111bcedcb5699a0fcdffd7e9a2bdfbbe_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:7a338bb18181535a2644bf70cae05042e1ef2af5a80e70a6cab6516e8f054896_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:53c387293b92691eb66ea73b1d29781cf275f01b4254c38e21620c0502987272_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:1b0a31b5f6d1e1493974efb8c7ca5112e6e4d8f0b8e1de8e55b7b8c1184b2293_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:33d0912dbad0b1702fd91abf87e38910d2b983334062044c292a0cb1714187a0_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7814f04947e8e98d3c4870894e320b12c557976495bdf28a89b55bf061bacf79_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:b2a263d3cbf303d0dffb2c36ee2a4187c29902ce96ca1ded6f33b2edcc68fda9_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-bundle@sha256:1c915a6f813564b9bf8062ea5c6a83097a8dd78a38fda0171fae9cc8d81299c7_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:37039569fe73c3975468ffb8640c42becdd9b5304fb5e54789bf59dc67c52c9b_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:4e2ef7cca978574e1715c24b9874c7a0a1a46a6319884a91fe54df06efe97df1_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:b2e2d245c7ba3d1528e73b59bad428f023eeb17a1983d61edcf6a22db58911cf_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:f960e1816f8babb590a55ccab9f2db1b567df749e73c70067269d32f6200bca6_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:30152d31da209c034ec39b52a32063437097eec9a4fac2eaf4a4110fea97cb70_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:38f094f62eed92d88eae0e7a9be410ef908bd0194b30240d49087ae76250e0ee_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:4d0a86e557e93eb8e7d70d538f181c2d33176b3537fb8d9e3a1e76a16ee2eed5_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:a40309477f7286b6c00381012eec8d3ececb557a4b8db38e5b4ea7f321a17c79_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:11091b652f65868606c3d4d3e30a04cea7396f06f119bcd0a4cf664db2aa790e_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:212ceac279067567409c47acf7792e0c4d1955395f045e3b717040321dc1b88f_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:451da4b858587adcef52b5f1c9b7c92985bd7cc7c90f651b9e38825b81b38fb0_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:c5cb9d3d0f970ad36005f2d376547e967e4a89574cca1cf8806bb92d05199d70_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:0a978bbe91e0e0b8bab6862522f8a0aa8e974b778cc36b83f0781081621c8e23_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8b3684c92affc7acadcd5dc8eb80e5727081c7ecf4cc6eeafe5ecc5ea60970bb_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8d474498354d438fc9deeceb3bc89649f35d4e382e930ee721059bfeaf0f8279_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:ad2119941c2e8db1691a9bfee085425c7203ab00c2cdf0a6441b1102109cfd21_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:cdf96fe7a1ad4c192b4313e804d40d5c656c3f0ced498bae2427e449f0b2df02_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0c7a94928e8ef89aebdd9b30a47aaf0fe4dfb3a716603362b5c7d52255c4e842_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:1f769259f2b91d47f4d4fbf92414903a62380a358737e7100a1166ccd8c89b85_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:a71b5493009863c4f1e9ae9393ff236dc262d84ee028482ee58840fbfe392c83_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bd796d2de4d02f63adc767aa22b9a388b3adea40c12b0d8f158ebffabed6fee9_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:00eb13b3cccf326292589a680a964160c58f83391d0036c4ebcb34fad32b6189_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:0ca5a583ca7ff0161ed35deeae94be78adc74100d0343b778f1edf5b77e90925_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:3facbc804376b505181c2f52f0c7a433111bcedcb5699a0fcdffd7e9a2bdfbbe_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:7a338bb18181535a2644bf70cae05042e1ef2af5a80e70a6cab6516e8f054896_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:53c387293b92691eb66ea73b1d29781cf275f01b4254c38e21620c0502987272_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:1b0a31b5f6d1e1493974efb8c7ca5112e6e4d8f0b8e1de8e55b7b8c1184b2293_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:33d0912dbad0b1702fd91abf87e38910d2b983334062044c292a0cb1714187a0_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7814f04947e8e98d3c4870894e320b12c557976495bdf28a89b55bf061bacf79_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:b2a263d3cbf303d0dffb2c36ee2a4187c29902ce96ca1ded6f33b2edcc68fda9_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-bundle@sha256:1c915a6f813564b9bf8062ea5c6a83097a8dd78a38fda0171fae9cc8d81299c7_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:37039569fe73c3975468ffb8640c42becdd9b5304fb5e54789bf59dc67c52c9b_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:4e2ef7cca978574e1715c24b9874c7a0a1a46a6319884a91fe54df06efe97df1_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:b2e2d245c7ba3d1528e73b59bad428f023eeb17a1983d61edcf6a22db58911cf_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:f960e1816f8babb590a55ccab9f2db1b567df749e73c70067269d32f6200bca6_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:30152d31da209c034ec39b52a32063437097eec9a4fac2eaf4a4110fea97cb70_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:38f094f62eed92d88eae0e7a9be410ef908bd0194b30240d49087ae76250e0ee_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:4d0a86e557e93eb8e7d70d538f181c2d33176b3537fb8d9e3a1e76a16ee2eed5_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:a40309477f7286b6c00381012eec8d3ececb557a4b8db38e5b4ea7f321a17c79_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang.org/x/crypto/ssh/agent: golang.org/x/crypto/ssh/agent: SSH client panic due to unexpected SSH_AGENT_SUCCESS"
},
{
"cve": "CVE-2025-59420",
"cwe": {
"id": "CWE-440",
"name": "Expected Behavior Violation"
},
"discovery_date": "2025-09-22T18:01:35.379361+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:11091b652f65868606c3d4d3e30a04cea7396f06f119bcd0a4cf664db2aa790e_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:212ceac279067567409c47acf7792e0c4d1955395f045e3b717040321dc1b88f_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:451da4b858587adcef52b5f1c9b7c92985bd7cc7c90f651b9e38825b81b38fb0_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:c5cb9d3d0f970ad36005f2d376547e967e4a89574cca1cf8806bb92d05199d70_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:0a978bbe91e0e0b8bab6862522f8a0aa8e974b778cc36b83f0781081621c8e23_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8b3684c92affc7acadcd5dc8eb80e5727081c7ecf4cc6eeafe5ecc5ea60970bb_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8d474498354d438fc9deeceb3bc89649f35d4e382e930ee721059bfeaf0f8279_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:ad2119941c2e8db1691a9bfee085425c7203ab00c2cdf0a6441b1102109cfd21_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:cdf96fe7a1ad4c192b4313e804d40d5c656c3f0ced498bae2427e449f0b2df02_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0c7a94928e8ef89aebdd9b30a47aaf0fe4dfb3a716603362b5c7d52255c4e842_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:1f769259f2b91d47f4d4fbf92414903a62380a358737e7100a1166ccd8c89b85_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:a71b5493009863c4f1e9ae9393ff236dc262d84ee028482ee58840fbfe392c83_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bd796d2de4d02f63adc767aa22b9a388b3adea40c12b0d8f158ebffabed6fee9_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:00eb13b3cccf326292589a680a964160c58f83391d0036c4ebcb34fad32b6189_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:0ca5a583ca7ff0161ed35deeae94be78adc74100d0343b778f1edf5b77e90925_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:3facbc804376b505181c2f52f0c7a433111bcedcb5699a0fcdffd7e9a2bdfbbe_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:7a338bb18181535a2644bf70cae05042e1ef2af5a80e70a6cab6516e8f054896_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:53c387293b92691eb66ea73b1d29781cf275f01b4254c38e21620c0502987272_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:1b0a31b5f6d1e1493974efb8c7ca5112e6e4d8f0b8e1de8e55b7b8c1184b2293_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:33d0912dbad0b1702fd91abf87e38910d2b983334062044c292a0cb1714187a0_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7814f04947e8e98d3c4870894e320b12c557976495bdf28a89b55bf061bacf79_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:b2a263d3cbf303d0dffb2c36ee2a4187c29902ce96ca1ded6f33b2edcc68fda9_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-bundle@sha256:1c915a6f813564b9bf8062ea5c6a83097a8dd78a38fda0171fae9cc8d81299c7_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:37039569fe73c3975468ffb8640c42becdd9b5304fb5e54789bf59dc67c52c9b_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:4e2ef7cca978574e1715c24b9874c7a0a1a46a6319884a91fe54df06efe97df1_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:b2e2d245c7ba3d1528e73b59bad428f023eeb17a1983d61edcf6a22db58911cf_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:f960e1816f8babb590a55ccab9f2db1b567df749e73c70067269d32f6200bca6_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2397460"
}
],
"notes": [
{
"category": "description",
"text": "Authlib\u2019s JWS verification accepts tokens that declare unknown critical header parameters (crit), violating RFC 7515 \u201cmust\u2011understand\u201d semantics. An attacker can craft a signed token with a critical header (for example, bork or cnf) that strict verifiers reject but Authlib accepts. In mixed\u2011language fleets, this enables split\u2011brain verification and can lead to policy bypass, replay, or privilege escalation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "authlib: Authlib RFC violation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:30152d31da209c034ec39b52a32063437097eec9a4fac2eaf4a4110fea97cb70_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:38f094f62eed92d88eae0e7a9be410ef908bd0194b30240d49087ae76250e0ee_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:4d0a86e557e93eb8e7d70d538f181c2d33176b3537fb8d9e3a1e76a16ee2eed5_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:a40309477f7286b6c00381012eec8d3ececb557a4b8db38e5b4ea7f321a17c79_amd64"
],
"known_not_affected": [
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:11091b652f65868606c3d4d3e30a04cea7396f06f119bcd0a4cf664db2aa790e_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:212ceac279067567409c47acf7792e0c4d1955395f045e3b717040321dc1b88f_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:451da4b858587adcef52b5f1c9b7c92985bd7cc7c90f651b9e38825b81b38fb0_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:c5cb9d3d0f970ad36005f2d376547e967e4a89574cca1cf8806bb92d05199d70_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:0a978bbe91e0e0b8bab6862522f8a0aa8e974b778cc36b83f0781081621c8e23_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8b3684c92affc7acadcd5dc8eb80e5727081c7ecf4cc6eeafe5ecc5ea60970bb_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8d474498354d438fc9deeceb3bc89649f35d4e382e930ee721059bfeaf0f8279_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:ad2119941c2e8db1691a9bfee085425c7203ab00c2cdf0a6441b1102109cfd21_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:cdf96fe7a1ad4c192b4313e804d40d5c656c3f0ced498bae2427e449f0b2df02_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0c7a94928e8ef89aebdd9b30a47aaf0fe4dfb3a716603362b5c7d52255c4e842_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:1f769259f2b91d47f4d4fbf92414903a62380a358737e7100a1166ccd8c89b85_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:a71b5493009863c4f1e9ae9393ff236dc262d84ee028482ee58840fbfe392c83_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bd796d2de4d02f63adc767aa22b9a388b3adea40c12b0d8f158ebffabed6fee9_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:00eb13b3cccf326292589a680a964160c58f83391d0036c4ebcb34fad32b6189_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:0ca5a583ca7ff0161ed35deeae94be78adc74100d0343b778f1edf5b77e90925_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:3facbc804376b505181c2f52f0c7a433111bcedcb5699a0fcdffd7e9a2bdfbbe_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:7a338bb18181535a2644bf70cae05042e1ef2af5a80e70a6cab6516e8f054896_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:53c387293b92691eb66ea73b1d29781cf275f01b4254c38e21620c0502987272_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:1b0a31b5f6d1e1493974efb8c7ca5112e6e4d8f0b8e1de8e55b7b8c1184b2293_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:33d0912dbad0b1702fd91abf87e38910d2b983334062044c292a0cb1714187a0_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7814f04947e8e98d3c4870894e320b12c557976495bdf28a89b55bf061bacf79_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:b2a263d3cbf303d0dffb2c36ee2a4187c29902ce96ca1ded6f33b2edcc68fda9_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-bundle@sha256:1c915a6f813564b9bf8062ea5c6a83097a8dd78a38fda0171fae9cc8d81299c7_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:37039569fe73c3975468ffb8640c42becdd9b5304fb5e54789bf59dc67c52c9b_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:4e2ef7cca978574e1715c24b9874c7a0a1a46a6319884a91fe54df06efe97df1_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:b2e2d245c7ba3d1528e73b59bad428f023eeb17a1983d61edcf6a22db58911cf_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:f960e1816f8babb590a55ccab9f2db1b567df749e73c70067269d32f6200bca6_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-59420"
},
{
"category": "external",
"summary": "RHBZ#2397460",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2397460"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-59420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59420"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-59420",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-59420"
},
{
"category": "external",
"summary": "https://github.com/authlib/authlib/commit/6b1813e4392eb7c168c276099ff7783b176479df",
"url": "https://github.com/authlib/authlib/commit/6b1813e4392eb7c168c276099ff7783b176479df"
},
{
"category": "external",
"summary": "https://github.com/authlib/authlib/security/advisories/GHSA-9ggr-2464-2j32",
"url": "https://github.com/authlib/authlib/security/advisories/GHSA-9ggr-2464-2j32"
}
],
"release_date": "2025-09-22T17:28:53.869000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-12-10T16:11:04+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:30152d31da209c034ec39b52a32063437097eec9a4fac2eaf4a4110fea97cb70_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:38f094f62eed92d88eae0e7a9be410ef908bd0194b30240d49087ae76250e0ee_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:4d0a86e557e93eb8e7d70d538f181c2d33176b3537fb8d9e3a1e76a16ee2eed5_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:a40309477f7286b6c00381012eec8d3ececb557a4b8db38e5b4ea7f321a17c79_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:23060"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:11091b652f65868606c3d4d3e30a04cea7396f06f119bcd0a4cf664db2aa790e_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:212ceac279067567409c47acf7792e0c4d1955395f045e3b717040321dc1b88f_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:451da4b858587adcef52b5f1c9b7c92985bd7cc7c90f651b9e38825b81b38fb0_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:c5cb9d3d0f970ad36005f2d376547e967e4a89574cca1cf8806bb92d05199d70_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:0a978bbe91e0e0b8bab6862522f8a0aa8e974b778cc36b83f0781081621c8e23_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8b3684c92affc7acadcd5dc8eb80e5727081c7ecf4cc6eeafe5ecc5ea60970bb_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8d474498354d438fc9deeceb3bc89649f35d4e382e930ee721059bfeaf0f8279_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:ad2119941c2e8db1691a9bfee085425c7203ab00c2cdf0a6441b1102109cfd21_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:cdf96fe7a1ad4c192b4313e804d40d5c656c3f0ced498bae2427e449f0b2df02_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0c7a94928e8ef89aebdd9b30a47aaf0fe4dfb3a716603362b5c7d52255c4e842_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:1f769259f2b91d47f4d4fbf92414903a62380a358737e7100a1166ccd8c89b85_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:a71b5493009863c4f1e9ae9393ff236dc262d84ee028482ee58840fbfe392c83_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bd796d2de4d02f63adc767aa22b9a388b3adea40c12b0d8f158ebffabed6fee9_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:00eb13b3cccf326292589a680a964160c58f83391d0036c4ebcb34fad32b6189_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:0ca5a583ca7ff0161ed35deeae94be78adc74100d0343b778f1edf5b77e90925_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:3facbc804376b505181c2f52f0c7a433111bcedcb5699a0fcdffd7e9a2bdfbbe_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:7a338bb18181535a2644bf70cae05042e1ef2af5a80e70a6cab6516e8f054896_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:53c387293b92691eb66ea73b1d29781cf275f01b4254c38e21620c0502987272_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:1b0a31b5f6d1e1493974efb8c7ca5112e6e4d8f0b8e1de8e55b7b8c1184b2293_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:33d0912dbad0b1702fd91abf87e38910d2b983334062044c292a0cb1714187a0_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7814f04947e8e98d3c4870894e320b12c557976495bdf28a89b55bf061bacf79_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:b2a263d3cbf303d0dffb2c36ee2a4187c29902ce96ca1ded6f33b2edcc68fda9_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-bundle@sha256:1c915a6f813564b9bf8062ea5c6a83097a8dd78a38fda0171fae9cc8d81299c7_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:37039569fe73c3975468ffb8640c42becdd9b5304fb5e54789bf59dc67c52c9b_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:4e2ef7cca978574e1715c24b9874c7a0a1a46a6319884a91fe54df06efe97df1_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:b2e2d245c7ba3d1528e73b59bad428f023eeb17a1983d61edcf6a22db58911cf_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:f960e1816f8babb590a55ccab9f2db1b567df749e73c70067269d32f6200bca6_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:30152d31da209c034ec39b52a32063437097eec9a4fac2eaf4a4110fea97cb70_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:38f094f62eed92d88eae0e7a9be410ef908bd0194b30240d49087ae76250e0ee_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:4d0a86e557e93eb8e7d70d538f181c2d33176b3537fb8d9e3a1e76a16ee2eed5_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:a40309477f7286b6c00381012eec8d3ececb557a4b8db38e5b4ea7f321a17c79_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:11091b652f65868606c3d4d3e30a04cea7396f06f119bcd0a4cf664db2aa790e_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:212ceac279067567409c47acf7792e0c4d1955395f045e3b717040321dc1b88f_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:451da4b858587adcef52b5f1c9b7c92985bd7cc7c90f651b9e38825b81b38fb0_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:c5cb9d3d0f970ad36005f2d376547e967e4a89574cca1cf8806bb92d05199d70_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:0a978bbe91e0e0b8bab6862522f8a0aa8e974b778cc36b83f0781081621c8e23_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8b3684c92affc7acadcd5dc8eb80e5727081c7ecf4cc6eeafe5ecc5ea60970bb_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8d474498354d438fc9deeceb3bc89649f35d4e382e930ee721059bfeaf0f8279_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:ad2119941c2e8db1691a9bfee085425c7203ab00c2cdf0a6441b1102109cfd21_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:cdf96fe7a1ad4c192b4313e804d40d5c656c3f0ced498bae2427e449f0b2df02_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0c7a94928e8ef89aebdd9b30a47aaf0fe4dfb3a716603362b5c7d52255c4e842_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:1f769259f2b91d47f4d4fbf92414903a62380a358737e7100a1166ccd8c89b85_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:a71b5493009863c4f1e9ae9393ff236dc262d84ee028482ee58840fbfe392c83_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bd796d2de4d02f63adc767aa22b9a388b3adea40c12b0d8f158ebffabed6fee9_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:00eb13b3cccf326292589a680a964160c58f83391d0036c4ebcb34fad32b6189_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:0ca5a583ca7ff0161ed35deeae94be78adc74100d0343b778f1edf5b77e90925_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:3facbc804376b505181c2f52f0c7a433111bcedcb5699a0fcdffd7e9a2bdfbbe_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:7a338bb18181535a2644bf70cae05042e1ef2af5a80e70a6cab6516e8f054896_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:53c387293b92691eb66ea73b1d29781cf275f01b4254c38e21620c0502987272_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:1b0a31b5f6d1e1493974efb8c7ca5112e6e4d8f0b8e1de8e55b7b8c1184b2293_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:33d0912dbad0b1702fd91abf87e38910d2b983334062044c292a0cb1714187a0_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7814f04947e8e98d3c4870894e320b12c557976495bdf28a89b55bf061bacf79_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:b2a263d3cbf303d0dffb2c36ee2a4187c29902ce96ca1ded6f33b2edcc68fda9_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-bundle@sha256:1c915a6f813564b9bf8062ea5c6a83097a8dd78a38fda0171fae9cc8d81299c7_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:37039569fe73c3975468ffb8640c42becdd9b5304fb5e54789bf59dc67c52c9b_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:4e2ef7cca978574e1715c24b9874c7a0a1a46a6319884a91fe54df06efe97df1_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:b2e2d245c7ba3d1528e73b59bad428f023eeb17a1983d61edcf6a22db58911cf_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:f960e1816f8babb590a55ccab9f2db1b567df749e73c70067269d32f6200bca6_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:30152d31da209c034ec39b52a32063437097eec9a4fac2eaf4a4110fea97cb70_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:38f094f62eed92d88eae0e7a9be410ef908bd0194b30240d49087ae76250e0ee_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:4d0a86e557e93eb8e7d70d538f181c2d33176b3537fb8d9e3a1e76a16ee2eed5_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:a40309477f7286b6c00381012eec8d3ececb557a4b8db38e5b4ea7f321a17c79_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "authlib: Authlib RFC violation"
},
{
"cve": "CVE-2025-61920",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2025-10-10T20:01:12.833962+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:11091b652f65868606c3d4d3e30a04cea7396f06f119bcd0a4cf664db2aa790e_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:212ceac279067567409c47acf7792e0c4d1955395f045e3b717040321dc1b88f_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:451da4b858587adcef52b5f1c9b7c92985bd7cc7c90f651b9e38825b81b38fb0_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:c5cb9d3d0f970ad36005f2d376547e967e4a89574cca1cf8806bb92d05199d70_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:0a978bbe91e0e0b8bab6862522f8a0aa8e974b778cc36b83f0781081621c8e23_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8b3684c92affc7acadcd5dc8eb80e5727081c7ecf4cc6eeafe5ecc5ea60970bb_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8d474498354d438fc9deeceb3bc89649f35d4e382e930ee721059bfeaf0f8279_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:ad2119941c2e8db1691a9bfee085425c7203ab00c2cdf0a6441b1102109cfd21_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:cdf96fe7a1ad4c192b4313e804d40d5c656c3f0ced498bae2427e449f0b2df02_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0c7a94928e8ef89aebdd9b30a47aaf0fe4dfb3a716603362b5c7d52255c4e842_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:1f769259f2b91d47f4d4fbf92414903a62380a358737e7100a1166ccd8c89b85_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:a71b5493009863c4f1e9ae9393ff236dc262d84ee028482ee58840fbfe392c83_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bd796d2de4d02f63adc767aa22b9a388b3adea40c12b0d8f158ebffabed6fee9_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:00eb13b3cccf326292589a680a964160c58f83391d0036c4ebcb34fad32b6189_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:0ca5a583ca7ff0161ed35deeae94be78adc74100d0343b778f1edf5b77e90925_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:3facbc804376b505181c2f52f0c7a433111bcedcb5699a0fcdffd7e9a2bdfbbe_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:7a338bb18181535a2644bf70cae05042e1ef2af5a80e70a6cab6516e8f054896_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:53c387293b92691eb66ea73b1d29781cf275f01b4254c38e21620c0502987272_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:1b0a31b5f6d1e1493974efb8c7ca5112e6e4d8f0b8e1de8e55b7b8c1184b2293_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:33d0912dbad0b1702fd91abf87e38910d2b983334062044c292a0cb1714187a0_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7814f04947e8e98d3c4870894e320b12c557976495bdf28a89b55bf061bacf79_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:b2a263d3cbf303d0dffb2c36ee2a4187c29902ce96ca1ded6f33b2edcc68fda9_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-bundle@sha256:1c915a6f813564b9bf8062ea5c6a83097a8dd78a38fda0171fae9cc8d81299c7_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:37039569fe73c3975468ffb8640c42becdd9b5304fb5e54789bf59dc67c52c9b_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:4e2ef7cca978574e1715c24b9874c7a0a1a46a6319884a91fe54df06efe97df1_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:b2e2d245c7ba3d1528e73b59bad428f023eeb17a1983d61edcf6a22db58911cf_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:f960e1816f8babb590a55ccab9f2db1b567df749e73c70067269d32f6200bca6_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2403179"
}
],
"notes": [
{
"category": "description",
"text": "A denial of service flaw has been discovered in the python Authlib package. Authlib\u2019s JOSE implementation accepts unbounded JWS/JWT header and signature segments. A remote attacker can craft a token whose base64url\u2011encoded header or signature spans hundreds of megabytes. During verification, Authlib decodes and parses the full input before it is rejected, driving CPU and memory consumption to hostile levels and enabling denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "authlib: Authlib Denial of Service",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:30152d31da209c034ec39b52a32063437097eec9a4fac2eaf4a4110fea97cb70_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:38f094f62eed92d88eae0e7a9be410ef908bd0194b30240d49087ae76250e0ee_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:4d0a86e557e93eb8e7d70d538f181c2d33176b3537fb8d9e3a1e76a16ee2eed5_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:a40309477f7286b6c00381012eec8d3ececb557a4b8db38e5b4ea7f321a17c79_amd64"
],
"known_not_affected": [
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:11091b652f65868606c3d4d3e30a04cea7396f06f119bcd0a4cf664db2aa790e_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:212ceac279067567409c47acf7792e0c4d1955395f045e3b717040321dc1b88f_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:451da4b858587adcef52b5f1c9b7c92985bd7cc7c90f651b9e38825b81b38fb0_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:c5cb9d3d0f970ad36005f2d376547e967e4a89574cca1cf8806bb92d05199d70_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:0a978bbe91e0e0b8bab6862522f8a0aa8e974b778cc36b83f0781081621c8e23_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8b3684c92affc7acadcd5dc8eb80e5727081c7ecf4cc6eeafe5ecc5ea60970bb_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8d474498354d438fc9deeceb3bc89649f35d4e382e930ee721059bfeaf0f8279_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:ad2119941c2e8db1691a9bfee085425c7203ab00c2cdf0a6441b1102109cfd21_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:cdf96fe7a1ad4c192b4313e804d40d5c656c3f0ced498bae2427e449f0b2df02_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0c7a94928e8ef89aebdd9b30a47aaf0fe4dfb3a716603362b5c7d52255c4e842_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:1f769259f2b91d47f4d4fbf92414903a62380a358737e7100a1166ccd8c89b85_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:a71b5493009863c4f1e9ae9393ff236dc262d84ee028482ee58840fbfe392c83_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bd796d2de4d02f63adc767aa22b9a388b3adea40c12b0d8f158ebffabed6fee9_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:00eb13b3cccf326292589a680a964160c58f83391d0036c4ebcb34fad32b6189_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:0ca5a583ca7ff0161ed35deeae94be78adc74100d0343b778f1edf5b77e90925_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:3facbc804376b505181c2f52f0c7a433111bcedcb5699a0fcdffd7e9a2bdfbbe_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:7a338bb18181535a2644bf70cae05042e1ef2af5a80e70a6cab6516e8f054896_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:53c387293b92691eb66ea73b1d29781cf275f01b4254c38e21620c0502987272_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:1b0a31b5f6d1e1493974efb8c7ca5112e6e4d8f0b8e1de8e55b7b8c1184b2293_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:33d0912dbad0b1702fd91abf87e38910d2b983334062044c292a0cb1714187a0_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7814f04947e8e98d3c4870894e320b12c557976495bdf28a89b55bf061bacf79_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:b2a263d3cbf303d0dffb2c36ee2a4187c29902ce96ca1ded6f33b2edcc68fda9_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-bundle@sha256:1c915a6f813564b9bf8062ea5c6a83097a8dd78a38fda0171fae9cc8d81299c7_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:37039569fe73c3975468ffb8640c42becdd9b5304fb5e54789bf59dc67c52c9b_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:4e2ef7cca978574e1715c24b9874c7a0a1a46a6319884a91fe54df06efe97df1_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:b2e2d245c7ba3d1528e73b59bad428f023eeb17a1983d61edcf6a22db58911cf_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:f960e1816f8babb590a55ccab9f2db1b567df749e73c70067269d32f6200bca6_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61920"
},
{
"category": "external",
"summary": "RHBZ#2403179",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2403179"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61920",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61920"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61920",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61920"
},
{
"category": "external",
"summary": "https://github.com/authlib/authlib/commit/867e3f87b072347a1ae9cf6983cc8bbf88447e5e",
"url": "https://github.com/authlib/authlib/commit/867e3f87b072347a1ae9cf6983cc8bbf88447e5e"
},
{
"category": "external",
"summary": "https://github.com/authlib/authlib/security/advisories/GHSA-pq5p-34cr-23v9",
"url": "https://github.com/authlib/authlib/security/advisories/GHSA-pq5p-34cr-23v9"
}
],
"release_date": "2025-10-10T19:25:07.679000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-12-10T16:11:04+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:30152d31da209c034ec39b52a32063437097eec9a4fac2eaf4a4110fea97cb70_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:38f094f62eed92d88eae0e7a9be410ef908bd0194b30240d49087ae76250e0ee_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:4d0a86e557e93eb8e7d70d538f181c2d33176b3537fb8d9e3a1e76a16ee2eed5_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:a40309477f7286b6c00381012eec8d3ececb557a4b8db38e5b4ea7f321a17c79_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:23060"
},
{
"category": "workaround",
"details": "Users unable to upgrade may manually enforce input size limits before handing tokens to Authlib and/or use application-level throttling to reduce amplification risk.",
"product_ids": [
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:11091b652f65868606c3d4d3e30a04cea7396f06f119bcd0a4cf664db2aa790e_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:212ceac279067567409c47acf7792e0c4d1955395f045e3b717040321dc1b88f_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:451da4b858587adcef52b5f1c9b7c92985bd7cc7c90f651b9e38825b81b38fb0_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:c5cb9d3d0f970ad36005f2d376547e967e4a89574cca1cf8806bb92d05199d70_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:0a978bbe91e0e0b8bab6862522f8a0aa8e974b778cc36b83f0781081621c8e23_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8b3684c92affc7acadcd5dc8eb80e5727081c7ecf4cc6eeafe5ecc5ea60970bb_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8d474498354d438fc9deeceb3bc89649f35d4e382e930ee721059bfeaf0f8279_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:ad2119941c2e8db1691a9bfee085425c7203ab00c2cdf0a6441b1102109cfd21_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:cdf96fe7a1ad4c192b4313e804d40d5c656c3f0ced498bae2427e449f0b2df02_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0c7a94928e8ef89aebdd9b30a47aaf0fe4dfb3a716603362b5c7d52255c4e842_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:1f769259f2b91d47f4d4fbf92414903a62380a358737e7100a1166ccd8c89b85_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:a71b5493009863c4f1e9ae9393ff236dc262d84ee028482ee58840fbfe392c83_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bd796d2de4d02f63adc767aa22b9a388b3adea40c12b0d8f158ebffabed6fee9_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:00eb13b3cccf326292589a680a964160c58f83391d0036c4ebcb34fad32b6189_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:0ca5a583ca7ff0161ed35deeae94be78adc74100d0343b778f1edf5b77e90925_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:3facbc804376b505181c2f52f0c7a433111bcedcb5699a0fcdffd7e9a2bdfbbe_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:7a338bb18181535a2644bf70cae05042e1ef2af5a80e70a6cab6516e8f054896_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:53c387293b92691eb66ea73b1d29781cf275f01b4254c38e21620c0502987272_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:1b0a31b5f6d1e1493974efb8c7ca5112e6e4d8f0b8e1de8e55b7b8c1184b2293_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:33d0912dbad0b1702fd91abf87e38910d2b983334062044c292a0cb1714187a0_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7814f04947e8e98d3c4870894e320b12c557976495bdf28a89b55bf061bacf79_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:b2a263d3cbf303d0dffb2c36ee2a4187c29902ce96ca1ded6f33b2edcc68fda9_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-bundle@sha256:1c915a6f813564b9bf8062ea5c6a83097a8dd78a38fda0171fae9cc8d81299c7_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:37039569fe73c3975468ffb8640c42becdd9b5304fb5e54789bf59dc67c52c9b_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:4e2ef7cca978574e1715c24b9874c7a0a1a46a6319884a91fe54df06efe97df1_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:b2e2d245c7ba3d1528e73b59bad428f023eeb17a1983d61edcf6a22db58911cf_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:f960e1816f8babb590a55ccab9f2db1b567df749e73c70067269d32f6200bca6_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:30152d31da209c034ec39b52a32063437097eec9a4fac2eaf4a4110fea97cb70_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:38f094f62eed92d88eae0e7a9be410ef908bd0194b30240d49087ae76250e0ee_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:4d0a86e557e93eb8e7d70d538f181c2d33176b3537fb8d9e3a1e76a16ee2eed5_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:a40309477f7286b6c00381012eec8d3ececb557a4b8db38e5b4ea7f321a17c79_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:11091b652f65868606c3d4d3e30a04cea7396f06f119bcd0a4cf664db2aa790e_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:212ceac279067567409c47acf7792e0c4d1955395f045e3b717040321dc1b88f_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:451da4b858587adcef52b5f1c9b7c92985bd7cc7c90f651b9e38825b81b38fb0_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/clair-rhel8@sha256:c5cb9d3d0f970ad36005f2d376547e967e4a89574cca1cf8806bb92d05199d70_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:0a978bbe91e0e0b8bab6862522f8a0aa8e974b778cc36b83f0781081621c8e23_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8b3684c92affc7acadcd5dc8eb80e5727081c7ecf4cc6eeafe5ecc5ea60970bb_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8d474498354d438fc9deeceb3bc89649f35d4e382e930ee721059bfeaf0f8279_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:ad2119941c2e8db1691a9bfee085425c7203ab00c2cdf0a6441b1102109cfd21_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:cdf96fe7a1ad4c192b4313e804d40d5c656c3f0ced498bae2427e449f0b2df02_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0c7a94928e8ef89aebdd9b30a47aaf0fe4dfb3a716603362b5c7d52255c4e842_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:1f769259f2b91d47f4d4fbf92414903a62380a358737e7100a1166ccd8c89b85_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:a71b5493009863c4f1e9ae9393ff236dc262d84ee028482ee58840fbfe392c83_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bd796d2de4d02f63adc767aa22b9a388b3adea40c12b0d8f158ebffabed6fee9_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:00eb13b3cccf326292589a680a964160c58f83391d0036c4ebcb34fad32b6189_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:0ca5a583ca7ff0161ed35deeae94be78adc74100d0343b778f1edf5b77e90925_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:3facbc804376b505181c2f52f0c7a433111bcedcb5699a0fcdffd7e9a2bdfbbe_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-builder-rhel8@sha256:7a338bb18181535a2644bf70cae05042e1ef2af5a80e70a6cab6516e8f054896_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:53c387293b92691eb66ea73b1d29781cf275f01b4254c38e21620c0502987272_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:1b0a31b5f6d1e1493974efb8c7ca5112e6e4d8f0b8e1de8e55b7b8c1184b2293_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:33d0912dbad0b1702fd91abf87e38910d2b983334062044c292a0cb1714187a0_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7814f04947e8e98d3c4870894e320b12c557976495bdf28a89b55bf061bacf79_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:b2a263d3cbf303d0dffb2c36ee2a4187c29902ce96ca1ded6f33b2edcc68fda9_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-bundle@sha256:1c915a6f813564b9bf8062ea5c6a83097a8dd78a38fda0171fae9cc8d81299c7_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:37039569fe73c3975468ffb8640c42becdd9b5304fb5e54789bf59dc67c52c9b_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:4e2ef7cca978574e1715c24b9874c7a0a1a46a6319884a91fe54df06efe97df1_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:b2e2d245c7ba3d1528e73b59bad428f023eeb17a1983d61edcf6a22db58911cf_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-operator-rhel8@sha256:f960e1816f8babb590a55ccab9f2db1b567df749e73c70067269d32f6200bca6_amd64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:30152d31da209c034ec39b52a32063437097eec9a4fac2eaf4a4110fea97cb70_arm64",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:38f094f62eed92d88eae0e7a9be410ef908bd0194b30240d49087ae76250e0ee_ppc64le",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:4d0a86e557e93eb8e7d70d538f181c2d33176b3537fb8d9e3a1e76a16ee2eed5_s390x",
"Red Hat Quay 3.12:registry.redhat.io/quay/quay-rhel8@sha256:a40309477f7286b6c00381012eec8d3ececb557a4b8db38e5b4ea7f321a17c79_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "authlib: Authlib Denial of Service"
}
]
}
RHSA-2025:23176
Vulnerability from csaf_redhat - Published: 2025-12-15 07:13 - Updated: 2026-03-16 06:38Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat Quay 3.13.10 is now available with bug fixes.",
"title": "Topic"
},
{
"category": "general",
"text": "Quay 3.13.10",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:23176",
"url": "https://access.redhat.com/errata/RHSA-2025:23176"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2024-34156",
"url": "https://access.redhat.com/security/cve/CVE-2024-34156"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-47913",
"url": "https://access.redhat.com/security/cve/CVE-2025-47913"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-59420",
"url": "https://access.redhat.com/security/cve/CVE-2025-59420"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61920",
"url": "https://access.redhat.com/security/cve/CVE-2025-61920"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_23176.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Quay 3.13.10",
"tracking": {
"current_release_date": "2026-03-16T06:38:46+00:00",
"generator": {
"date": "2026-03-16T06:38:46+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.3"
}
},
"id": "RHSA-2025:23176",
"initial_release_date": "2025-12-15T07:13:36+00:00",
"revision_history": [
{
"date": "2025-12-15T07:13:36+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-12-15T07:13:43+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-16T06:38:46+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Quay 3.13",
"product": {
"name": "Red Hat Quay 3.13",
"product_id": "Red Hat Quay 3.13",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:quay:3.13::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat Quay"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:c0a8c5f5454426844c43f8732ed512ab30b5d4bd3e799fa3f133670d0ea431d5_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:c0a8c5f5454426844c43f8732ed512ab30b5d4bd3e799fa3f133670d0ea431d5_amd64",
"product_id": "registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:c0a8c5f5454426844c43f8732ed512ab30b5d4bd3e799fa3f133670d0ea431d5_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-container-security-operator-bundle@sha256%3Ac0a8c5f5454426844c43f8732ed512ab30b5d4bd3e799fa3f133670d0ea431d5?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=v3.13.10-1765782391"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:9dd0249bc2ed6b1c2b26de52217d491204c925df3012df3ee3aeaaaa52b831b0_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:9dd0249bc2ed6b1c2b26de52217d491204c925df3012df3ee3aeaaaa52b831b0_amd64",
"product_id": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:9dd0249bc2ed6b1c2b26de52217d491204c925df3012df3ee3aeaaaa52b831b0_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-container-security-operator-rhel8@sha256%3A9dd0249bc2ed6b1c2b26de52217d491204c925df3012df3ee3aeaaaa52b831b0?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=v3.13.10-1765782391"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:bd1a02c47b6c32010fe19de6a994577b2c49ed692606d185d4252bb5ba347ecb_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:bd1a02c47b6c32010fe19de6a994577b2c49ed692606d185d4252bb5ba347ecb_amd64",
"product_id": "registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:bd1a02c47b6c32010fe19de6a994577b2c49ed692606d185d4252bb5ba347ecb_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-bridge-operator-bundle@sha256%3Abd1a02c47b6c32010fe19de6a994577b2c49ed692606d185d4252bb5ba347ecb?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=v3.13.10-1765782391"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:32d1326be0b497a153790a58572bb83555d7fe756e782d719d31fd0912769bf4_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:32d1326be0b497a153790a58572bb83555d7fe756e782d719d31fd0912769bf4_amd64",
"product_id": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:32d1326be0b497a153790a58572bb83555d7fe756e782d719d31fd0912769bf4_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-bridge-operator-rhel8@sha256%3A32d1326be0b497a153790a58572bb83555d7fe756e782d719d31fd0912769bf4?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=v3.13.10-1765782391"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:f635f510c78e52dedc4cbd4b721cc98446a58a03d6f245713e3aaf6ba6f6dd57_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:f635f510c78e52dedc4cbd4b721cc98446a58a03d6f245713e3aaf6ba6f6dd57_amd64",
"product_id": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:f635f510c78e52dedc4cbd4b721cc98446a58a03d6f245713e3aaf6ba6f6dd57_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-builder-qemu-rhcos-rhel8@sha256%3Af635f510c78e52dedc4cbd4b721cc98446a58a03d6f245713e3aaf6ba6f6dd57?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=v3.13.10-1765782391"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:0bb986d4f52cef09dd9a104660426a69d1f2c252b2f604758ae39a7cbaf7ee9b_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:0bb986d4f52cef09dd9a104660426a69d1f2c252b2f604758ae39a7cbaf7ee9b_amd64",
"product_id": "registry.redhat.io/quay/quay-builder-rhel8@sha256:0bb986d4f52cef09dd9a104660426a69d1f2c252b2f604758ae39a7cbaf7ee9b_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-builder-rhel8@sha256%3A0bb986d4f52cef09dd9a104660426a69d1f2c252b2f604758ae39a7cbaf7ee9b?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=v3.13.10-1765782391"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/clair-rhel8@sha256:3824fc5efcc434b7af55f83541186eebe666e106f22856daec3844c32a80ac41_amd64",
"product": {
"name": "registry.redhat.io/quay/clair-rhel8@sha256:3824fc5efcc434b7af55f83541186eebe666e106f22856daec3844c32a80ac41_amd64",
"product_id": "registry.redhat.io/quay/clair-rhel8@sha256:3824fc5efcc434b7af55f83541186eebe666e106f22856daec3844c32a80ac41_amd64",
"product_identification_helper": {
"purl": "pkg:oci/clair-rhel8@sha256%3A3824fc5efcc434b7af55f83541186eebe666e106f22856daec3844c32a80ac41?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=v3.13.10-1765782391"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-operator-bundle@sha256:e3bda08789b2ba41154d080a5f013ee0e2406d60f8414e63be451a6439555cc1_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-operator-bundle@sha256:e3bda08789b2ba41154d080a5f013ee0e2406d60f8414e63be451a6439555cc1_amd64",
"product_id": "registry.redhat.io/quay/quay-operator-bundle@sha256:e3bda08789b2ba41154d080a5f013ee0e2406d60f8414e63be451a6439555cc1_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-operator-bundle@sha256%3Ae3bda08789b2ba41154d080a5f013ee0e2406d60f8414e63be451a6439555cc1?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=v3.13.10-1765782391"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:9598f801ee479cb633d512b63a95659e05dbbd8d867e383dca5867f09e97e145_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:9598f801ee479cb633d512b63a95659e05dbbd8d867e383dca5867f09e97e145_amd64",
"product_id": "registry.redhat.io/quay/quay-operator-rhel8@sha256:9598f801ee479cb633d512b63a95659e05dbbd8d867e383dca5867f09e97e145_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-operator-rhel8@sha256%3A9598f801ee479cb633d512b63a95659e05dbbd8d867e383dca5867f09e97e145?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=v3.13.10-1765782391"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-rhel8@sha256:3d24fd39236e7f3180ff2cbef7a28e2e30d9609f6ec0538a41ad4a602eabd12e_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-rhel8@sha256:3d24fd39236e7f3180ff2cbef7a28e2e30d9609f6ec0538a41ad4a602eabd12e_amd64",
"product_id": "registry.redhat.io/quay/quay-rhel8@sha256:3d24fd39236e7f3180ff2cbef7a28e2e30d9609f6ec0538a41ad4a602eabd12e_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-rhel8@sha256%3A3d24fd39236e7f3180ff2cbef7a28e2e30d9609f6ec0538a41ad4a602eabd12e?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=v3.13.10-1765782391"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:faba929adc7958495dae063add6f0e67b5c2a92cd5848b16e88654aec51cb5a9_arm64",
"product": {
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:faba929adc7958495dae063add6f0e67b5c2a92cd5848b16e88654aec51cb5a9_arm64",
"product_id": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:faba929adc7958495dae063add6f0e67b5c2a92cd5848b16e88654aec51cb5a9_arm64",
"product_identification_helper": {
"purl": "pkg:oci/quay-container-security-operator-rhel8@sha256%3Afaba929adc7958495dae063add6f0e67b5c2a92cd5848b16e88654aec51cb5a9?arch=arm64\u0026repository_url=registry.redhat.io/quay\u0026tag=v3.13.10-1765782391"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b416224b4baa5a3c8663454f355aee800e327b28c6f19e0618b64b55f8daaf37_arm64",
"product": {
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b416224b4baa5a3c8663454f355aee800e327b28c6f19e0618b64b55f8daaf37_arm64",
"product_id": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b416224b4baa5a3c8663454f355aee800e327b28c6f19e0618b64b55f8daaf37_arm64",
"product_identification_helper": {
"purl": "pkg:oci/quay-bridge-operator-rhel8@sha256%3Ab416224b4baa5a3c8663454f355aee800e327b28c6f19e0618b64b55f8daaf37?arch=arm64\u0026repository_url=registry.redhat.io/quay\u0026tag=v3.13.10-1765782391"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:042fad54f97a923749bb9e28357f44c9ad55cc3e02ebd93386170d90aba8aed0_arm64",
"product": {
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:042fad54f97a923749bb9e28357f44c9ad55cc3e02ebd93386170d90aba8aed0_arm64",
"product_id": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:042fad54f97a923749bb9e28357f44c9ad55cc3e02ebd93386170d90aba8aed0_arm64",
"product_identification_helper": {
"purl": "pkg:oci/quay-builder-qemu-rhcos-rhel8@sha256%3A042fad54f97a923749bb9e28357f44c9ad55cc3e02ebd93386170d90aba8aed0?arch=arm64\u0026repository_url=registry.redhat.io/quay\u0026tag=v3.13.10-1765782391"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:6b8ae3a48b6237c6c689f1e62b3bb4eea645b5a3797a4e09e4a308f84f0c9ee7_arm64",
"product": {
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:6b8ae3a48b6237c6c689f1e62b3bb4eea645b5a3797a4e09e4a308f84f0c9ee7_arm64",
"product_id": "registry.redhat.io/quay/quay-builder-rhel8@sha256:6b8ae3a48b6237c6c689f1e62b3bb4eea645b5a3797a4e09e4a308f84f0c9ee7_arm64",
"product_identification_helper": {
"purl": "pkg:oci/quay-builder-rhel8@sha256%3A6b8ae3a48b6237c6c689f1e62b3bb4eea645b5a3797a4e09e4a308f84f0c9ee7?arch=arm64\u0026repository_url=registry.redhat.io/quay\u0026tag=v3.13.10-1765782391"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/clair-rhel8@sha256:1342015f8900bc707d1f83ec9cce6d73a63be03ca39f15952d7c30188a5358df_arm64",
"product": {
"name": "registry.redhat.io/quay/clair-rhel8@sha256:1342015f8900bc707d1f83ec9cce6d73a63be03ca39f15952d7c30188a5358df_arm64",
"product_id": "registry.redhat.io/quay/clair-rhel8@sha256:1342015f8900bc707d1f83ec9cce6d73a63be03ca39f15952d7c30188a5358df_arm64",
"product_identification_helper": {
"purl": "pkg:oci/clair-rhel8@sha256%3A1342015f8900bc707d1f83ec9cce6d73a63be03ca39f15952d7c30188a5358df?arch=arm64\u0026repository_url=registry.redhat.io/quay\u0026tag=v3.13.10-1765782391"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:71895379c0dca4fca449a1aee75d8aad06e1e72be3dee726cbe4c4f8fbe84fe2_arm64",
"product": {
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:71895379c0dca4fca449a1aee75d8aad06e1e72be3dee726cbe4c4f8fbe84fe2_arm64",
"product_id": "registry.redhat.io/quay/quay-operator-rhel8@sha256:71895379c0dca4fca449a1aee75d8aad06e1e72be3dee726cbe4c4f8fbe84fe2_arm64",
"product_identification_helper": {
"purl": "pkg:oci/quay-operator-rhel8@sha256%3A71895379c0dca4fca449a1aee75d8aad06e1e72be3dee726cbe4c4f8fbe84fe2?arch=arm64\u0026repository_url=registry.redhat.io/quay\u0026tag=v3.13.10-1765782391"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-rhel8@sha256:0b00334468578780a4e4b34c03260e57aa07ec47b0d4860b17c8ec964eb7634d_arm64",
"product": {
"name": "registry.redhat.io/quay/quay-rhel8@sha256:0b00334468578780a4e4b34c03260e57aa07ec47b0d4860b17c8ec964eb7634d_arm64",
"product_id": "registry.redhat.io/quay/quay-rhel8@sha256:0b00334468578780a4e4b34c03260e57aa07ec47b0d4860b17c8ec964eb7634d_arm64",
"product_identification_helper": {
"purl": "pkg:oci/quay-rhel8@sha256%3A0b00334468578780a4e4b34c03260e57aa07ec47b0d4860b17c8ec964eb7634d?arch=arm64\u0026repository_url=registry.redhat.io/quay\u0026tag=v3.13.10-1765782391"
}
}
}
],
"category": "architecture",
"name": "arm64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:fdee61c8dad676392456956ee47d5404f4b7bbf341453322d14feb71eb7660ab_ppc64le",
"product": {
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:fdee61c8dad676392456956ee47d5404f4b7bbf341453322d14feb71eb7660ab_ppc64le",
"product_id": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:fdee61c8dad676392456956ee47d5404f4b7bbf341453322d14feb71eb7660ab_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/quay-container-security-operator-rhel8@sha256%3Afdee61c8dad676392456956ee47d5404f4b7bbf341453322d14feb71eb7660ab?arch=ppc64le\u0026repository_url=registry.redhat.io/quay\u0026tag=v3.13.10-1765782391"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8f2d0fc57d36feafb662d28136ebec46bad9047640cf126f2f4f49777ef5b357_ppc64le",
"product": {
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8f2d0fc57d36feafb662d28136ebec46bad9047640cf126f2f4f49777ef5b357_ppc64le",
"product_id": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8f2d0fc57d36feafb662d28136ebec46bad9047640cf126f2f4f49777ef5b357_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/quay-bridge-operator-rhel8@sha256%3A8f2d0fc57d36feafb662d28136ebec46bad9047640cf126f2f4f49777ef5b357?arch=ppc64le\u0026repository_url=registry.redhat.io/quay\u0026tag=v3.13.10-1765782391"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:83ed8f834f7f93e91ef92c4e62dd37ad41149a52a8feecc5221daff3eb24ec27_ppc64le",
"product": {
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:83ed8f834f7f93e91ef92c4e62dd37ad41149a52a8feecc5221daff3eb24ec27_ppc64le",
"product_id": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:83ed8f834f7f93e91ef92c4e62dd37ad41149a52a8feecc5221daff3eb24ec27_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/quay-builder-qemu-rhcos-rhel8@sha256%3A83ed8f834f7f93e91ef92c4e62dd37ad41149a52a8feecc5221daff3eb24ec27?arch=ppc64le\u0026repository_url=registry.redhat.io/quay\u0026tag=v3.13.10-1765782391"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:8e4a2e7576bdf731816856a1c24c8d18292fe01df37393f845111a6df18b61a8_ppc64le",
"product": {
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:8e4a2e7576bdf731816856a1c24c8d18292fe01df37393f845111a6df18b61a8_ppc64le",
"product_id": "registry.redhat.io/quay/quay-builder-rhel8@sha256:8e4a2e7576bdf731816856a1c24c8d18292fe01df37393f845111a6df18b61a8_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/quay-builder-rhel8@sha256%3A8e4a2e7576bdf731816856a1c24c8d18292fe01df37393f845111a6df18b61a8?arch=ppc64le\u0026repository_url=registry.redhat.io/quay\u0026tag=v3.13.10-1765782391"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/clair-rhel8@sha256:1badbeb73cfe6c33bbff6922f778fe967bccbaaff72898a391d02880e765aad7_ppc64le",
"product": {
"name": "registry.redhat.io/quay/clair-rhel8@sha256:1badbeb73cfe6c33bbff6922f778fe967bccbaaff72898a391d02880e765aad7_ppc64le",
"product_id": "registry.redhat.io/quay/clair-rhel8@sha256:1badbeb73cfe6c33bbff6922f778fe967bccbaaff72898a391d02880e765aad7_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/clair-rhel8@sha256%3A1badbeb73cfe6c33bbff6922f778fe967bccbaaff72898a391d02880e765aad7?arch=ppc64le\u0026repository_url=registry.redhat.io/quay\u0026tag=v3.13.10-1765782391"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:a152946ac895db8778f8db536f644a8a8b54f5db329918a8a9442e7aa729dc8c_ppc64le",
"product": {
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:a152946ac895db8778f8db536f644a8a8b54f5db329918a8a9442e7aa729dc8c_ppc64le",
"product_id": "registry.redhat.io/quay/quay-operator-rhel8@sha256:a152946ac895db8778f8db536f644a8a8b54f5db329918a8a9442e7aa729dc8c_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/quay-operator-rhel8@sha256%3Aa152946ac895db8778f8db536f644a8a8b54f5db329918a8a9442e7aa729dc8c?arch=ppc64le\u0026repository_url=registry.redhat.io/quay\u0026tag=v3.13.10-1765782391"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-rhel8@sha256:1d15d8b7f90327a4216efba353d61c94a9438e5a8df3e68da44907816943d0d3_ppc64le",
"product": {
"name": "registry.redhat.io/quay/quay-rhel8@sha256:1d15d8b7f90327a4216efba353d61c94a9438e5a8df3e68da44907816943d0d3_ppc64le",
"product_id": "registry.redhat.io/quay/quay-rhel8@sha256:1d15d8b7f90327a4216efba353d61c94a9438e5a8df3e68da44907816943d0d3_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/quay-rhel8@sha256%3A1d15d8b7f90327a4216efba353d61c94a9438e5a8df3e68da44907816943d0d3?arch=ppc64le\u0026repository_url=registry.redhat.io/quay\u0026tag=v3.13.10-1765782391"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:38bcfcb8b18b9d0a84b108c9fde55fcda053c7cdbfc6f99639dd32d05f964756_s390x",
"product": {
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:38bcfcb8b18b9d0a84b108c9fde55fcda053c7cdbfc6f99639dd32d05f964756_s390x",
"product_id": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:38bcfcb8b18b9d0a84b108c9fde55fcda053c7cdbfc6f99639dd32d05f964756_s390x",
"product_identification_helper": {
"purl": "pkg:oci/quay-container-security-operator-rhel8@sha256%3A38bcfcb8b18b9d0a84b108c9fde55fcda053c7cdbfc6f99639dd32d05f964756?arch=s390x\u0026repository_url=registry.redhat.io/quay\u0026tag=v3.13.10-1765782391"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:45b58ff658a6736e113db8b69f1e762bf8ead59110903f5a2adc16ebf6cb532e_s390x",
"product": {
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:45b58ff658a6736e113db8b69f1e762bf8ead59110903f5a2adc16ebf6cb532e_s390x",
"product_id": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:45b58ff658a6736e113db8b69f1e762bf8ead59110903f5a2adc16ebf6cb532e_s390x",
"product_identification_helper": {
"purl": "pkg:oci/quay-bridge-operator-rhel8@sha256%3A45b58ff658a6736e113db8b69f1e762bf8ead59110903f5a2adc16ebf6cb532e?arch=s390x\u0026repository_url=registry.redhat.io/quay\u0026tag=v3.13.10-1765782391"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:92f9ae720c5c444a3e81ca42987152a689d2eaaa661e28b4cbc0363f1eaf56ce_s390x",
"product": {
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:92f9ae720c5c444a3e81ca42987152a689d2eaaa661e28b4cbc0363f1eaf56ce_s390x",
"product_id": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:92f9ae720c5c444a3e81ca42987152a689d2eaaa661e28b4cbc0363f1eaf56ce_s390x",
"product_identification_helper": {
"purl": "pkg:oci/quay-builder-qemu-rhcos-rhel8@sha256%3A92f9ae720c5c444a3e81ca42987152a689d2eaaa661e28b4cbc0363f1eaf56ce?arch=s390x\u0026repository_url=registry.redhat.io/quay\u0026tag=v3.13.10-1765782391"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:5e4bfa8a9a4aa227922af4e35dcb3f659d1672d53c4c79bc35d0594b7cabbae7_s390x",
"product": {
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:5e4bfa8a9a4aa227922af4e35dcb3f659d1672d53c4c79bc35d0594b7cabbae7_s390x",
"product_id": "registry.redhat.io/quay/quay-builder-rhel8@sha256:5e4bfa8a9a4aa227922af4e35dcb3f659d1672d53c4c79bc35d0594b7cabbae7_s390x",
"product_identification_helper": {
"purl": "pkg:oci/quay-builder-rhel8@sha256%3A5e4bfa8a9a4aa227922af4e35dcb3f659d1672d53c4c79bc35d0594b7cabbae7?arch=s390x\u0026repository_url=registry.redhat.io/quay\u0026tag=v3.13.10-1765782391"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/clair-rhel8@sha256:625daa899431d9a6526e65c8834435cd4b065cc9ad36406023f1ba3820032e9a_s390x",
"product": {
"name": "registry.redhat.io/quay/clair-rhel8@sha256:625daa899431d9a6526e65c8834435cd4b065cc9ad36406023f1ba3820032e9a_s390x",
"product_id": "registry.redhat.io/quay/clair-rhel8@sha256:625daa899431d9a6526e65c8834435cd4b065cc9ad36406023f1ba3820032e9a_s390x",
"product_identification_helper": {
"purl": "pkg:oci/clair-rhel8@sha256%3A625daa899431d9a6526e65c8834435cd4b065cc9ad36406023f1ba3820032e9a?arch=s390x\u0026repository_url=registry.redhat.io/quay\u0026tag=v3.13.10-1765782391"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:711b4047d6732b195af78cda60bdc7baba8fc64ec3bc67e566aab05f14ef54f6_s390x",
"product": {
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:711b4047d6732b195af78cda60bdc7baba8fc64ec3bc67e566aab05f14ef54f6_s390x",
"product_id": "registry.redhat.io/quay/quay-operator-rhel8@sha256:711b4047d6732b195af78cda60bdc7baba8fc64ec3bc67e566aab05f14ef54f6_s390x",
"product_identification_helper": {
"purl": "pkg:oci/quay-operator-rhel8@sha256%3A711b4047d6732b195af78cda60bdc7baba8fc64ec3bc67e566aab05f14ef54f6?arch=s390x\u0026repository_url=registry.redhat.io/quay\u0026tag=v3.13.10-1765782391"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-rhel8@sha256:28b200a0ba2c8095d93fc95edbdcdf83b2507a7379f2842fc0a1b7cc5fdd839c_s390x",
"product": {
"name": "registry.redhat.io/quay/quay-rhel8@sha256:28b200a0ba2c8095d93fc95edbdcdf83b2507a7379f2842fc0a1b7cc5fdd839c_s390x",
"product_id": "registry.redhat.io/quay/quay-rhel8@sha256:28b200a0ba2c8095d93fc95edbdcdf83b2507a7379f2842fc0a1b7cc5fdd839c_s390x",
"product_identification_helper": {
"purl": "pkg:oci/quay-rhel8@sha256%3A28b200a0ba2c8095d93fc95edbdcdf83b2507a7379f2842fc0a1b7cc5fdd839c?arch=s390x\u0026repository_url=registry.redhat.io/quay\u0026tag=v3.13.10-1765782391"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/clair-rhel8@sha256:1342015f8900bc707d1f83ec9cce6d73a63be03ca39f15952d7c30188a5358df_arm64 as a component of Red Hat Quay 3.13",
"product_id": "Red Hat Quay 3.13:registry.redhat.io/quay/clair-rhel8@sha256:1342015f8900bc707d1f83ec9cce6d73a63be03ca39f15952d7c30188a5358df_arm64"
},
"product_reference": "registry.redhat.io/quay/clair-rhel8@sha256:1342015f8900bc707d1f83ec9cce6d73a63be03ca39f15952d7c30188a5358df_arm64",
"relates_to_product_reference": "Red Hat Quay 3.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/clair-rhel8@sha256:1badbeb73cfe6c33bbff6922f778fe967bccbaaff72898a391d02880e765aad7_ppc64le as a component of Red Hat Quay 3.13",
"product_id": "Red Hat Quay 3.13:registry.redhat.io/quay/clair-rhel8@sha256:1badbeb73cfe6c33bbff6922f778fe967bccbaaff72898a391d02880e765aad7_ppc64le"
},
"product_reference": "registry.redhat.io/quay/clair-rhel8@sha256:1badbeb73cfe6c33bbff6922f778fe967bccbaaff72898a391d02880e765aad7_ppc64le",
"relates_to_product_reference": "Red Hat Quay 3.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/clair-rhel8@sha256:3824fc5efcc434b7af55f83541186eebe666e106f22856daec3844c32a80ac41_amd64 as a component of Red Hat Quay 3.13",
"product_id": "Red Hat Quay 3.13:registry.redhat.io/quay/clair-rhel8@sha256:3824fc5efcc434b7af55f83541186eebe666e106f22856daec3844c32a80ac41_amd64"
},
"product_reference": "registry.redhat.io/quay/clair-rhel8@sha256:3824fc5efcc434b7af55f83541186eebe666e106f22856daec3844c32a80ac41_amd64",
"relates_to_product_reference": "Red Hat Quay 3.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/clair-rhel8@sha256:625daa899431d9a6526e65c8834435cd4b065cc9ad36406023f1ba3820032e9a_s390x as a component of Red Hat Quay 3.13",
"product_id": "Red Hat Quay 3.13:registry.redhat.io/quay/clair-rhel8@sha256:625daa899431d9a6526e65c8834435cd4b065cc9ad36406023f1ba3820032e9a_s390x"
},
"product_reference": "registry.redhat.io/quay/clair-rhel8@sha256:625daa899431d9a6526e65c8834435cd4b065cc9ad36406023f1ba3820032e9a_s390x",
"relates_to_product_reference": "Red Hat Quay 3.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:bd1a02c47b6c32010fe19de6a994577b2c49ed692606d185d4252bb5ba347ecb_amd64 as a component of Red Hat Quay 3.13",
"product_id": "Red Hat Quay 3.13:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:bd1a02c47b6c32010fe19de6a994577b2c49ed692606d185d4252bb5ba347ecb_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:bd1a02c47b6c32010fe19de6a994577b2c49ed692606d185d4252bb5ba347ecb_amd64",
"relates_to_product_reference": "Red Hat Quay 3.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:32d1326be0b497a153790a58572bb83555d7fe756e782d719d31fd0912769bf4_amd64 as a component of Red Hat Quay 3.13",
"product_id": "Red Hat Quay 3.13:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:32d1326be0b497a153790a58572bb83555d7fe756e782d719d31fd0912769bf4_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:32d1326be0b497a153790a58572bb83555d7fe756e782d719d31fd0912769bf4_amd64",
"relates_to_product_reference": "Red Hat Quay 3.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:45b58ff658a6736e113db8b69f1e762bf8ead59110903f5a2adc16ebf6cb532e_s390x as a component of Red Hat Quay 3.13",
"product_id": "Red Hat Quay 3.13:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:45b58ff658a6736e113db8b69f1e762bf8ead59110903f5a2adc16ebf6cb532e_s390x"
},
"product_reference": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:45b58ff658a6736e113db8b69f1e762bf8ead59110903f5a2adc16ebf6cb532e_s390x",
"relates_to_product_reference": "Red Hat Quay 3.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8f2d0fc57d36feafb662d28136ebec46bad9047640cf126f2f4f49777ef5b357_ppc64le as a component of Red Hat Quay 3.13",
"product_id": "Red Hat Quay 3.13:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8f2d0fc57d36feafb662d28136ebec46bad9047640cf126f2f4f49777ef5b357_ppc64le"
},
"product_reference": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8f2d0fc57d36feafb662d28136ebec46bad9047640cf126f2f4f49777ef5b357_ppc64le",
"relates_to_product_reference": "Red Hat Quay 3.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b416224b4baa5a3c8663454f355aee800e327b28c6f19e0618b64b55f8daaf37_arm64 as a component of Red Hat Quay 3.13",
"product_id": "Red Hat Quay 3.13:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b416224b4baa5a3c8663454f355aee800e327b28c6f19e0618b64b55f8daaf37_arm64"
},
"product_reference": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b416224b4baa5a3c8663454f355aee800e327b28c6f19e0618b64b55f8daaf37_arm64",
"relates_to_product_reference": "Red Hat Quay 3.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:042fad54f97a923749bb9e28357f44c9ad55cc3e02ebd93386170d90aba8aed0_arm64 as a component of Red Hat Quay 3.13",
"product_id": "Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:042fad54f97a923749bb9e28357f44c9ad55cc3e02ebd93386170d90aba8aed0_arm64"
},
"product_reference": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:042fad54f97a923749bb9e28357f44c9ad55cc3e02ebd93386170d90aba8aed0_arm64",
"relates_to_product_reference": "Red Hat Quay 3.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:83ed8f834f7f93e91ef92c4e62dd37ad41149a52a8feecc5221daff3eb24ec27_ppc64le as a component of Red Hat Quay 3.13",
"product_id": "Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:83ed8f834f7f93e91ef92c4e62dd37ad41149a52a8feecc5221daff3eb24ec27_ppc64le"
},
"product_reference": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:83ed8f834f7f93e91ef92c4e62dd37ad41149a52a8feecc5221daff3eb24ec27_ppc64le",
"relates_to_product_reference": "Red Hat Quay 3.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:92f9ae720c5c444a3e81ca42987152a689d2eaaa661e28b4cbc0363f1eaf56ce_s390x as a component of Red Hat Quay 3.13",
"product_id": "Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:92f9ae720c5c444a3e81ca42987152a689d2eaaa661e28b4cbc0363f1eaf56ce_s390x"
},
"product_reference": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:92f9ae720c5c444a3e81ca42987152a689d2eaaa661e28b4cbc0363f1eaf56ce_s390x",
"relates_to_product_reference": "Red Hat Quay 3.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:f635f510c78e52dedc4cbd4b721cc98446a58a03d6f245713e3aaf6ba6f6dd57_amd64 as a component of Red Hat Quay 3.13",
"product_id": "Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:f635f510c78e52dedc4cbd4b721cc98446a58a03d6f245713e3aaf6ba6f6dd57_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:f635f510c78e52dedc4cbd4b721cc98446a58a03d6f245713e3aaf6ba6f6dd57_amd64",
"relates_to_product_reference": "Red Hat Quay 3.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:0bb986d4f52cef09dd9a104660426a69d1f2c252b2f604758ae39a7cbaf7ee9b_amd64 as a component of Red Hat Quay 3.13",
"product_id": "Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-rhel8@sha256:0bb986d4f52cef09dd9a104660426a69d1f2c252b2f604758ae39a7cbaf7ee9b_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-builder-rhel8@sha256:0bb986d4f52cef09dd9a104660426a69d1f2c252b2f604758ae39a7cbaf7ee9b_amd64",
"relates_to_product_reference": "Red Hat Quay 3.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:5e4bfa8a9a4aa227922af4e35dcb3f659d1672d53c4c79bc35d0594b7cabbae7_s390x as a component of Red Hat Quay 3.13",
"product_id": "Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-rhel8@sha256:5e4bfa8a9a4aa227922af4e35dcb3f659d1672d53c4c79bc35d0594b7cabbae7_s390x"
},
"product_reference": "registry.redhat.io/quay/quay-builder-rhel8@sha256:5e4bfa8a9a4aa227922af4e35dcb3f659d1672d53c4c79bc35d0594b7cabbae7_s390x",
"relates_to_product_reference": "Red Hat Quay 3.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:6b8ae3a48b6237c6c689f1e62b3bb4eea645b5a3797a4e09e4a308f84f0c9ee7_arm64 as a component of Red Hat Quay 3.13",
"product_id": "Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-rhel8@sha256:6b8ae3a48b6237c6c689f1e62b3bb4eea645b5a3797a4e09e4a308f84f0c9ee7_arm64"
},
"product_reference": "registry.redhat.io/quay/quay-builder-rhel8@sha256:6b8ae3a48b6237c6c689f1e62b3bb4eea645b5a3797a4e09e4a308f84f0c9ee7_arm64",
"relates_to_product_reference": "Red Hat Quay 3.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:8e4a2e7576bdf731816856a1c24c8d18292fe01df37393f845111a6df18b61a8_ppc64le as a component of Red Hat Quay 3.13",
"product_id": "Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-rhel8@sha256:8e4a2e7576bdf731816856a1c24c8d18292fe01df37393f845111a6df18b61a8_ppc64le"
},
"product_reference": "registry.redhat.io/quay/quay-builder-rhel8@sha256:8e4a2e7576bdf731816856a1c24c8d18292fe01df37393f845111a6df18b61a8_ppc64le",
"relates_to_product_reference": "Red Hat Quay 3.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:c0a8c5f5454426844c43f8732ed512ab30b5d4bd3e799fa3f133670d0ea431d5_amd64 as a component of Red Hat Quay 3.13",
"product_id": "Red Hat Quay 3.13:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:c0a8c5f5454426844c43f8732ed512ab30b5d4bd3e799fa3f133670d0ea431d5_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:c0a8c5f5454426844c43f8732ed512ab30b5d4bd3e799fa3f133670d0ea431d5_amd64",
"relates_to_product_reference": "Red Hat Quay 3.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:38bcfcb8b18b9d0a84b108c9fde55fcda053c7cdbfc6f99639dd32d05f964756_s390x as a component of Red Hat Quay 3.13",
"product_id": "Red Hat Quay 3.13:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:38bcfcb8b18b9d0a84b108c9fde55fcda053c7cdbfc6f99639dd32d05f964756_s390x"
},
"product_reference": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:38bcfcb8b18b9d0a84b108c9fde55fcda053c7cdbfc6f99639dd32d05f964756_s390x",
"relates_to_product_reference": "Red Hat Quay 3.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:9dd0249bc2ed6b1c2b26de52217d491204c925df3012df3ee3aeaaaa52b831b0_amd64 as a component of Red Hat Quay 3.13",
"product_id": "Red Hat Quay 3.13:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:9dd0249bc2ed6b1c2b26de52217d491204c925df3012df3ee3aeaaaa52b831b0_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:9dd0249bc2ed6b1c2b26de52217d491204c925df3012df3ee3aeaaaa52b831b0_amd64",
"relates_to_product_reference": "Red Hat Quay 3.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:faba929adc7958495dae063add6f0e67b5c2a92cd5848b16e88654aec51cb5a9_arm64 as a component of Red Hat Quay 3.13",
"product_id": "Red Hat Quay 3.13:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:faba929adc7958495dae063add6f0e67b5c2a92cd5848b16e88654aec51cb5a9_arm64"
},
"product_reference": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:faba929adc7958495dae063add6f0e67b5c2a92cd5848b16e88654aec51cb5a9_arm64",
"relates_to_product_reference": "Red Hat Quay 3.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:fdee61c8dad676392456956ee47d5404f4b7bbf341453322d14feb71eb7660ab_ppc64le as a component of Red Hat Quay 3.13",
"product_id": "Red Hat Quay 3.13:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:fdee61c8dad676392456956ee47d5404f4b7bbf341453322d14feb71eb7660ab_ppc64le"
},
"product_reference": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:fdee61c8dad676392456956ee47d5404f4b7bbf341453322d14feb71eb7660ab_ppc64le",
"relates_to_product_reference": "Red Hat Quay 3.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-operator-bundle@sha256:e3bda08789b2ba41154d080a5f013ee0e2406d60f8414e63be451a6439555cc1_amd64 as a component of Red Hat Quay 3.13",
"product_id": "Red Hat Quay 3.13:registry.redhat.io/quay/quay-operator-bundle@sha256:e3bda08789b2ba41154d080a5f013ee0e2406d60f8414e63be451a6439555cc1_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-operator-bundle@sha256:e3bda08789b2ba41154d080a5f013ee0e2406d60f8414e63be451a6439555cc1_amd64",
"relates_to_product_reference": "Red Hat Quay 3.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:711b4047d6732b195af78cda60bdc7baba8fc64ec3bc67e566aab05f14ef54f6_s390x as a component of Red Hat Quay 3.13",
"product_id": "Red Hat Quay 3.13:registry.redhat.io/quay/quay-operator-rhel8@sha256:711b4047d6732b195af78cda60bdc7baba8fc64ec3bc67e566aab05f14ef54f6_s390x"
},
"product_reference": "registry.redhat.io/quay/quay-operator-rhel8@sha256:711b4047d6732b195af78cda60bdc7baba8fc64ec3bc67e566aab05f14ef54f6_s390x",
"relates_to_product_reference": "Red Hat Quay 3.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:71895379c0dca4fca449a1aee75d8aad06e1e72be3dee726cbe4c4f8fbe84fe2_arm64 as a component of Red Hat Quay 3.13",
"product_id": "Red Hat Quay 3.13:registry.redhat.io/quay/quay-operator-rhel8@sha256:71895379c0dca4fca449a1aee75d8aad06e1e72be3dee726cbe4c4f8fbe84fe2_arm64"
},
"product_reference": "registry.redhat.io/quay/quay-operator-rhel8@sha256:71895379c0dca4fca449a1aee75d8aad06e1e72be3dee726cbe4c4f8fbe84fe2_arm64",
"relates_to_product_reference": "Red Hat Quay 3.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:9598f801ee479cb633d512b63a95659e05dbbd8d867e383dca5867f09e97e145_amd64 as a component of Red Hat Quay 3.13",
"product_id": "Red Hat Quay 3.13:registry.redhat.io/quay/quay-operator-rhel8@sha256:9598f801ee479cb633d512b63a95659e05dbbd8d867e383dca5867f09e97e145_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-operator-rhel8@sha256:9598f801ee479cb633d512b63a95659e05dbbd8d867e383dca5867f09e97e145_amd64",
"relates_to_product_reference": "Red Hat Quay 3.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:a152946ac895db8778f8db536f644a8a8b54f5db329918a8a9442e7aa729dc8c_ppc64le as a component of Red Hat Quay 3.13",
"product_id": "Red Hat Quay 3.13:registry.redhat.io/quay/quay-operator-rhel8@sha256:a152946ac895db8778f8db536f644a8a8b54f5db329918a8a9442e7aa729dc8c_ppc64le"
},
"product_reference": "registry.redhat.io/quay/quay-operator-rhel8@sha256:a152946ac895db8778f8db536f644a8a8b54f5db329918a8a9442e7aa729dc8c_ppc64le",
"relates_to_product_reference": "Red Hat Quay 3.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-rhel8@sha256:0b00334468578780a4e4b34c03260e57aa07ec47b0d4860b17c8ec964eb7634d_arm64 as a component of Red Hat Quay 3.13",
"product_id": "Red Hat Quay 3.13:registry.redhat.io/quay/quay-rhel8@sha256:0b00334468578780a4e4b34c03260e57aa07ec47b0d4860b17c8ec964eb7634d_arm64"
},
"product_reference": "registry.redhat.io/quay/quay-rhel8@sha256:0b00334468578780a4e4b34c03260e57aa07ec47b0d4860b17c8ec964eb7634d_arm64",
"relates_to_product_reference": "Red Hat Quay 3.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-rhel8@sha256:1d15d8b7f90327a4216efba353d61c94a9438e5a8df3e68da44907816943d0d3_ppc64le as a component of Red Hat Quay 3.13",
"product_id": "Red Hat Quay 3.13:registry.redhat.io/quay/quay-rhel8@sha256:1d15d8b7f90327a4216efba353d61c94a9438e5a8df3e68da44907816943d0d3_ppc64le"
},
"product_reference": "registry.redhat.io/quay/quay-rhel8@sha256:1d15d8b7f90327a4216efba353d61c94a9438e5a8df3e68da44907816943d0d3_ppc64le",
"relates_to_product_reference": "Red Hat Quay 3.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-rhel8@sha256:28b200a0ba2c8095d93fc95edbdcdf83b2507a7379f2842fc0a1b7cc5fdd839c_s390x as a component of Red Hat Quay 3.13",
"product_id": "Red Hat Quay 3.13:registry.redhat.io/quay/quay-rhel8@sha256:28b200a0ba2c8095d93fc95edbdcdf83b2507a7379f2842fc0a1b7cc5fdd839c_s390x"
},
"product_reference": "registry.redhat.io/quay/quay-rhel8@sha256:28b200a0ba2c8095d93fc95edbdcdf83b2507a7379f2842fc0a1b7cc5fdd839c_s390x",
"relates_to_product_reference": "Red Hat Quay 3.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-rhel8@sha256:3d24fd39236e7f3180ff2cbef7a28e2e30d9609f6ec0538a41ad4a602eabd12e_amd64 as a component of Red Hat Quay 3.13",
"product_id": "Red Hat Quay 3.13:registry.redhat.io/quay/quay-rhel8@sha256:3d24fd39236e7f3180ff2cbef7a28e2e30d9609f6ec0538a41ad4a602eabd12e_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-rhel8@sha256:3d24fd39236e7f3180ff2cbef7a28e2e30d9609f6ec0538a41ad4a602eabd12e_amd64",
"relates_to_product_reference": "Red Hat Quay 3.13"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-34156",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"discovery_date": "2024-09-06T21:20:09.377905+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.13:registry.redhat.io/quay/clair-rhel8@sha256:1342015f8900bc707d1f83ec9cce6d73a63be03ca39f15952d7c30188a5358df_arm64",
"Red Hat Quay 3.13:registry.redhat.io/quay/clair-rhel8@sha256:1badbeb73cfe6c33bbff6922f778fe967bccbaaff72898a391d02880e765aad7_ppc64le",
"Red Hat Quay 3.13:registry.redhat.io/quay/clair-rhel8@sha256:3824fc5efcc434b7af55f83541186eebe666e106f22856daec3844c32a80ac41_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/clair-rhel8@sha256:625daa899431d9a6526e65c8834435cd4b065cc9ad36406023f1ba3820032e9a_s390x",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:bd1a02c47b6c32010fe19de6a994577b2c49ed692606d185d4252bb5ba347ecb_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:32d1326be0b497a153790a58572bb83555d7fe756e782d719d31fd0912769bf4_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:45b58ff658a6736e113db8b69f1e762bf8ead59110903f5a2adc16ebf6cb532e_s390x",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8f2d0fc57d36feafb662d28136ebec46bad9047640cf126f2f4f49777ef5b357_ppc64le",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b416224b4baa5a3c8663454f355aee800e327b28c6f19e0618b64b55f8daaf37_arm64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:042fad54f97a923749bb9e28357f44c9ad55cc3e02ebd93386170d90aba8aed0_arm64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:83ed8f834f7f93e91ef92c4e62dd37ad41149a52a8feecc5221daff3eb24ec27_ppc64le",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:92f9ae720c5c444a3e81ca42987152a689d2eaaa661e28b4cbc0363f1eaf56ce_s390x",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:f635f510c78e52dedc4cbd4b721cc98446a58a03d6f245713e3aaf6ba6f6dd57_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-rhel8@sha256:0bb986d4f52cef09dd9a104660426a69d1f2c252b2f604758ae39a7cbaf7ee9b_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-rhel8@sha256:5e4bfa8a9a4aa227922af4e35dcb3f659d1672d53c4c79bc35d0594b7cabbae7_s390x",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-rhel8@sha256:6b8ae3a48b6237c6c689f1e62b3bb4eea645b5a3797a4e09e4a308f84f0c9ee7_arm64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-rhel8@sha256:8e4a2e7576bdf731816856a1c24c8d18292fe01df37393f845111a6df18b61a8_ppc64le",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:c0a8c5f5454426844c43f8732ed512ab30b5d4bd3e799fa3f133670d0ea431d5_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-operator-bundle@sha256:e3bda08789b2ba41154d080a5f013ee0e2406d60f8414e63be451a6439555cc1_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-operator-rhel8@sha256:711b4047d6732b195af78cda60bdc7baba8fc64ec3bc67e566aab05f14ef54f6_s390x",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-operator-rhel8@sha256:71895379c0dca4fca449a1aee75d8aad06e1e72be3dee726cbe4c4f8fbe84fe2_arm64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-operator-rhel8@sha256:9598f801ee479cb633d512b63a95659e05dbbd8d867e383dca5867f09e97e145_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-operator-rhel8@sha256:a152946ac895db8778f8db536f644a8a8b54f5db329918a8a9442e7aa729dc8c_ppc64le",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-rhel8@sha256:0b00334468578780a4e4b34c03260e57aa07ec47b0d4860b17c8ec964eb7634d_arm64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-rhel8@sha256:1d15d8b7f90327a4216efba353d61c94a9438e5a8df3e68da44907816943d0d3_ppc64le",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-rhel8@sha256:28b200a0ba2c8095d93fc95edbdcdf83b2507a7379f2842fc0a1b7cc5fdd839c_s390x",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-rhel8@sha256:3d24fd39236e7f3180ff2cbef7a28e2e30d9609f6ec0538a41ad4a602eabd12e_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2310528"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the encoding/gob package of the Golang standard library. Calling Decoder.Decoding, a message that contains deeply nested structures, can cause a panic due to stack exhaustion. This is a follow-up to CVE-2022-30635.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability in Go\u0027s `encoding/gob` package is of high severity because it exposes applications to potential Denial of Service (DoS) attacks through stack exhaustion. Since `gob` relies on recursive function calls to decode nested structures, an attacker could exploit this by sending crafted messages with excessively deep nesting, causing the application to panic due to stack overflow. This risk is particularly important in scenarios where untrusted or external input is processed, as it can lead to system unavailability or crashes, undermining the reliability and availability of services.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:38bcfcb8b18b9d0a84b108c9fde55fcda053c7cdbfc6f99639dd32d05f964756_s390x",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:9dd0249bc2ed6b1c2b26de52217d491204c925df3012df3ee3aeaaaa52b831b0_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:faba929adc7958495dae063add6f0e67b5c2a92cd5848b16e88654aec51cb5a9_arm64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:fdee61c8dad676392456956ee47d5404f4b7bbf341453322d14feb71eb7660ab_ppc64le"
],
"known_not_affected": [
"Red Hat Quay 3.13:registry.redhat.io/quay/clair-rhel8@sha256:1342015f8900bc707d1f83ec9cce6d73a63be03ca39f15952d7c30188a5358df_arm64",
"Red Hat Quay 3.13:registry.redhat.io/quay/clair-rhel8@sha256:1badbeb73cfe6c33bbff6922f778fe967bccbaaff72898a391d02880e765aad7_ppc64le",
"Red Hat Quay 3.13:registry.redhat.io/quay/clair-rhel8@sha256:3824fc5efcc434b7af55f83541186eebe666e106f22856daec3844c32a80ac41_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/clair-rhel8@sha256:625daa899431d9a6526e65c8834435cd4b065cc9ad36406023f1ba3820032e9a_s390x",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:bd1a02c47b6c32010fe19de6a994577b2c49ed692606d185d4252bb5ba347ecb_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:32d1326be0b497a153790a58572bb83555d7fe756e782d719d31fd0912769bf4_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:45b58ff658a6736e113db8b69f1e762bf8ead59110903f5a2adc16ebf6cb532e_s390x",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8f2d0fc57d36feafb662d28136ebec46bad9047640cf126f2f4f49777ef5b357_ppc64le",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b416224b4baa5a3c8663454f355aee800e327b28c6f19e0618b64b55f8daaf37_arm64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:042fad54f97a923749bb9e28357f44c9ad55cc3e02ebd93386170d90aba8aed0_arm64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:83ed8f834f7f93e91ef92c4e62dd37ad41149a52a8feecc5221daff3eb24ec27_ppc64le",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:92f9ae720c5c444a3e81ca42987152a689d2eaaa661e28b4cbc0363f1eaf56ce_s390x",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:f635f510c78e52dedc4cbd4b721cc98446a58a03d6f245713e3aaf6ba6f6dd57_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-rhel8@sha256:0bb986d4f52cef09dd9a104660426a69d1f2c252b2f604758ae39a7cbaf7ee9b_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-rhel8@sha256:5e4bfa8a9a4aa227922af4e35dcb3f659d1672d53c4c79bc35d0594b7cabbae7_s390x",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-rhel8@sha256:6b8ae3a48b6237c6c689f1e62b3bb4eea645b5a3797a4e09e4a308f84f0c9ee7_arm64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-rhel8@sha256:8e4a2e7576bdf731816856a1c24c8d18292fe01df37393f845111a6df18b61a8_ppc64le",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:c0a8c5f5454426844c43f8732ed512ab30b5d4bd3e799fa3f133670d0ea431d5_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-operator-bundle@sha256:e3bda08789b2ba41154d080a5f013ee0e2406d60f8414e63be451a6439555cc1_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-operator-rhel8@sha256:711b4047d6732b195af78cda60bdc7baba8fc64ec3bc67e566aab05f14ef54f6_s390x",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-operator-rhel8@sha256:71895379c0dca4fca449a1aee75d8aad06e1e72be3dee726cbe4c4f8fbe84fe2_arm64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-operator-rhel8@sha256:9598f801ee479cb633d512b63a95659e05dbbd8d867e383dca5867f09e97e145_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-operator-rhel8@sha256:a152946ac895db8778f8db536f644a8a8b54f5db329918a8a9442e7aa729dc8c_ppc64le",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-rhel8@sha256:0b00334468578780a4e4b34c03260e57aa07ec47b0d4860b17c8ec964eb7634d_arm64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-rhel8@sha256:1d15d8b7f90327a4216efba353d61c94a9438e5a8df3e68da44907816943d0d3_ppc64le",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-rhel8@sha256:28b200a0ba2c8095d93fc95edbdcdf83b2507a7379f2842fc0a1b7cc5fdd839c_s390x",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-rhel8@sha256:3d24fd39236e7f3180ff2cbef7a28e2e30d9609f6ec0538a41ad4a602eabd12e_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-34156"
},
{
"category": "external",
"summary": "RHBZ#2310528",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2310528"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-34156",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34156"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-34156",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-34156"
},
{
"category": "external",
"summary": "https://go.dev/cl/611239",
"url": "https://go.dev/cl/611239"
},
{
"category": "external",
"summary": "https://go.dev/issue/69139",
"url": "https://go.dev/issue/69139"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-dev/c/S9POB9NCTdk",
"url": "https://groups.google.com/g/golang-dev/c/S9POB9NCTdk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2024-3106",
"url": "https://pkg.go.dev/vuln/GO-2024-3106"
}
],
"release_date": "2024-09-06T21:15:12.020000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-12-15T07:13:36+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11358",
"product_ids": [
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:38bcfcb8b18b9d0a84b108c9fde55fcda053c7cdbfc6f99639dd32d05f964756_s390x",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:9dd0249bc2ed6b1c2b26de52217d491204c925df3012df3ee3aeaaaa52b831b0_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:faba929adc7958495dae063add6f0e67b5c2a92cd5848b16e88654aec51cb5a9_arm64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:fdee61c8dad676392456956ee47d5404f4b7bbf341453322d14feb71eb7660ab_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:23176"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Quay 3.13:registry.redhat.io/quay/clair-rhel8@sha256:1342015f8900bc707d1f83ec9cce6d73a63be03ca39f15952d7c30188a5358df_arm64",
"Red Hat Quay 3.13:registry.redhat.io/quay/clair-rhel8@sha256:1badbeb73cfe6c33bbff6922f778fe967bccbaaff72898a391d02880e765aad7_ppc64le",
"Red Hat Quay 3.13:registry.redhat.io/quay/clair-rhel8@sha256:3824fc5efcc434b7af55f83541186eebe666e106f22856daec3844c32a80ac41_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/clair-rhel8@sha256:625daa899431d9a6526e65c8834435cd4b065cc9ad36406023f1ba3820032e9a_s390x",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:bd1a02c47b6c32010fe19de6a994577b2c49ed692606d185d4252bb5ba347ecb_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:32d1326be0b497a153790a58572bb83555d7fe756e782d719d31fd0912769bf4_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:45b58ff658a6736e113db8b69f1e762bf8ead59110903f5a2adc16ebf6cb532e_s390x",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8f2d0fc57d36feafb662d28136ebec46bad9047640cf126f2f4f49777ef5b357_ppc64le",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b416224b4baa5a3c8663454f355aee800e327b28c6f19e0618b64b55f8daaf37_arm64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:042fad54f97a923749bb9e28357f44c9ad55cc3e02ebd93386170d90aba8aed0_arm64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:83ed8f834f7f93e91ef92c4e62dd37ad41149a52a8feecc5221daff3eb24ec27_ppc64le",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:92f9ae720c5c444a3e81ca42987152a689d2eaaa661e28b4cbc0363f1eaf56ce_s390x",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:f635f510c78e52dedc4cbd4b721cc98446a58a03d6f245713e3aaf6ba6f6dd57_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-rhel8@sha256:0bb986d4f52cef09dd9a104660426a69d1f2c252b2f604758ae39a7cbaf7ee9b_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-rhel8@sha256:5e4bfa8a9a4aa227922af4e35dcb3f659d1672d53c4c79bc35d0594b7cabbae7_s390x",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-rhel8@sha256:6b8ae3a48b6237c6c689f1e62b3bb4eea645b5a3797a4e09e4a308f84f0c9ee7_arm64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-rhel8@sha256:8e4a2e7576bdf731816856a1c24c8d18292fe01df37393f845111a6df18b61a8_ppc64le",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:c0a8c5f5454426844c43f8732ed512ab30b5d4bd3e799fa3f133670d0ea431d5_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:38bcfcb8b18b9d0a84b108c9fde55fcda053c7cdbfc6f99639dd32d05f964756_s390x",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:9dd0249bc2ed6b1c2b26de52217d491204c925df3012df3ee3aeaaaa52b831b0_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:faba929adc7958495dae063add6f0e67b5c2a92cd5848b16e88654aec51cb5a9_arm64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:fdee61c8dad676392456956ee47d5404f4b7bbf341453322d14feb71eb7660ab_ppc64le",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-operator-bundle@sha256:e3bda08789b2ba41154d080a5f013ee0e2406d60f8414e63be451a6439555cc1_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-operator-rhel8@sha256:711b4047d6732b195af78cda60bdc7baba8fc64ec3bc67e566aab05f14ef54f6_s390x",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-operator-rhel8@sha256:71895379c0dca4fca449a1aee75d8aad06e1e72be3dee726cbe4c4f8fbe84fe2_arm64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-operator-rhel8@sha256:9598f801ee479cb633d512b63a95659e05dbbd8d867e383dca5867f09e97e145_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-operator-rhel8@sha256:a152946ac895db8778f8db536f644a8a8b54f5db329918a8a9442e7aa729dc8c_ppc64le",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-rhel8@sha256:0b00334468578780a4e4b34c03260e57aa07ec47b0d4860b17c8ec964eb7634d_arm64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-rhel8@sha256:1d15d8b7f90327a4216efba353d61c94a9438e5a8df3e68da44907816943d0d3_ppc64le",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-rhel8@sha256:28b200a0ba2c8095d93fc95edbdcdf83b2507a7379f2842fc0a1b7cc5fdd839c_s390x",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-rhel8@sha256:3d24fd39236e7f3180ff2cbef7a28e2e30d9609f6ec0538a41ad4a602eabd12e_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.13:registry.redhat.io/quay/clair-rhel8@sha256:1342015f8900bc707d1f83ec9cce6d73a63be03ca39f15952d7c30188a5358df_arm64",
"Red Hat Quay 3.13:registry.redhat.io/quay/clair-rhel8@sha256:1badbeb73cfe6c33bbff6922f778fe967bccbaaff72898a391d02880e765aad7_ppc64le",
"Red Hat Quay 3.13:registry.redhat.io/quay/clair-rhel8@sha256:3824fc5efcc434b7af55f83541186eebe666e106f22856daec3844c32a80ac41_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/clair-rhel8@sha256:625daa899431d9a6526e65c8834435cd4b065cc9ad36406023f1ba3820032e9a_s390x",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:bd1a02c47b6c32010fe19de6a994577b2c49ed692606d185d4252bb5ba347ecb_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:32d1326be0b497a153790a58572bb83555d7fe756e782d719d31fd0912769bf4_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:45b58ff658a6736e113db8b69f1e762bf8ead59110903f5a2adc16ebf6cb532e_s390x",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8f2d0fc57d36feafb662d28136ebec46bad9047640cf126f2f4f49777ef5b357_ppc64le",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b416224b4baa5a3c8663454f355aee800e327b28c6f19e0618b64b55f8daaf37_arm64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:042fad54f97a923749bb9e28357f44c9ad55cc3e02ebd93386170d90aba8aed0_arm64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:83ed8f834f7f93e91ef92c4e62dd37ad41149a52a8feecc5221daff3eb24ec27_ppc64le",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:92f9ae720c5c444a3e81ca42987152a689d2eaaa661e28b4cbc0363f1eaf56ce_s390x",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:f635f510c78e52dedc4cbd4b721cc98446a58a03d6f245713e3aaf6ba6f6dd57_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-rhel8@sha256:0bb986d4f52cef09dd9a104660426a69d1f2c252b2f604758ae39a7cbaf7ee9b_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-rhel8@sha256:5e4bfa8a9a4aa227922af4e35dcb3f659d1672d53c4c79bc35d0594b7cabbae7_s390x",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-rhel8@sha256:6b8ae3a48b6237c6c689f1e62b3bb4eea645b5a3797a4e09e4a308f84f0c9ee7_arm64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-rhel8@sha256:8e4a2e7576bdf731816856a1c24c8d18292fe01df37393f845111a6df18b61a8_ppc64le",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:c0a8c5f5454426844c43f8732ed512ab30b5d4bd3e799fa3f133670d0ea431d5_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:38bcfcb8b18b9d0a84b108c9fde55fcda053c7cdbfc6f99639dd32d05f964756_s390x",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:9dd0249bc2ed6b1c2b26de52217d491204c925df3012df3ee3aeaaaa52b831b0_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:faba929adc7958495dae063add6f0e67b5c2a92cd5848b16e88654aec51cb5a9_arm64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:fdee61c8dad676392456956ee47d5404f4b7bbf341453322d14feb71eb7660ab_ppc64le",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-operator-bundle@sha256:e3bda08789b2ba41154d080a5f013ee0e2406d60f8414e63be451a6439555cc1_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-operator-rhel8@sha256:711b4047d6732b195af78cda60bdc7baba8fc64ec3bc67e566aab05f14ef54f6_s390x",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-operator-rhel8@sha256:71895379c0dca4fca449a1aee75d8aad06e1e72be3dee726cbe4c4f8fbe84fe2_arm64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-operator-rhel8@sha256:9598f801ee479cb633d512b63a95659e05dbbd8d867e383dca5867f09e97e145_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-operator-rhel8@sha256:a152946ac895db8778f8db536f644a8a8b54f5db329918a8a9442e7aa729dc8c_ppc64le",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-rhel8@sha256:0b00334468578780a4e4b34c03260e57aa07ec47b0d4860b17c8ec964eb7634d_arm64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-rhel8@sha256:1d15d8b7f90327a4216efba353d61c94a9438e5a8df3e68da44907816943d0d3_ppc64le",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-rhel8@sha256:28b200a0ba2c8095d93fc95edbdcdf83b2507a7379f2842fc0a1b7cc5fdd839c_s390x",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-rhel8@sha256:3d24fd39236e7f3180ff2cbef7a28e2e30d9609f6ec0538a41ad4a602eabd12e_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion"
},
{
"cve": "CVE-2025-47913",
"discovery_date": "2025-11-13T22:01:26.092452+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.13:registry.redhat.io/quay/clair-rhel8@sha256:1342015f8900bc707d1f83ec9cce6d73a63be03ca39f15952d7c30188a5358df_arm64",
"Red Hat Quay 3.13:registry.redhat.io/quay/clair-rhel8@sha256:1badbeb73cfe6c33bbff6922f778fe967bccbaaff72898a391d02880e765aad7_ppc64le",
"Red Hat Quay 3.13:registry.redhat.io/quay/clair-rhel8@sha256:3824fc5efcc434b7af55f83541186eebe666e106f22856daec3844c32a80ac41_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/clair-rhel8@sha256:625daa899431d9a6526e65c8834435cd4b065cc9ad36406023f1ba3820032e9a_s390x",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:bd1a02c47b6c32010fe19de6a994577b2c49ed692606d185d4252bb5ba347ecb_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:32d1326be0b497a153790a58572bb83555d7fe756e782d719d31fd0912769bf4_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:45b58ff658a6736e113db8b69f1e762bf8ead59110903f5a2adc16ebf6cb532e_s390x",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8f2d0fc57d36feafb662d28136ebec46bad9047640cf126f2f4f49777ef5b357_ppc64le",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b416224b4baa5a3c8663454f355aee800e327b28c6f19e0618b64b55f8daaf37_arm64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:042fad54f97a923749bb9e28357f44c9ad55cc3e02ebd93386170d90aba8aed0_arm64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:83ed8f834f7f93e91ef92c4e62dd37ad41149a52a8feecc5221daff3eb24ec27_ppc64le",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:92f9ae720c5c444a3e81ca42987152a689d2eaaa661e28b4cbc0363f1eaf56ce_s390x",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:f635f510c78e52dedc4cbd4b721cc98446a58a03d6f245713e3aaf6ba6f6dd57_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:c0a8c5f5454426844c43f8732ed512ab30b5d4bd3e799fa3f133670d0ea431d5_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:38bcfcb8b18b9d0a84b108c9fde55fcda053c7cdbfc6f99639dd32d05f964756_s390x",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:9dd0249bc2ed6b1c2b26de52217d491204c925df3012df3ee3aeaaaa52b831b0_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:faba929adc7958495dae063add6f0e67b5c2a92cd5848b16e88654aec51cb5a9_arm64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:fdee61c8dad676392456956ee47d5404f4b7bbf341453322d14feb71eb7660ab_ppc64le",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-operator-bundle@sha256:e3bda08789b2ba41154d080a5f013ee0e2406d60f8414e63be451a6439555cc1_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-operator-rhel8@sha256:711b4047d6732b195af78cda60bdc7baba8fc64ec3bc67e566aab05f14ef54f6_s390x",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-operator-rhel8@sha256:71895379c0dca4fca449a1aee75d8aad06e1e72be3dee726cbe4c4f8fbe84fe2_arm64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-operator-rhel8@sha256:9598f801ee479cb633d512b63a95659e05dbbd8d867e383dca5867f09e97e145_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-operator-rhel8@sha256:a152946ac895db8778f8db536f644a8a8b54f5db329918a8a9442e7aa729dc8c_ppc64le",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-rhel8@sha256:0b00334468578780a4e4b34c03260e57aa07ec47b0d4860b17c8ec964eb7634d_arm64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-rhel8@sha256:1d15d8b7f90327a4216efba353d61c94a9438e5a8df3e68da44907816943d0d3_ppc64le",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-rhel8@sha256:28b200a0ba2c8095d93fc95edbdcdf83b2507a7379f2842fc0a1b7cc5fdd839c_s390x",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-rhel8@sha256:3d24fd39236e7f3180ff2cbef7a28e2e30d9609f6ec0538a41ad4a602eabd12e_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2414943"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in golang.org/x/crypto/ssh/agent causes the SSH agent client to panic when a peer responds with the generic SSH_AGENT_SUCCESS (0x06) message to requests expecting typed replies (e.g., List, Sign). The unmarshal layer produces an unexpected message type, which the client code does not handle, leading to panic(\"unreachable\") or a nil-pointer dereference. A malicious agent or forwarded connection can exploit this to terminate the client process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang.org/x/crypto/ssh/agent: golang.org/x/crypto/ssh/agent: SSH client panic due to unexpected SSH_AGENT_SUCCESS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability was marked as Important because it allows any malicious or misbehaving SSH agent to force a crash in the client process using a single valid protocol byte. The panic occurs before the client has a chance to validate message structure or recover, which means an attacker controlling\u2014or intercepting\u2014SSH agent traffic can reliably terminate processes that rely on agent interactions. In environments where SSH agents operate over forwarded sockets, shared workspaces, or CI/CD runners, this turns into a reliable, unauthenticated remote denial of service against critical automation or developer tooling. The flaw also stems from unsafe assumptions in the unmarshalling logic, where unexpected but protocol-legal message types drop into \u201cunreachable\u201d code paths instead of being handled gracefully\u2014making it a design-level reliability break rather than a simple error-handling bug. For this reason, it is rated as an important availability-impacting vulnerability rather than a moderate issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-rhel8@sha256:0bb986d4f52cef09dd9a104660426a69d1f2c252b2f604758ae39a7cbaf7ee9b_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-rhel8@sha256:5e4bfa8a9a4aa227922af4e35dcb3f659d1672d53c4c79bc35d0594b7cabbae7_s390x",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-rhel8@sha256:6b8ae3a48b6237c6c689f1e62b3bb4eea645b5a3797a4e09e4a308f84f0c9ee7_arm64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-rhel8@sha256:8e4a2e7576bdf731816856a1c24c8d18292fe01df37393f845111a6df18b61a8_ppc64le"
],
"known_not_affected": [
"Red Hat Quay 3.13:registry.redhat.io/quay/clair-rhel8@sha256:1342015f8900bc707d1f83ec9cce6d73a63be03ca39f15952d7c30188a5358df_arm64",
"Red Hat Quay 3.13:registry.redhat.io/quay/clair-rhel8@sha256:1badbeb73cfe6c33bbff6922f778fe967bccbaaff72898a391d02880e765aad7_ppc64le",
"Red Hat Quay 3.13:registry.redhat.io/quay/clair-rhel8@sha256:3824fc5efcc434b7af55f83541186eebe666e106f22856daec3844c32a80ac41_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/clair-rhel8@sha256:625daa899431d9a6526e65c8834435cd4b065cc9ad36406023f1ba3820032e9a_s390x",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:bd1a02c47b6c32010fe19de6a994577b2c49ed692606d185d4252bb5ba347ecb_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:32d1326be0b497a153790a58572bb83555d7fe756e782d719d31fd0912769bf4_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:45b58ff658a6736e113db8b69f1e762bf8ead59110903f5a2adc16ebf6cb532e_s390x",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8f2d0fc57d36feafb662d28136ebec46bad9047640cf126f2f4f49777ef5b357_ppc64le",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b416224b4baa5a3c8663454f355aee800e327b28c6f19e0618b64b55f8daaf37_arm64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:042fad54f97a923749bb9e28357f44c9ad55cc3e02ebd93386170d90aba8aed0_arm64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:83ed8f834f7f93e91ef92c4e62dd37ad41149a52a8feecc5221daff3eb24ec27_ppc64le",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:92f9ae720c5c444a3e81ca42987152a689d2eaaa661e28b4cbc0363f1eaf56ce_s390x",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:f635f510c78e52dedc4cbd4b721cc98446a58a03d6f245713e3aaf6ba6f6dd57_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:c0a8c5f5454426844c43f8732ed512ab30b5d4bd3e799fa3f133670d0ea431d5_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:38bcfcb8b18b9d0a84b108c9fde55fcda053c7cdbfc6f99639dd32d05f964756_s390x",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:9dd0249bc2ed6b1c2b26de52217d491204c925df3012df3ee3aeaaaa52b831b0_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:faba929adc7958495dae063add6f0e67b5c2a92cd5848b16e88654aec51cb5a9_arm64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:fdee61c8dad676392456956ee47d5404f4b7bbf341453322d14feb71eb7660ab_ppc64le",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-operator-bundle@sha256:e3bda08789b2ba41154d080a5f013ee0e2406d60f8414e63be451a6439555cc1_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-operator-rhel8@sha256:711b4047d6732b195af78cda60bdc7baba8fc64ec3bc67e566aab05f14ef54f6_s390x",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-operator-rhel8@sha256:71895379c0dca4fca449a1aee75d8aad06e1e72be3dee726cbe4c4f8fbe84fe2_arm64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-operator-rhel8@sha256:9598f801ee479cb633d512b63a95659e05dbbd8d867e383dca5867f09e97e145_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-operator-rhel8@sha256:a152946ac895db8778f8db536f644a8a8b54f5db329918a8a9442e7aa729dc8c_ppc64le",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-rhel8@sha256:0b00334468578780a4e4b34c03260e57aa07ec47b0d4860b17c8ec964eb7634d_arm64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-rhel8@sha256:1d15d8b7f90327a4216efba353d61c94a9438e5a8df3e68da44907816943d0d3_ppc64le",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-rhel8@sha256:28b200a0ba2c8095d93fc95edbdcdf83b2507a7379f2842fc0a1b7cc5fdd839c_s390x",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-rhel8@sha256:3d24fd39236e7f3180ff2cbef7a28e2e30d9609f6ec0538a41ad4a602eabd12e_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-47913"
},
{
"category": "external",
"summary": "RHBZ#2414943",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2414943"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-47913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47913"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-47913",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47913"
},
{
"category": "external",
"summary": "https://github.com/advisories/GHSA-hcg3-q754-cr77",
"url": "https://github.com/advisories/GHSA-hcg3-q754-cr77"
},
{
"category": "external",
"summary": "https://go.dev/cl/700295",
"url": "https://go.dev/cl/700295"
},
{
"category": "external",
"summary": "https://go.dev/issue/75178",
"url": "https://go.dev/issue/75178"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4116",
"url": "https://pkg.go.dev/vuln/GO-2025-4116"
}
],
"release_date": "2025-11-13T21:29:39.907000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-12-15T07:13:36+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11358",
"product_ids": [
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-rhel8@sha256:0bb986d4f52cef09dd9a104660426a69d1f2c252b2f604758ae39a7cbaf7ee9b_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-rhel8@sha256:5e4bfa8a9a4aa227922af4e35dcb3f659d1672d53c4c79bc35d0594b7cabbae7_s390x",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-rhel8@sha256:6b8ae3a48b6237c6c689f1e62b3bb4eea645b5a3797a4e09e4a308f84f0c9ee7_arm64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-rhel8@sha256:8e4a2e7576bdf731816856a1c24c8d18292fe01df37393f845111a6df18b61a8_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:23176"
},
{
"category": "workaround",
"details": "No mitigation is currently available that meets Red Hat Product Security\u2019s standards for usability, deployment, applicability, or stability.",
"product_ids": [
"Red Hat Quay 3.13:registry.redhat.io/quay/clair-rhel8@sha256:1342015f8900bc707d1f83ec9cce6d73a63be03ca39f15952d7c30188a5358df_arm64",
"Red Hat Quay 3.13:registry.redhat.io/quay/clair-rhel8@sha256:1badbeb73cfe6c33bbff6922f778fe967bccbaaff72898a391d02880e765aad7_ppc64le",
"Red Hat Quay 3.13:registry.redhat.io/quay/clair-rhel8@sha256:3824fc5efcc434b7af55f83541186eebe666e106f22856daec3844c32a80ac41_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/clair-rhel8@sha256:625daa899431d9a6526e65c8834435cd4b065cc9ad36406023f1ba3820032e9a_s390x",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:bd1a02c47b6c32010fe19de6a994577b2c49ed692606d185d4252bb5ba347ecb_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:32d1326be0b497a153790a58572bb83555d7fe756e782d719d31fd0912769bf4_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:45b58ff658a6736e113db8b69f1e762bf8ead59110903f5a2adc16ebf6cb532e_s390x",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8f2d0fc57d36feafb662d28136ebec46bad9047640cf126f2f4f49777ef5b357_ppc64le",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b416224b4baa5a3c8663454f355aee800e327b28c6f19e0618b64b55f8daaf37_arm64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:042fad54f97a923749bb9e28357f44c9ad55cc3e02ebd93386170d90aba8aed0_arm64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:83ed8f834f7f93e91ef92c4e62dd37ad41149a52a8feecc5221daff3eb24ec27_ppc64le",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:92f9ae720c5c444a3e81ca42987152a689d2eaaa661e28b4cbc0363f1eaf56ce_s390x",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:f635f510c78e52dedc4cbd4b721cc98446a58a03d6f245713e3aaf6ba6f6dd57_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-rhel8@sha256:0bb986d4f52cef09dd9a104660426a69d1f2c252b2f604758ae39a7cbaf7ee9b_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-rhel8@sha256:5e4bfa8a9a4aa227922af4e35dcb3f659d1672d53c4c79bc35d0594b7cabbae7_s390x",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-rhel8@sha256:6b8ae3a48b6237c6c689f1e62b3bb4eea645b5a3797a4e09e4a308f84f0c9ee7_arm64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-rhel8@sha256:8e4a2e7576bdf731816856a1c24c8d18292fe01df37393f845111a6df18b61a8_ppc64le",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:c0a8c5f5454426844c43f8732ed512ab30b5d4bd3e799fa3f133670d0ea431d5_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:38bcfcb8b18b9d0a84b108c9fde55fcda053c7cdbfc6f99639dd32d05f964756_s390x",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:9dd0249bc2ed6b1c2b26de52217d491204c925df3012df3ee3aeaaaa52b831b0_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:faba929adc7958495dae063add6f0e67b5c2a92cd5848b16e88654aec51cb5a9_arm64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:fdee61c8dad676392456956ee47d5404f4b7bbf341453322d14feb71eb7660ab_ppc64le",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-operator-bundle@sha256:e3bda08789b2ba41154d080a5f013ee0e2406d60f8414e63be451a6439555cc1_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-operator-rhel8@sha256:711b4047d6732b195af78cda60bdc7baba8fc64ec3bc67e566aab05f14ef54f6_s390x",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-operator-rhel8@sha256:71895379c0dca4fca449a1aee75d8aad06e1e72be3dee726cbe4c4f8fbe84fe2_arm64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-operator-rhel8@sha256:9598f801ee479cb633d512b63a95659e05dbbd8d867e383dca5867f09e97e145_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-operator-rhel8@sha256:a152946ac895db8778f8db536f644a8a8b54f5db329918a8a9442e7aa729dc8c_ppc64le",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-rhel8@sha256:0b00334468578780a4e4b34c03260e57aa07ec47b0d4860b17c8ec964eb7634d_arm64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-rhel8@sha256:1d15d8b7f90327a4216efba353d61c94a9438e5a8df3e68da44907816943d0d3_ppc64le",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-rhel8@sha256:28b200a0ba2c8095d93fc95edbdcdf83b2507a7379f2842fc0a1b7cc5fdd839c_s390x",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-rhel8@sha256:3d24fd39236e7f3180ff2cbef7a28e2e30d9609f6ec0538a41ad4a602eabd12e_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.13:registry.redhat.io/quay/clair-rhel8@sha256:1342015f8900bc707d1f83ec9cce6d73a63be03ca39f15952d7c30188a5358df_arm64",
"Red Hat Quay 3.13:registry.redhat.io/quay/clair-rhel8@sha256:1badbeb73cfe6c33bbff6922f778fe967bccbaaff72898a391d02880e765aad7_ppc64le",
"Red Hat Quay 3.13:registry.redhat.io/quay/clair-rhel8@sha256:3824fc5efcc434b7af55f83541186eebe666e106f22856daec3844c32a80ac41_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/clair-rhel8@sha256:625daa899431d9a6526e65c8834435cd4b065cc9ad36406023f1ba3820032e9a_s390x",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:bd1a02c47b6c32010fe19de6a994577b2c49ed692606d185d4252bb5ba347ecb_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:32d1326be0b497a153790a58572bb83555d7fe756e782d719d31fd0912769bf4_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:45b58ff658a6736e113db8b69f1e762bf8ead59110903f5a2adc16ebf6cb532e_s390x",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8f2d0fc57d36feafb662d28136ebec46bad9047640cf126f2f4f49777ef5b357_ppc64le",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b416224b4baa5a3c8663454f355aee800e327b28c6f19e0618b64b55f8daaf37_arm64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:042fad54f97a923749bb9e28357f44c9ad55cc3e02ebd93386170d90aba8aed0_arm64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:83ed8f834f7f93e91ef92c4e62dd37ad41149a52a8feecc5221daff3eb24ec27_ppc64le",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:92f9ae720c5c444a3e81ca42987152a689d2eaaa661e28b4cbc0363f1eaf56ce_s390x",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:f635f510c78e52dedc4cbd4b721cc98446a58a03d6f245713e3aaf6ba6f6dd57_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-rhel8@sha256:0bb986d4f52cef09dd9a104660426a69d1f2c252b2f604758ae39a7cbaf7ee9b_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-rhel8@sha256:5e4bfa8a9a4aa227922af4e35dcb3f659d1672d53c4c79bc35d0594b7cabbae7_s390x",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-rhel8@sha256:6b8ae3a48b6237c6c689f1e62b3bb4eea645b5a3797a4e09e4a308f84f0c9ee7_arm64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-rhel8@sha256:8e4a2e7576bdf731816856a1c24c8d18292fe01df37393f845111a6df18b61a8_ppc64le",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:c0a8c5f5454426844c43f8732ed512ab30b5d4bd3e799fa3f133670d0ea431d5_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:38bcfcb8b18b9d0a84b108c9fde55fcda053c7cdbfc6f99639dd32d05f964756_s390x",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:9dd0249bc2ed6b1c2b26de52217d491204c925df3012df3ee3aeaaaa52b831b0_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:faba929adc7958495dae063add6f0e67b5c2a92cd5848b16e88654aec51cb5a9_arm64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:fdee61c8dad676392456956ee47d5404f4b7bbf341453322d14feb71eb7660ab_ppc64le",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-operator-bundle@sha256:e3bda08789b2ba41154d080a5f013ee0e2406d60f8414e63be451a6439555cc1_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-operator-rhel8@sha256:711b4047d6732b195af78cda60bdc7baba8fc64ec3bc67e566aab05f14ef54f6_s390x",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-operator-rhel8@sha256:71895379c0dca4fca449a1aee75d8aad06e1e72be3dee726cbe4c4f8fbe84fe2_arm64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-operator-rhel8@sha256:9598f801ee479cb633d512b63a95659e05dbbd8d867e383dca5867f09e97e145_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-operator-rhel8@sha256:a152946ac895db8778f8db536f644a8a8b54f5db329918a8a9442e7aa729dc8c_ppc64le",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-rhel8@sha256:0b00334468578780a4e4b34c03260e57aa07ec47b0d4860b17c8ec964eb7634d_arm64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-rhel8@sha256:1d15d8b7f90327a4216efba353d61c94a9438e5a8df3e68da44907816943d0d3_ppc64le",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-rhel8@sha256:28b200a0ba2c8095d93fc95edbdcdf83b2507a7379f2842fc0a1b7cc5fdd839c_s390x",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-rhel8@sha256:3d24fd39236e7f3180ff2cbef7a28e2e30d9609f6ec0538a41ad4a602eabd12e_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang.org/x/crypto/ssh/agent: golang.org/x/crypto/ssh/agent: SSH client panic due to unexpected SSH_AGENT_SUCCESS"
},
{
"cve": "CVE-2025-59420",
"cwe": {
"id": "CWE-440",
"name": "Expected Behavior Violation"
},
"discovery_date": "2025-09-22T18:01:35.379361+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.13:registry.redhat.io/quay/clair-rhel8@sha256:1342015f8900bc707d1f83ec9cce6d73a63be03ca39f15952d7c30188a5358df_arm64",
"Red Hat Quay 3.13:registry.redhat.io/quay/clair-rhel8@sha256:1badbeb73cfe6c33bbff6922f778fe967bccbaaff72898a391d02880e765aad7_ppc64le",
"Red Hat Quay 3.13:registry.redhat.io/quay/clair-rhel8@sha256:3824fc5efcc434b7af55f83541186eebe666e106f22856daec3844c32a80ac41_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/clair-rhel8@sha256:625daa899431d9a6526e65c8834435cd4b065cc9ad36406023f1ba3820032e9a_s390x",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:bd1a02c47b6c32010fe19de6a994577b2c49ed692606d185d4252bb5ba347ecb_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:32d1326be0b497a153790a58572bb83555d7fe756e782d719d31fd0912769bf4_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:45b58ff658a6736e113db8b69f1e762bf8ead59110903f5a2adc16ebf6cb532e_s390x",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8f2d0fc57d36feafb662d28136ebec46bad9047640cf126f2f4f49777ef5b357_ppc64le",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b416224b4baa5a3c8663454f355aee800e327b28c6f19e0618b64b55f8daaf37_arm64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:042fad54f97a923749bb9e28357f44c9ad55cc3e02ebd93386170d90aba8aed0_arm64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:83ed8f834f7f93e91ef92c4e62dd37ad41149a52a8feecc5221daff3eb24ec27_ppc64le",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:92f9ae720c5c444a3e81ca42987152a689d2eaaa661e28b4cbc0363f1eaf56ce_s390x",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:f635f510c78e52dedc4cbd4b721cc98446a58a03d6f245713e3aaf6ba6f6dd57_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-rhel8@sha256:0bb986d4f52cef09dd9a104660426a69d1f2c252b2f604758ae39a7cbaf7ee9b_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-rhel8@sha256:5e4bfa8a9a4aa227922af4e35dcb3f659d1672d53c4c79bc35d0594b7cabbae7_s390x",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-rhel8@sha256:6b8ae3a48b6237c6c689f1e62b3bb4eea645b5a3797a4e09e4a308f84f0c9ee7_arm64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-rhel8@sha256:8e4a2e7576bdf731816856a1c24c8d18292fe01df37393f845111a6df18b61a8_ppc64le",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:c0a8c5f5454426844c43f8732ed512ab30b5d4bd3e799fa3f133670d0ea431d5_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:38bcfcb8b18b9d0a84b108c9fde55fcda053c7cdbfc6f99639dd32d05f964756_s390x",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:9dd0249bc2ed6b1c2b26de52217d491204c925df3012df3ee3aeaaaa52b831b0_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:faba929adc7958495dae063add6f0e67b5c2a92cd5848b16e88654aec51cb5a9_arm64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:fdee61c8dad676392456956ee47d5404f4b7bbf341453322d14feb71eb7660ab_ppc64le",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-operator-bundle@sha256:e3bda08789b2ba41154d080a5f013ee0e2406d60f8414e63be451a6439555cc1_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-operator-rhel8@sha256:711b4047d6732b195af78cda60bdc7baba8fc64ec3bc67e566aab05f14ef54f6_s390x",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-operator-rhel8@sha256:71895379c0dca4fca449a1aee75d8aad06e1e72be3dee726cbe4c4f8fbe84fe2_arm64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-operator-rhel8@sha256:9598f801ee479cb633d512b63a95659e05dbbd8d867e383dca5867f09e97e145_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-operator-rhel8@sha256:a152946ac895db8778f8db536f644a8a8b54f5db329918a8a9442e7aa729dc8c_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2397460"
}
],
"notes": [
{
"category": "description",
"text": "Authlib\u2019s JWS verification accepts tokens that declare unknown critical header parameters (crit), violating RFC 7515 \u201cmust\u2011understand\u201d semantics. An attacker can craft a signed token with a critical header (for example, bork or cnf) that strict verifiers reject but Authlib accepts. In mixed\u2011language fleets, this enables split\u2011brain verification and can lead to policy bypass, replay, or privilege escalation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "authlib: Authlib RFC violation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-rhel8@sha256:0b00334468578780a4e4b34c03260e57aa07ec47b0d4860b17c8ec964eb7634d_arm64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-rhel8@sha256:1d15d8b7f90327a4216efba353d61c94a9438e5a8df3e68da44907816943d0d3_ppc64le",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-rhel8@sha256:28b200a0ba2c8095d93fc95edbdcdf83b2507a7379f2842fc0a1b7cc5fdd839c_s390x",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-rhel8@sha256:3d24fd39236e7f3180ff2cbef7a28e2e30d9609f6ec0538a41ad4a602eabd12e_amd64"
],
"known_not_affected": [
"Red Hat Quay 3.13:registry.redhat.io/quay/clair-rhel8@sha256:1342015f8900bc707d1f83ec9cce6d73a63be03ca39f15952d7c30188a5358df_arm64",
"Red Hat Quay 3.13:registry.redhat.io/quay/clair-rhel8@sha256:1badbeb73cfe6c33bbff6922f778fe967bccbaaff72898a391d02880e765aad7_ppc64le",
"Red Hat Quay 3.13:registry.redhat.io/quay/clair-rhel8@sha256:3824fc5efcc434b7af55f83541186eebe666e106f22856daec3844c32a80ac41_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/clair-rhel8@sha256:625daa899431d9a6526e65c8834435cd4b065cc9ad36406023f1ba3820032e9a_s390x",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:bd1a02c47b6c32010fe19de6a994577b2c49ed692606d185d4252bb5ba347ecb_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:32d1326be0b497a153790a58572bb83555d7fe756e782d719d31fd0912769bf4_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:45b58ff658a6736e113db8b69f1e762bf8ead59110903f5a2adc16ebf6cb532e_s390x",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8f2d0fc57d36feafb662d28136ebec46bad9047640cf126f2f4f49777ef5b357_ppc64le",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b416224b4baa5a3c8663454f355aee800e327b28c6f19e0618b64b55f8daaf37_arm64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:042fad54f97a923749bb9e28357f44c9ad55cc3e02ebd93386170d90aba8aed0_arm64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:83ed8f834f7f93e91ef92c4e62dd37ad41149a52a8feecc5221daff3eb24ec27_ppc64le",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:92f9ae720c5c444a3e81ca42987152a689d2eaaa661e28b4cbc0363f1eaf56ce_s390x",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:f635f510c78e52dedc4cbd4b721cc98446a58a03d6f245713e3aaf6ba6f6dd57_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-rhel8@sha256:0bb986d4f52cef09dd9a104660426a69d1f2c252b2f604758ae39a7cbaf7ee9b_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-rhel8@sha256:5e4bfa8a9a4aa227922af4e35dcb3f659d1672d53c4c79bc35d0594b7cabbae7_s390x",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-rhel8@sha256:6b8ae3a48b6237c6c689f1e62b3bb4eea645b5a3797a4e09e4a308f84f0c9ee7_arm64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-rhel8@sha256:8e4a2e7576bdf731816856a1c24c8d18292fe01df37393f845111a6df18b61a8_ppc64le",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:c0a8c5f5454426844c43f8732ed512ab30b5d4bd3e799fa3f133670d0ea431d5_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:38bcfcb8b18b9d0a84b108c9fde55fcda053c7cdbfc6f99639dd32d05f964756_s390x",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:9dd0249bc2ed6b1c2b26de52217d491204c925df3012df3ee3aeaaaa52b831b0_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:faba929adc7958495dae063add6f0e67b5c2a92cd5848b16e88654aec51cb5a9_arm64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:fdee61c8dad676392456956ee47d5404f4b7bbf341453322d14feb71eb7660ab_ppc64le",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-operator-bundle@sha256:e3bda08789b2ba41154d080a5f013ee0e2406d60f8414e63be451a6439555cc1_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-operator-rhel8@sha256:711b4047d6732b195af78cda60bdc7baba8fc64ec3bc67e566aab05f14ef54f6_s390x",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-operator-rhel8@sha256:71895379c0dca4fca449a1aee75d8aad06e1e72be3dee726cbe4c4f8fbe84fe2_arm64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-operator-rhel8@sha256:9598f801ee479cb633d512b63a95659e05dbbd8d867e383dca5867f09e97e145_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-operator-rhel8@sha256:a152946ac895db8778f8db536f644a8a8b54f5db329918a8a9442e7aa729dc8c_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-59420"
},
{
"category": "external",
"summary": "RHBZ#2397460",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2397460"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-59420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59420"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-59420",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-59420"
},
{
"category": "external",
"summary": "https://github.com/authlib/authlib/commit/6b1813e4392eb7c168c276099ff7783b176479df",
"url": "https://github.com/authlib/authlib/commit/6b1813e4392eb7c168c276099ff7783b176479df"
},
{
"category": "external",
"summary": "https://github.com/authlib/authlib/security/advisories/GHSA-9ggr-2464-2j32",
"url": "https://github.com/authlib/authlib/security/advisories/GHSA-9ggr-2464-2j32"
}
],
"release_date": "2025-09-22T17:28:53.869000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-12-15T07:13:36+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11358",
"product_ids": [
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-rhel8@sha256:0b00334468578780a4e4b34c03260e57aa07ec47b0d4860b17c8ec964eb7634d_arm64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-rhel8@sha256:1d15d8b7f90327a4216efba353d61c94a9438e5a8df3e68da44907816943d0d3_ppc64le",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-rhel8@sha256:28b200a0ba2c8095d93fc95edbdcdf83b2507a7379f2842fc0a1b7cc5fdd839c_s390x",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-rhel8@sha256:3d24fd39236e7f3180ff2cbef7a28e2e30d9609f6ec0538a41ad4a602eabd12e_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:23176"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Quay 3.13:registry.redhat.io/quay/clair-rhel8@sha256:1342015f8900bc707d1f83ec9cce6d73a63be03ca39f15952d7c30188a5358df_arm64",
"Red Hat Quay 3.13:registry.redhat.io/quay/clair-rhel8@sha256:1badbeb73cfe6c33bbff6922f778fe967bccbaaff72898a391d02880e765aad7_ppc64le",
"Red Hat Quay 3.13:registry.redhat.io/quay/clair-rhel8@sha256:3824fc5efcc434b7af55f83541186eebe666e106f22856daec3844c32a80ac41_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/clair-rhel8@sha256:625daa899431d9a6526e65c8834435cd4b065cc9ad36406023f1ba3820032e9a_s390x",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:bd1a02c47b6c32010fe19de6a994577b2c49ed692606d185d4252bb5ba347ecb_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:32d1326be0b497a153790a58572bb83555d7fe756e782d719d31fd0912769bf4_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:45b58ff658a6736e113db8b69f1e762bf8ead59110903f5a2adc16ebf6cb532e_s390x",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8f2d0fc57d36feafb662d28136ebec46bad9047640cf126f2f4f49777ef5b357_ppc64le",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b416224b4baa5a3c8663454f355aee800e327b28c6f19e0618b64b55f8daaf37_arm64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:042fad54f97a923749bb9e28357f44c9ad55cc3e02ebd93386170d90aba8aed0_arm64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:83ed8f834f7f93e91ef92c4e62dd37ad41149a52a8feecc5221daff3eb24ec27_ppc64le",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:92f9ae720c5c444a3e81ca42987152a689d2eaaa661e28b4cbc0363f1eaf56ce_s390x",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:f635f510c78e52dedc4cbd4b721cc98446a58a03d6f245713e3aaf6ba6f6dd57_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-rhel8@sha256:0bb986d4f52cef09dd9a104660426a69d1f2c252b2f604758ae39a7cbaf7ee9b_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-rhel8@sha256:5e4bfa8a9a4aa227922af4e35dcb3f659d1672d53c4c79bc35d0594b7cabbae7_s390x",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-rhel8@sha256:6b8ae3a48b6237c6c689f1e62b3bb4eea645b5a3797a4e09e4a308f84f0c9ee7_arm64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-rhel8@sha256:8e4a2e7576bdf731816856a1c24c8d18292fe01df37393f845111a6df18b61a8_ppc64le",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:c0a8c5f5454426844c43f8732ed512ab30b5d4bd3e799fa3f133670d0ea431d5_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:38bcfcb8b18b9d0a84b108c9fde55fcda053c7cdbfc6f99639dd32d05f964756_s390x",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:9dd0249bc2ed6b1c2b26de52217d491204c925df3012df3ee3aeaaaa52b831b0_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:faba929adc7958495dae063add6f0e67b5c2a92cd5848b16e88654aec51cb5a9_arm64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:fdee61c8dad676392456956ee47d5404f4b7bbf341453322d14feb71eb7660ab_ppc64le",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-operator-bundle@sha256:e3bda08789b2ba41154d080a5f013ee0e2406d60f8414e63be451a6439555cc1_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-operator-rhel8@sha256:711b4047d6732b195af78cda60bdc7baba8fc64ec3bc67e566aab05f14ef54f6_s390x",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-operator-rhel8@sha256:71895379c0dca4fca449a1aee75d8aad06e1e72be3dee726cbe4c4f8fbe84fe2_arm64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-operator-rhel8@sha256:9598f801ee479cb633d512b63a95659e05dbbd8d867e383dca5867f09e97e145_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-operator-rhel8@sha256:a152946ac895db8778f8db536f644a8a8b54f5db329918a8a9442e7aa729dc8c_ppc64le",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-rhel8@sha256:0b00334468578780a4e4b34c03260e57aa07ec47b0d4860b17c8ec964eb7634d_arm64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-rhel8@sha256:1d15d8b7f90327a4216efba353d61c94a9438e5a8df3e68da44907816943d0d3_ppc64le",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-rhel8@sha256:28b200a0ba2c8095d93fc95edbdcdf83b2507a7379f2842fc0a1b7cc5fdd839c_s390x",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-rhel8@sha256:3d24fd39236e7f3180ff2cbef7a28e2e30d9609f6ec0538a41ad4a602eabd12e_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.13:registry.redhat.io/quay/clair-rhel8@sha256:1342015f8900bc707d1f83ec9cce6d73a63be03ca39f15952d7c30188a5358df_arm64",
"Red Hat Quay 3.13:registry.redhat.io/quay/clair-rhel8@sha256:1badbeb73cfe6c33bbff6922f778fe967bccbaaff72898a391d02880e765aad7_ppc64le",
"Red Hat Quay 3.13:registry.redhat.io/quay/clair-rhel8@sha256:3824fc5efcc434b7af55f83541186eebe666e106f22856daec3844c32a80ac41_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/clair-rhel8@sha256:625daa899431d9a6526e65c8834435cd4b065cc9ad36406023f1ba3820032e9a_s390x",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:bd1a02c47b6c32010fe19de6a994577b2c49ed692606d185d4252bb5ba347ecb_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:32d1326be0b497a153790a58572bb83555d7fe756e782d719d31fd0912769bf4_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:45b58ff658a6736e113db8b69f1e762bf8ead59110903f5a2adc16ebf6cb532e_s390x",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8f2d0fc57d36feafb662d28136ebec46bad9047640cf126f2f4f49777ef5b357_ppc64le",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b416224b4baa5a3c8663454f355aee800e327b28c6f19e0618b64b55f8daaf37_arm64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:042fad54f97a923749bb9e28357f44c9ad55cc3e02ebd93386170d90aba8aed0_arm64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:83ed8f834f7f93e91ef92c4e62dd37ad41149a52a8feecc5221daff3eb24ec27_ppc64le",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:92f9ae720c5c444a3e81ca42987152a689d2eaaa661e28b4cbc0363f1eaf56ce_s390x",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:f635f510c78e52dedc4cbd4b721cc98446a58a03d6f245713e3aaf6ba6f6dd57_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-rhel8@sha256:0bb986d4f52cef09dd9a104660426a69d1f2c252b2f604758ae39a7cbaf7ee9b_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-rhel8@sha256:5e4bfa8a9a4aa227922af4e35dcb3f659d1672d53c4c79bc35d0594b7cabbae7_s390x",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-rhel8@sha256:6b8ae3a48b6237c6c689f1e62b3bb4eea645b5a3797a4e09e4a308f84f0c9ee7_arm64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-rhel8@sha256:8e4a2e7576bdf731816856a1c24c8d18292fe01df37393f845111a6df18b61a8_ppc64le",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:c0a8c5f5454426844c43f8732ed512ab30b5d4bd3e799fa3f133670d0ea431d5_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:38bcfcb8b18b9d0a84b108c9fde55fcda053c7cdbfc6f99639dd32d05f964756_s390x",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:9dd0249bc2ed6b1c2b26de52217d491204c925df3012df3ee3aeaaaa52b831b0_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:faba929adc7958495dae063add6f0e67b5c2a92cd5848b16e88654aec51cb5a9_arm64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:fdee61c8dad676392456956ee47d5404f4b7bbf341453322d14feb71eb7660ab_ppc64le",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-operator-bundle@sha256:e3bda08789b2ba41154d080a5f013ee0e2406d60f8414e63be451a6439555cc1_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-operator-rhel8@sha256:711b4047d6732b195af78cda60bdc7baba8fc64ec3bc67e566aab05f14ef54f6_s390x",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-operator-rhel8@sha256:71895379c0dca4fca449a1aee75d8aad06e1e72be3dee726cbe4c4f8fbe84fe2_arm64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-operator-rhel8@sha256:9598f801ee479cb633d512b63a95659e05dbbd8d867e383dca5867f09e97e145_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-operator-rhel8@sha256:a152946ac895db8778f8db536f644a8a8b54f5db329918a8a9442e7aa729dc8c_ppc64le",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-rhel8@sha256:0b00334468578780a4e4b34c03260e57aa07ec47b0d4860b17c8ec964eb7634d_arm64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-rhel8@sha256:1d15d8b7f90327a4216efba353d61c94a9438e5a8df3e68da44907816943d0d3_ppc64le",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-rhel8@sha256:28b200a0ba2c8095d93fc95edbdcdf83b2507a7379f2842fc0a1b7cc5fdd839c_s390x",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-rhel8@sha256:3d24fd39236e7f3180ff2cbef7a28e2e30d9609f6ec0538a41ad4a602eabd12e_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "authlib: Authlib RFC violation"
},
{
"cve": "CVE-2025-61920",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2025-10-10T20:01:12.833962+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.13:registry.redhat.io/quay/clair-rhel8@sha256:1342015f8900bc707d1f83ec9cce6d73a63be03ca39f15952d7c30188a5358df_arm64",
"Red Hat Quay 3.13:registry.redhat.io/quay/clair-rhel8@sha256:1badbeb73cfe6c33bbff6922f778fe967bccbaaff72898a391d02880e765aad7_ppc64le",
"Red Hat Quay 3.13:registry.redhat.io/quay/clair-rhel8@sha256:3824fc5efcc434b7af55f83541186eebe666e106f22856daec3844c32a80ac41_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/clair-rhel8@sha256:625daa899431d9a6526e65c8834435cd4b065cc9ad36406023f1ba3820032e9a_s390x",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:bd1a02c47b6c32010fe19de6a994577b2c49ed692606d185d4252bb5ba347ecb_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:32d1326be0b497a153790a58572bb83555d7fe756e782d719d31fd0912769bf4_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:45b58ff658a6736e113db8b69f1e762bf8ead59110903f5a2adc16ebf6cb532e_s390x",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8f2d0fc57d36feafb662d28136ebec46bad9047640cf126f2f4f49777ef5b357_ppc64le",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b416224b4baa5a3c8663454f355aee800e327b28c6f19e0618b64b55f8daaf37_arm64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:042fad54f97a923749bb9e28357f44c9ad55cc3e02ebd93386170d90aba8aed0_arm64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:83ed8f834f7f93e91ef92c4e62dd37ad41149a52a8feecc5221daff3eb24ec27_ppc64le",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:92f9ae720c5c444a3e81ca42987152a689d2eaaa661e28b4cbc0363f1eaf56ce_s390x",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:f635f510c78e52dedc4cbd4b721cc98446a58a03d6f245713e3aaf6ba6f6dd57_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-rhel8@sha256:0bb986d4f52cef09dd9a104660426a69d1f2c252b2f604758ae39a7cbaf7ee9b_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-rhel8@sha256:5e4bfa8a9a4aa227922af4e35dcb3f659d1672d53c4c79bc35d0594b7cabbae7_s390x",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-rhel8@sha256:6b8ae3a48b6237c6c689f1e62b3bb4eea645b5a3797a4e09e4a308f84f0c9ee7_arm64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-rhel8@sha256:8e4a2e7576bdf731816856a1c24c8d18292fe01df37393f845111a6df18b61a8_ppc64le",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:c0a8c5f5454426844c43f8732ed512ab30b5d4bd3e799fa3f133670d0ea431d5_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:38bcfcb8b18b9d0a84b108c9fde55fcda053c7cdbfc6f99639dd32d05f964756_s390x",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:9dd0249bc2ed6b1c2b26de52217d491204c925df3012df3ee3aeaaaa52b831b0_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:faba929adc7958495dae063add6f0e67b5c2a92cd5848b16e88654aec51cb5a9_arm64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:fdee61c8dad676392456956ee47d5404f4b7bbf341453322d14feb71eb7660ab_ppc64le",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-operator-bundle@sha256:e3bda08789b2ba41154d080a5f013ee0e2406d60f8414e63be451a6439555cc1_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-operator-rhel8@sha256:711b4047d6732b195af78cda60bdc7baba8fc64ec3bc67e566aab05f14ef54f6_s390x",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-operator-rhel8@sha256:71895379c0dca4fca449a1aee75d8aad06e1e72be3dee726cbe4c4f8fbe84fe2_arm64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-operator-rhel8@sha256:9598f801ee479cb633d512b63a95659e05dbbd8d867e383dca5867f09e97e145_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-operator-rhel8@sha256:a152946ac895db8778f8db536f644a8a8b54f5db329918a8a9442e7aa729dc8c_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2403179"
}
],
"notes": [
{
"category": "description",
"text": "A denial of service flaw has been discovered in the python Authlib package. Authlib\u2019s JOSE implementation accepts unbounded JWS/JWT header and signature segments. A remote attacker can craft a token whose base64url\u2011encoded header or signature spans hundreds of megabytes. During verification, Authlib decodes and parses the full input before it is rejected, driving CPU and memory consumption to hostile levels and enabling denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "authlib: Authlib Denial of Service",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-rhel8@sha256:0b00334468578780a4e4b34c03260e57aa07ec47b0d4860b17c8ec964eb7634d_arm64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-rhel8@sha256:1d15d8b7f90327a4216efba353d61c94a9438e5a8df3e68da44907816943d0d3_ppc64le",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-rhel8@sha256:28b200a0ba2c8095d93fc95edbdcdf83b2507a7379f2842fc0a1b7cc5fdd839c_s390x",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-rhel8@sha256:3d24fd39236e7f3180ff2cbef7a28e2e30d9609f6ec0538a41ad4a602eabd12e_amd64"
],
"known_not_affected": [
"Red Hat Quay 3.13:registry.redhat.io/quay/clair-rhel8@sha256:1342015f8900bc707d1f83ec9cce6d73a63be03ca39f15952d7c30188a5358df_arm64",
"Red Hat Quay 3.13:registry.redhat.io/quay/clair-rhel8@sha256:1badbeb73cfe6c33bbff6922f778fe967bccbaaff72898a391d02880e765aad7_ppc64le",
"Red Hat Quay 3.13:registry.redhat.io/quay/clair-rhel8@sha256:3824fc5efcc434b7af55f83541186eebe666e106f22856daec3844c32a80ac41_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/clair-rhel8@sha256:625daa899431d9a6526e65c8834435cd4b065cc9ad36406023f1ba3820032e9a_s390x",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:bd1a02c47b6c32010fe19de6a994577b2c49ed692606d185d4252bb5ba347ecb_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:32d1326be0b497a153790a58572bb83555d7fe756e782d719d31fd0912769bf4_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:45b58ff658a6736e113db8b69f1e762bf8ead59110903f5a2adc16ebf6cb532e_s390x",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8f2d0fc57d36feafb662d28136ebec46bad9047640cf126f2f4f49777ef5b357_ppc64le",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b416224b4baa5a3c8663454f355aee800e327b28c6f19e0618b64b55f8daaf37_arm64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:042fad54f97a923749bb9e28357f44c9ad55cc3e02ebd93386170d90aba8aed0_arm64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:83ed8f834f7f93e91ef92c4e62dd37ad41149a52a8feecc5221daff3eb24ec27_ppc64le",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:92f9ae720c5c444a3e81ca42987152a689d2eaaa661e28b4cbc0363f1eaf56ce_s390x",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:f635f510c78e52dedc4cbd4b721cc98446a58a03d6f245713e3aaf6ba6f6dd57_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-rhel8@sha256:0bb986d4f52cef09dd9a104660426a69d1f2c252b2f604758ae39a7cbaf7ee9b_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-rhel8@sha256:5e4bfa8a9a4aa227922af4e35dcb3f659d1672d53c4c79bc35d0594b7cabbae7_s390x",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-rhel8@sha256:6b8ae3a48b6237c6c689f1e62b3bb4eea645b5a3797a4e09e4a308f84f0c9ee7_arm64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-rhel8@sha256:8e4a2e7576bdf731816856a1c24c8d18292fe01df37393f845111a6df18b61a8_ppc64le",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:c0a8c5f5454426844c43f8732ed512ab30b5d4bd3e799fa3f133670d0ea431d5_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:38bcfcb8b18b9d0a84b108c9fde55fcda053c7cdbfc6f99639dd32d05f964756_s390x",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:9dd0249bc2ed6b1c2b26de52217d491204c925df3012df3ee3aeaaaa52b831b0_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:faba929adc7958495dae063add6f0e67b5c2a92cd5848b16e88654aec51cb5a9_arm64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:fdee61c8dad676392456956ee47d5404f4b7bbf341453322d14feb71eb7660ab_ppc64le",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-operator-bundle@sha256:e3bda08789b2ba41154d080a5f013ee0e2406d60f8414e63be451a6439555cc1_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-operator-rhel8@sha256:711b4047d6732b195af78cda60bdc7baba8fc64ec3bc67e566aab05f14ef54f6_s390x",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-operator-rhel8@sha256:71895379c0dca4fca449a1aee75d8aad06e1e72be3dee726cbe4c4f8fbe84fe2_arm64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-operator-rhel8@sha256:9598f801ee479cb633d512b63a95659e05dbbd8d867e383dca5867f09e97e145_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-operator-rhel8@sha256:a152946ac895db8778f8db536f644a8a8b54f5db329918a8a9442e7aa729dc8c_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61920"
},
{
"category": "external",
"summary": "RHBZ#2403179",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2403179"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61920",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61920"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61920",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61920"
},
{
"category": "external",
"summary": "https://github.com/authlib/authlib/commit/867e3f87b072347a1ae9cf6983cc8bbf88447e5e",
"url": "https://github.com/authlib/authlib/commit/867e3f87b072347a1ae9cf6983cc8bbf88447e5e"
},
{
"category": "external",
"summary": "https://github.com/authlib/authlib/security/advisories/GHSA-pq5p-34cr-23v9",
"url": "https://github.com/authlib/authlib/security/advisories/GHSA-pq5p-34cr-23v9"
}
],
"release_date": "2025-10-10T19:25:07.679000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-12-15T07:13:36+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11358",
"product_ids": [
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-rhel8@sha256:0b00334468578780a4e4b34c03260e57aa07ec47b0d4860b17c8ec964eb7634d_arm64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-rhel8@sha256:1d15d8b7f90327a4216efba353d61c94a9438e5a8df3e68da44907816943d0d3_ppc64le",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-rhel8@sha256:28b200a0ba2c8095d93fc95edbdcdf83b2507a7379f2842fc0a1b7cc5fdd839c_s390x",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-rhel8@sha256:3d24fd39236e7f3180ff2cbef7a28e2e30d9609f6ec0538a41ad4a602eabd12e_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:23176"
},
{
"category": "workaround",
"details": "Users unable to upgrade may manually enforce input size limits before handing tokens to Authlib and/or use application-level throttling to reduce amplification risk.",
"product_ids": [
"Red Hat Quay 3.13:registry.redhat.io/quay/clair-rhel8@sha256:1342015f8900bc707d1f83ec9cce6d73a63be03ca39f15952d7c30188a5358df_arm64",
"Red Hat Quay 3.13:registry.redhat.io/quay/clair-rhel8@sha256:1badbeb73cfe6c33bbff6922f778fe967bccbaaff72898a391d02880e765aad7_ppc64le",
"Red Hat Quay 3.13:registry.redhat.io/quay/clair-rhel8@sha256:3824fc5efcc434b7af55f83541186eebe666e106f22856daec3844c32a80ac41_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/clair-rhel8@sha256:625daa899431d9a6526e65c8834435cd4b065cc9ad36406023f1ba3820032e9a_s390x",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:bd1a02c47b6c32010fe19de6a994577b2c49ed692606d185d4252bb5ba347ecb_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:32d1326be0b497a153790a58572bb83555d7fe756e782d719d31fd0912769bf4_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:45b58ff658a6736e113db8b69f1e762bf8ead59110903f5a2adc16ebf6cb532e_s390x",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8f2d0fc57d36feafb662d28136ebec46bad9047640cf126f2f4f49777ef5b357_ppc64le",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b416224b4baa5a3c8663454f355aee800e327b28c6f19e0618b64b55f8daaf37_arm64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:042fad54f97a923749bb9e28357f44c9ad55cc3e02ebd93386170d90aba8aed0_arm64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:83ed8f834f7f93e91ef92c4e62dd37ad41149a52a8feecc5221daff3eb24ec27_ppc64le",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:92f9ae720c5c444a3e81ca42987152a689d2eaaa661e28b4cbc0363f1eaf56ce_s390x",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:f635f510c78e52dedc4cbd4b721cc98446a58a03d6f245713e3aaf6ba6f6dd57_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-rhel8@sha256:0bb986d4f52cef09dd9a104660426a69d1f2c252b2f604758ae39a7cbaf7ee9b_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-rhel8@sha256:5e4bfa8a9a4aa227922af4e35dcb3f659d1672d53c4c79bc35d0594b7cabbae7_s390x",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-rhel8@sha256:6b8ae3a48b6237c6c689f1e62b3bb4eea645b5a3797a4e09e4a308f84f0c9ee7_arm64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-rhel8@sha256:8e4a2e7576bdf731816856a1c24c8d18292fe01df37393f845111a6df18b61a8_ppc64le",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:c0a8c5f5454426844c43f8732ed512ab30b5d4bd3e799fa3f133670d0ea431d5_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:38bcfcb8b18b9d0a84b108c9fde55fcda053c7cdbfc6f99639dd32d05f964756_s390x",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:9dd0249bc2ed6b1c2b26de52217d491204c925df3012df3ee3aeaaaa52b831b0_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:faba929adc7958495dae063add6f0e67b5c2a92cd5848b16e88654aec51cb5a9_arm64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:fdee61c8dad676392456956ee47d5404f4b7bbf341453322d14feb71eb7660ab_ppc64le",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-operator-bundle@sha256:e3bda08789b2ba41154d080a5f013ee0e2406d60f8414e63be451a6439555cc1_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-operator-rhel8@sha256:711b4047d6732b195af78cda60bdc7baba8fc64ec3bc67e566aab05f14ef54f6_s390x",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-operator-rhel8@sha256:71895379c0dca4fca449a1aee75d8aad06e1e72be3dee726cbe4c4f8fbe84fe2_arm64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-operator-rhel8@sha256:9598f801ee479cb633d512b63a95659e05dbbd8d867e383dca5867f09e97e145_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-operator-rhel8@sha256:a152946ac895db8778f8db536f644a8a8b54f5db329918a8a9442e7aa729dc8c_ppc64le",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-rhel8@sha256:0b00334468578780a4e4b34c03260e57aa07ec47b0d4860b17c8ec964eb7634d_arm64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-rhel8@sha256:1d15d8b7f90327a4216efba353d61c94a9438e5a8df3e68da44907816943d0d3_ppc64le",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-rhel8@sha256:28b200a0ba2c8095d93fc95edbdcdf83b2507a7379f2842fc0a1b7cc5fdd839c_s390x",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-rhel8@sha256:3d24fd39236e7f3180ff2cbef7a28e2e30d9609f6ec0538a41ad4a602eabd12e_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.13:registry.redhat.io/quay/clair-rhel8@sha256:1342015f8900bc707d1f83ec9cce6d73a63be03ca39f15952d7c30188a5358df_arm64",
"Red Hat Quay 3.13:registry.redhat.io/quay/clair-rhel8@sha256:1badbeb73cfe6c33bbff6922f778fe967bccbaaff72898a391d02880e765aad7_ppc64le",
"Red Hat Quay 3.13:registry.redhat.io/quay/clair-rhel8@sha256:3824fc5efcc434b7af55f83541186eebe666e106f22856daec3844c32a80ac41_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/clair-rhel8@sha256:625daa899431d9a6526e65c8834435cd4b065cc9ad36406023f1ba3820032e9a_s390x",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:bd1a02c47b6c32010fe19de6a994577b2c49ed692606d185d4252bb5ba347ecb_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:32d1326be0b497a153790a58572bb83555d7fe756e782d719d31fd0912769bf4_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:45b58ff658a6736e113db8b69f1e762bf8ead59110903f5a2adc16ebf6cb532e_s390x",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:8f2d0fc57d36feafb662d28136ebec46bad9047640cf126f2f4f49777ef5b357_ppc64le",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b416224b4baa5a3c8663454f355aee800e327b28c6f19e0618b64b55f8daaf37_arm64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:042fad54f97a923749bb9e28357f44c9ad55cc3e02ebd93386170d90aba8aed0_arm64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:83ed8f834f7f93e91ef92c4e62dd37ad41149a52a8feecc5221daff3eb24ec27_ppc64le",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:92f9ae720c5c444a3e81ca42987152a689d2eaaa661e28b4cbc0363f1eaf56ce_s390x",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:f635f510c78e52dedc4cbd4b721cc98446a58a03d6f245713e3aaf6ba6f6dd57_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-rhel8@sha256:0bb986d4f52cef09dd9a104660426a69d1f2c252b2f604758ae39a7cbaf7ee9b_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-rhel8@sha256:5e4bfa8a9a4aa227922af4e35dcb3f659d1672d53c4c79bc35d0594b7cabbae7_s390x",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-rhel8@sha256:6b8ae3a48b6237c6c689f1e62b3bb4eea645b5a3797a4e09e4a308f84f0c9ee7_arm64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-builder-rhel8@sha256:8e4a2e7576bdf731816856a1c24c8d18292fe01df37393f845111a6df18b61a8_ppc64le",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:c0a8c5f5454426844c43f8732ed512ab30b5d4bd3e799fa3f133670d0ea431d5_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:38bcfcb8b18b9d0a84b108c9fde55fcda053c7cdbfc6f99639dd32d05f964756_s390x",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:9dd0249bc2ed6b1c2b26de52217d491204c925df3012df3ee3aeaaaa52b831b0_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:faba929adc7958495dae063add6f0e67b5c2a92cd5848b16e88654aec51cb5a9_arm64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:fdee61c8dad676392456956ee47d5404f4b7bbf341453322d14feb71eb7660ab_ppc64le",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-operator-bundle@sha256:e3bda08789b2ba41154d080a5f013ee0e2406d60f8414e63be451a6439555cc1_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-operator-rhel8@sha256:711b4047d6732b195af78cda60bdc7baba8fc64ec3bc67e566aab05f14ef54f6_s390x",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-operator-rhel8@sha256:71895379c0dca4fca449a1aee75d8aad06e1e72be3dee726cbe4c4f8fbe84fe2_arm64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-operator-rhel8@sha256:9598f801ee479cb633d512b63a95659e05dbbd8d867e383dca5867f09e97e145_amd64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-operator-rhel8@sha256:a152946ac895db8778f8db536f644a8a8b54f5db329918a8a9442e7aa729dc8c_ppc64le",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-rhel8@sha256:0b00334468578780a4e4b34c03260e57aa07ec47b0d4860b17c8ec964eb7634d_arm64",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-rhel8@sha256:1d15d8b7f90327a4216efba353d61c94a9438e5a8df3e68da44907816943d0d3_ppc64le",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-rhel8@sha256:28b200a0ba2c8095d93fc95edbdcdf83b2507a7379f2842fc0a1b7cc5fdd839c_s390x",
"Red Hat Quay 3.13:registry.redhat.io/quay/quay-rhel8@sha256:3d24fd39236e7f3180ff2cbef7a28e2e30d9609f6ec0538a41ad4a602eabd12e_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "authlib: Authlib Denial of Service"
}
]
}
RHSA-2025:23061
Vulnerability from csaf_redhat - Published: 2025-12-10 16:13 - Updated: 2026-03-16 12:13Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat Quay 3.9.17 is now available with bug fixes.",
"title": "Topic"
},
{
"category": "general",
"text": "Quay 3.9.17",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:23061",
"url": "https://access.redhat.com/errata/RHSA-2025:23061"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2024-34156",
"url": "https://access.redhat.com/security/cve/CVE-2024-34156"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2024-45337",
"url": "https://access.redhat.com/security/cve/CVE-2024-45337"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2024-45338",
"url": "https://access.redhat.com/security/cve/CVE-2024-45338"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-47913",
"url": "https://access.redhat.com/security/cve/CVE-2025-47913"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-59420",
"url": "https://access.redhat.com/security/cve/CVE-2025-59420"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61920",
"url": "https://access.redhat.com/security/cve/CVE-2025-61920"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_23061.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Quay 3.9.17",
"tracking": {
"current_release_date": "2026-03-16T12:13:38+00:00",
"generator": {
"date": "2026-03-16T12:13:38+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.3"
}
},
"id": "RHSA-2025:23061",
"initial_release_date": "2025-12-10T16:13:23+00:00",
"revision_history": [
{
"date": "2025-12-10T16:13:23+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-12-11T15:24:12+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-16T12:13:38+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Quay 3.9",
"product": {
"name": "Red Hat Quay 3.9",
"product_id": "Red Hat Quay 3.9",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:quay:3.9::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat Quay"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:00dc04b86ae7fd7dd37e9234ed2b4a1d0f0403993c153e197ac8b96233e95048_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:00dc04b86ae7fd7dd37e9234ed2b4a1d0f0403993c153e197ac8b96233e95048_amd64",
"product_id": "registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:00dc04b86ae7fd7dd37e9234ed2b4a1d0f0403993c153e197ac8b96233e95048_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-container-security-operator-bundle@sha256%3A00dc04b86ae7fd7dd37e9234ed2b4a1d0f0403993c153e197ac8b96233e95048?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=3.9.17-1765382758"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:cc9d5c2de42541033a2c01aeb385404058cdac60a8cd2fd9889f7d73cdbc6292_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:cc9d5c2de42541033a2c01aeb385404058cdac60a8cd2fd9889f7d73cdbc6292_amd64",
"product_id": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:cc9d5c2de42541033a2c01aeb385404058cdac60a8cd2fd9889f7d73cdbc6292_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-container-security-operator-rhel8@sha256%3Acc9d5c2de42541033a2c01aeb385404058cdac60a8cd2fd9889f7d73cdbc6292?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=3.9.17-1765382758"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:7db467404171294d793ef0fd1a59fd6e5bd20ed8915913a1edf013d18e4c9a78_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:7db467404171294d793ef0fd1a59fd6e5bd20ed8915913a1edf013d18e4c9a78_amd64",
"product_id": "registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:7db467404171294d793ef0fd1a59fd6e5bd20ed8915913a1edf013d18e4c9a78_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-bridge-operator-bundle@sha256%3A7db467404171294d793ef0fd1a59fd6e5bd20ed8915913a1edf013d18e4c9a78?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=3.9.17-1765382758"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1deefc2cd91d0f2c474eda0fbb81bbce30786754d8fb9100b73823fae9562a40_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1deefc2cd91d0f2c474eda0fbb81bbce30786754d8fb9100b73823fae9562a40_amd64",
"product_id": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1deefc2cd91d0f2c474eda0fbb81bbce30786754d8fb9100b73823fae9562a40_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-bridge-operator-rhel8@sha256%3A1deefc2cd91d0f2c474eda0fbb81bbce30786754d8fb9100b73823fae9562a40?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=3.9.17-1765382758"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:47e21d3d9c9ee2de4a1e557e32521f64db2098b9f4dcd32e0d6f4d0962be7993_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:47e21d3d9c9ee2de4a1e557e32521f64db2098b9f4dcd32e0d6f4d0962be7993_amd64",
"product_id": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:47e21d3d9c9ee2de4a1e557e32521f64db2098b9f4dcd32e0d6f4d0962be7993_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-builder-qemu-rhcos-rhel8@sha256%3A47e21d3d9c9ee2de4a1e557e32521f64db2098b9f4dcd32e0d6f4d0962be7993?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=3.14-1765382758"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:5f883757f060b68dfd010f125d31556df3d29c129de088c257debd8239cf7d40_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:5f883757f060b68dfd010f125d31556df3d29c129de088c257debd8239cf7d40_amd64",
"product_id": "registry.redhat.io/quay/quay-builder-rhel8@sha256:5f883757f060b68dfd010f125d31556df3d29c129de088c257debd8239cf7d40_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-builder-rhel8@sha256%3A5f883757f060b68dfd010f125d31556df3d29c129de088c257debd8239cf7d40?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=8.10-1765382758"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/clair-rhel8@sha256:02ced94ebfcce3e21bcc71af6aa1c11db50822c91dd05cec4fb41a34e6669112_amd64",
"product": {
"name": "registry.redhat.io/quay/clair-rhel8@sha256:02ced94ebfcce3e21bcc71af6aa1c11db50822c91dd05cec4fb41a34e6669112_amd64",
"product_id": "registry.redhat.io/quay/clair-rhel8@sha256:02ced94ebfcce3e21bcc71af6aa1c11db50822c91dd05cec4fb41a34e6669112_amd64",
"product_identification_helper": {
"purl": "pkg:oci/clair-rhel8@sha256%3A02ced94ebfcce3e21bcc71af6aa1c11db50822c91dd05cec4fb41a34e6669112?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=v3.9.0-1765382758"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-operator-bundle@sha256:3c1f25918b505ec71eaf93d2a0b963d209e36d847e7fc48469f9d40b534344ae_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-operator-bundle@sha256:3c1f25918b505ec71eaf93d2a0b963d209e36d847e7fc48469f9d40b534344ae_amd64",
"product_id": "registry.redhat.io/quay/quay-operator-bundle@sha256:3c1f25918b505ec71eaf93d2a0b963d209e36d847e7fc48469f9d40b534344ae_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-operator-bundle@sha256%3A3c1f25918b505ec71eaf93d2a0b963d209e36d847e7fc48469f9d40b534344ae?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=3.9.17-1765382758"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:02fa492e51729469aaf4e106ad4fbfbf8bfeb63fd51b668782825a4f0ef10194_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:02fa492e51729469aaf4e106ad4fbfbf8bfeb63fd51b668782825a4f0ef10194_amd64",
"product_id": "registry.redhat.io/quay/quay-operator-rhel8@sha256:02fa492e51729469aaf4e106ad4fbfbf8bfeb63fd51b668782825a4f0ef10194_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-operator-rhel8@sha256%3A02fa492e51729469aaf4e106ad4fbfbf8bfeb63fd51b668782825a4f0ef10194?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=3.9.17-1765382758"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-rhel8@sha256:1cb5d4a87d8bd300edace58d2f3658e1296a23c0d4fed13fd0baa2fdb1da27d8_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-rhel8@sha256:1cb5d4a87d8bd300edace58d2f3658e1296a23c0d4fed13fd0baa2fdb1da27d8_amd64",
"product_id": "registry.redhat.io/quay/quay-rhel8@sha256:1cb5d4a87d8bd300edace58d2f3658e1296a23c0d4fed13fd0baa2fdb1da27d8_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-rhel8@sha256%3A1cb5d4a87d8bd300edace58d2f3658e1296a23c0d4fed13fd0baa2fdb1da27d8?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=3.9-1765382758"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:795bd464d6825f905679d1ad504d7e4f5c6291f89706f3b78c41bc6776522805_arm64",
"product": {
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:795bd464d6825f905679d1ad504d7e4f5c6291f89706f3b78c41bc6776522805_arm64",
"product_id": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:795bd464d6825f905679d1ad504d7e4f5c6291f89706f3b78c41bc6776522805_arm64",
"product_identification_helper": {
"purl": "pkg:oci/quay-container-security-operator-rhel8@sha256%3A795bd464d6825f905679d1ad504d7e4f5c6291f89706f3b78c41bc6776522805?arch=arm64\u0026repository_url=registry.redhat.io/quay\u0026tag=3.9.17-1765382758"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f78eef52e9365e9e2beb65496840748f00d6b6f662da50bbf48b9c695369b359_arm64",
"product": {
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f78eef52e9365e9e2beb65496840748f00d6b6f662da50bbf48b9c695369b359_arm64",
"product_id": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f78eef52e9365e9e2beb65496840748f00d6b6f662da50bbf48b9c695369b359_arm64",
"product_identification_helper": {
"purl": "pkg:oci/quay-bridge-operator-rhel8@sha256%3Af78eef52e9365e9e2beb65496840748f00d6b6f662da50bbf48b9c695369b359?arch=arm64\u0026repository_url=registry.redhat.io/quay\u0026tag=3.9.17-1765382758"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:69806c46f3439bd780533b2660726a95c8acbff0986e340b040f1fb333e5feaf_arm64",
"product": {
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:69806c46f3439bd780533b2660726a95c8acbff0986e340b040f1fb333e5feaf_arm64",
"product_id": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:69806c46f3439bd780533b2660726a95c8acbff0986e340b040f1fb333e5feaf_arm64",
"product_identification_helper": {
"purl": "pkg:oci/quay-builder-qemu-rhcos-rhel8@sha256%3A69806c46f3439bd780533b2660726a95c8acbff0986e340b040f1fb333e5feaf?arch=arm64\u0026repository_url=registry.redhat.io/quay\u0026tag=3.14-1765382758"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:a9cbc8c21b24b5a534de5e553040b13d7d02dcb7ebf23d35019a65a253825bb6_arm64",
"product": {
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:a9cbc8c21b24b5a534de5e553040b13d7d02dcb7ebf23d35019a65a253825bb6_arm64",
"product_id": "registry.redhat.io/quay/quay-builder-rhel8@sha256:a9cbc8c21b24b5a534de5e553040b13d7d02dcb7ebf23d35019a65a253825bb6_arm64",
"product_identification_helper": {
"purl": "pkg:oci/quay-builder-rhel8@sha256%3Aa9cbc8c21b24b5a534de5e553040b13d7d02dcb7ebf23d35019a65a253825bb6?arch=arm64\u0026repository_url=registry.redhat.io/quay\u0026tag=8.10-1765382758"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/clair-rhel8@sha256:ad995b723102f4472e4190257b61582de5c6b058b908bcee7cebe683ae77be75_arm64",
"product": {
"name": "registry.redhat.io/quay/clair-rhel8@sha256:ad995b723102f4472e4190257b61582de5c6b058b908bcee7cebe683ae77be75_arm64",
"product_id": "registry.redhat.io/quay/clair-rhel8@sha256:ad995b723102f4472e4190257b61582de5c6b058b908bcee7cebe683ae77be75_arm64",
"product_identification_helper": {
"purl": "pkg:oci/clair-rhel8@sha256%3Aad995b723102f4472e4190257b61582de5c6b058b908bcee7cebe683ae77be75?arch=arm64\u0026repository_url=registry.redhat.io/quay\u0026tag=v3.9.0-1765382758"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:ce4e7a55f2d6768340bf5d13b3b60e61c3d1a783ec338f591dd56003e665895e_arm64",
"product": {
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:ce4e7a55f2d6768340bf5d13b3b60e61c3d1a783ec338f591dd56003e665895e_arm64",
"product_id": "registry.redhat.io/quay/quay-operator-rhel8@sha256:ce4e7a55f2d6768340bf5d13b3b60e61c3d1a783ec338f591dd56003e665895e_arm64",
"product_identification_helper": {
"purl": "pkg:oci/quay-operator-rhel8@sha256%3Ace4e7a55f2d6768340bf5d13b3b60e61c3d1a783ec338f591dd56003e665895e?arch=arm64\u0026repository_url=registry.redhat.io/quay\u0026tag=3.9.17-1765382758"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-rhel8@sha256:2336ad8d4b4874a92c6cfcbc8458b6d26f7f6dde300ca0e159f2b73d7e6839cd_arm64",
"product": {
"name": "registry.redhat.io/quay/quay-rhel8@sha256:2336ad8d4b4874a92c6cfcbc8458b6d26f7f6dde300ca0e159f2b73d7e6839cd_arm64",
"product_id": "registry.redhat.io/quay/quay-rhel8@sha256:2336ad8d4b4874a92c6cfcbc8458b6d26f7f6dde300ca0e159f2b73d7e6839cd_arm64",
"product_identification_helper": {
"purl": "pkg:oci/quay-rhel8@sha256%3A2336ad8d4b4874a92c6cfcbc8458b6d26f7f6dde300ca0e159f2b73d7e6839cd?arch=arm64\u0026repository_url=registry.redhat.io/quay\u0026tag=3.9-1765382758"
}
}
}
],
"category": "architecture",
"name": "arm64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:385004b2d63a6fee322819b91d7d1df2368742b75a88960f9a43adb5a3727ac0_ppc64le",
"product": {
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:385004b2d63a6fee322819b91d7d1df2368742b75a88960f9a43adb5a3727ac0_ppc64le",
"product_id": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:385004b2d63a6fee322819b91d7d1df2368742b75a88960f9a43adb5a3727ac0_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/quay-container-security-operator-rhel8@sha256%3A385004b2d63a6fee322819b91d7d1df2368742b75a88960f9a43adb5a3727ac0?arch=ppc64le\u0026repository_url=registry.redhat.io/quay\u0026tag=3.9.17-1765382758"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:ddbf02cbfae810853f79628b576abcd0276f27ef27ad07a92f71df93a339cb4a_ppc64le",
"product": {
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:ddbf02cbfae810853f79628b576abcd0276f27ef27ad07a92f71df93a339cb4a_ppc64le",
"product_id": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:ddbf02cbfae810853f79628b576abcd0276f27ef27ad07a92f71df93a339cb4a_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/quay-bridge-operator-rhel8@sha256%3Addbf02cbfae810853f79628b576abcd0276f27ef27ad07a92f71df93a339cb4a?arch=ppc64le\u0026repository_url=registry.redhat.io/quay\u0026tag=3.9.17-1765382758"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:88724eda5d52df59f156b7d318f69c79540faddb41bb770b7f56394fd76ba5e1_ppc64le",
"product": {
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:88724eda5d52df59f156b7d318f69c79540faddb41bb770b7f56394fd76ba5e1_ppc64le",
"product_id": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:88724eda5d52df59f156b7d318f69c79540faddb41bb770b7f56394fd76ba5e1_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/quay-builder-qemu-rhcos-rhel8@sha256%3A88724eda5d52df59f156b7d318f69c79540faddb41bb770b7f56394fd76ba5e1?arch=ppc64le\u0026repository_url=registry.redhat.io/quay\u0026tag=3.14-1765382758"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:118676c250f94b51d2484414190933c1d8fa61605cef0deff2aab6527f783d73_ppc64le",
"product": {
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:118676c250f94b51d2484414190933c1d8fa61605cef0deff2aab6527f783d73_ppc64le",
"product_id": "registry.redhat.io/quay/quay-builder-rhel8@sha256:118676c250f94b51d2484414190933c1d8fa61605cef0deff2aab6527f783d73_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/quay-builder-rhel8@sha256%3A118676c250f94b51d2484414190933c1d8fa61605cef0deff2aab6527f783d73?arch=ppc64le\u0026repository_url=registry.redhat.io/quay\u0026tag=8.10-1765382758"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/clair-rhel8@sha256:42a67bb2e5ab681eadc253b413f0bf557d63f282f270e6064f5768fecf6886e5_ppc64le",
"product": {
"name": "registry.redhat.io/quay/clair-rhel8@sha256:42a67bb2e5ab681eadc253b413f0bf557d63f282f270e6064f5768fecf6886e5_ppc64le",
"product_id": "registry.redhat.io/quay/clair-rhel8@sha256:42a67bb2e5ab681eadc253b413f0bf557d63f282f270e6064f5768fecf6886e5_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/clair-rhel8@sha256%3A42a67bb2e5ab681eadc253b413f0bf557d63f282f270e6064f5768fecf6886e5?arch=ppc64le\u0026repository_url=registry.redhat.io/quay\u0026tag=v3.9.0-1765382758"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:6d831031c1e4cdc251236b241e4a15b7152900d75fb0bee8bdd39610e249a53b_ppc64le",
"product": {
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:6d831031c1e4cdc251236b241e4a15b7152900d75fb0bee8bdd39610e249a53b_ppc64le",
"product_id": "registry.redhat.io/quay/quay-operator-rhel8@sha256:6d831031c1e4cdc251236b241e4a15b7152900d75fb0bee8bdd39610e249a53b_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/quay-operator-rhel8@sha256%3A6d831031c1e4cdc251236b241e4a15b7152900d75fb0bee8bdd39610e249a53b?arch=ppc64le\u0026repository_url=registry.redhat.io/quay\u0026tag=3.9.17-1765382758"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-rhel8@sha256:1e95647d265fcc668bb66cc83fff56eb00eb2a7a4c8a7a2d86186bdc68de3ea0_ppc64le",
"product": {
"name": "registry.redhat.io/quay/quay-rhel8@sha256:1e95647d265fcc668bb66cc83fff56eb00eb2a7a4c8a7a2d86186bdc68de3ea0_ppc64le",
"product_id": "registry.redhat.io/quay/quay-rhel8@sha256:1e95647d265fcc668bb66cc83fff56eb00eb2a7a4c8a7a2d86186bdc68de3ea0_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/quay-rhel8@sha256%3A1e95647d265fcc668bb66cc83fff56eb00eb2a7a4c8a7a2d86186bdc68de3ea0?arch=ppc64le\u0026repository_url=registry.redhat.io/quay\u0026tag=3.9-1765382758"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:b3fc7bb5b6912f68e9b3422eb2f3ad072f0cd8ff412c5b56b9879fd4a6f3f78c_s390x",
"product": {
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:b3fc7bb5b6912f68e9b3422eb2f3ad072f0cd8ff412c5b56b9879fd4a6f3f78c_s390x",
"product_id": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:b3fc7bb5b6912f68e9b3422eb2f3ad072f0cd8ff412c5b56b9879fd4a6f3f78c_s390x",
"product_identification_helper": {
"purl": "pkg:oci/quay-container-security-operator-rhel8@sha256%3Ab3fc7bb5b6912f68e9b3422eb2f3ad072f0cd8ff412c5b56b9879fd4a6f3f78c?arch=s390x\u0026repository_url=registry.redhat.io/quay\u0026tag=3.9.17-1765382758"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b0b66c3c98a91dc4d4e1e0dd1b2fa58b542b02e27ba283cd5d90b7758ebfaf21_s390x",
"product": {
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b0b66c3c98a91dc4d4e1e0dd1b2fa58b542b02e27ba283cd5d90b7758ebfaf21_s390x",
"product_id": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b0b66c3c98a91dc4d4e1e0dd1b2fa58b542b02e27ba283cd5d90b7758ebfaf21_s390x",
"product_identification_helper": {
"purl": "pkg:oci/quay-bridge-operator-rhel8@sha256%3Ab0b66c3c98a91dc4d4e1e0dd1b2fa58b542b02e27ba283cd5d90b7758ebfaf21?arch=s390x\u0026repository_url=registry.redhat.io/quay\u0026tag=3.9.17-1765382758"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:e701896ef9c36202581832d3dd9413f99c94ab7da435f7afb91c9e0ffe2e20ae_s390x",
"product": {
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:e701896ef9c36202581832d3dd9413f99c94ab7da435f7afb91c9e0ffe2e20ae_s390x",
"product_id": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:e701896ef9c36202581832d3dd9413f99c94ab7da435f7afb91c9e0ffe2e20ae_s390x",
"product_identification_helper": {
"purl": "pkg:oci/quay-builder-qemu-rhcos-rhel8@sha256%3Ae701896ef9c36202581832d3dd9413f99c94ab7da435f7afb91c9e0ffe2e20ae?arch=s390x\u0026repository_url=registry.redhat.io/quay\u0026tag=3.14-1765382758"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:c644998824e04ecf279deae25a22cce6c48d8bca44755f76eb4abacf17052519_s390x",
"product": {
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:c644998824e04ecf279deae25a22cce6c48d8bca44755f76eb4abacf17052519_s390x",
"product_id": "registry.redhat.io/quay/quay-builder-rhel8@sha256:c644998824e04ecf279deae25a22cce6c48d8bca44755f76eb4abacf17052519_s390x",
"product_identification_helper": {
"purl": "pkg:oci/quay-builder-rhel8@sha256%3Ac644998824e04ecf279deae25a22cce6c48d8bca44755f76eb4abacf17052519?arch=s390x\u0026repository_url=registry.redhat.io/quay\u0026tag=8.10-1765382758"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/clair-rhel8@sha256:880c746eb5822f68e41ca7b60d97799115c30f39bdc7e458f7a4101e2af36c8c_s390x",
"product": {
"name": "registry.redhat.io/quay/clair-rhel8@sha256:880c746eb5822f68e41ca7b60d97799115c30f39bdc7e458f7a4101e2af36c8c_s390x",
"product_id": "registry.redhat.io/quay/clair-rhel8@sha256:880c746eb5822f68e41ca7b60d97799115c30f39bdc7e458f7a4101e2af36c8c_s390x",
"product_identification_helper": {
"purl": "pkg:oci/clair-rhel8@sha256%3A880c746eb5822f68e41ca7b60d97799115c30f39bdc7e458f7a4101e2af36c8c?arch=s390x\u0026repository_url=registry.redhat.io/quay\u0026tag=v3.9.0-1765382758"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:1230d53c9bf30d0ef730a403012530c0bf654d597b164687911524f8b5085eac_s390x",
"product": {
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:1230d53c9bf30d0ef730a403012530c0bf654d597b164687911524f8b5085eac_s390x",
"product_id": "registry.redhat.io/quay/quay-operator-rhel8@sha256:1230d53c9bf30d0ef730a403012530c0bf654d597b164687911524f8b5085eac_s390x",
"product_identification_helper": {
"purl": "pkg:oci/quay-operator-rhel8@sha256%3A1230d53c9bf30d0ef730a403012530c0bf654d597b164687911524f8b5085eac?arch=s390x\u0026repository_url=registry.redhat.io/quay\u0026tag=3.9.17-1765382758"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-rhel8@sha256:55a8de289089989f26365c0011d30310fdc525e8515f7be94956b8c21769edda_s390x",
"product": {
"name": "registry.redhat.io/quay/quay-rhel8@sha256:55a8de289089989f26365c0011d30310fdc525e8515f7be94956b8c21769edda_s390x",
"product_id": "registry.redhat.io/quay/quay-rhel8@sha256:55a8de289089989f26365c0011d30310fdc525e8515f7be94956b8c21769edda_s390x",
"product_identification_helper": {
"purl": "pkg:oci/quay-rhel8@sha256%3A55a8de289089989f26365c0011d30310fdc525e8515f7be94956b8c21769edda?arch=s390x\u0026repository_url=registry.redhat.io/quay\u0026tag=3.9-1765382758"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/clair-rhel8@sha256:02ced94ebfcce3e21bcc71af6aa1c11db50822c91dd05cec4fb41a34e6669112_amd64 as a component of Red Hat Quay 3.9",
"product_id": "Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:02ced94ebfcce3e21bcc71af6aa1c11db50822c91dd05cec4fb41a34e6669112_amd64"
},
"product_reference": "registry.redhat.io/quay/clair-rhel8@sha256:02ced94ebfcce3e21bcc71af6aa1c11db50822c91dd05cec4fb41a34e6669112_amd64",
"relates_to_product_reference": "Red Hat Quay 3.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/clair-rhel8@sha256:42a67bb2e5ab681eadc253b413f0bf557d63f282f270e6064f5768fecf6886e5_ppc64le as a component of Red Hat Quay 3.9",
"product_id": "Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:42a67bb2e5ab681eadc253b413f0bf557d63f282f270e6064f5768fecf6886e5_ppc64le"
},
"product_reference": "registry.redhat.io/quay/clair-rhel8@sha256:42a67bb2e5ab681eadc253b413f0bf557d63f282f270e6064f5768fecf6886e5_ppc64le",
"relates_to_product_reference": "Red Hat Quay 3.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/clair-rhel8@sha256:880c746eb5822f68e41ca7b60d97799115c30f39bdc7e458f7a4101e2af36c8c_s390x as a component of Red Hat Quay 3.9",
"product_id": "Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:880c746eb5822f68e41ca7b60d97799115c30f39bdc7e458f7a4101e2af36c8c_s390x"
},
"product_reference": "registry.redhat.io/quay/clair-rhel8@sha256:880c746eb5822f68e41ca7b60d97799115c30f39bdc7e458f7a4101e2af36c8c_s390x",
"relates_to_product_reference": "Red Hat Quay 3.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/clair-rhel8@sha256:ad995b723102f4472e4190257b61582de5c6b058b908bcee7cebe683ae77be75_arm64 as a component of Red Hat Quay 3.9",
"product_id": "Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:ad995b723102f4472e4190257b61582de5c6b058b908bcee7cebe683ae77be75_arm64"
},
"product_reference": "registry.redhat.io/quay/clair-rhel8@sha256:ad995b723102f4472e4190257b61582de5c6b058b908bcee7cebe683ae77be75_arm64",
"relates_to_product_reference": "Red Hat Quay 3.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:7db467404171294d793ef0fd1a59fd6e5bd20ed8915913a1edf013d18e4c9a78_amd64 as a component of Red Hat Quay 3.9",
"product_id": "Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:7db467404171294d793ef0fd1a59fd6e5bd20ed8915913a1edf013d18e4c9a78_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:7db467404171294d793ef0fd1a59fd6e5bd20ed8915913a1edf013d18e4c9a78_amd64",
"relates_to_product_reference": "Red Hat Quay 3.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1deefc2cd91d0f2c474eda0fbb81bbce30786754d8fb9100b73823fae9562a40_amd64 as a component of Red Hat Quay 3.9",
"product_id": "Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1deefc2cd91d0f2c474eda0fbb81bbce30786754d8fb9100b73823fae9562a40_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1deefc2cd91d0f2c474eda0fbb81bbce30786754d8fb9100b73823fae9562a40_amd64",
"relates_to_product_reference": "Red Hat Quay 3.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b0b66c3c98a91dc4d4e1e0dd1b2fa58b542b02e27ba283cd5d90b7758ebfaf21_s390x as a component of Red Hat Quay 3.9",
"product_id": "Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b0b66c3c98a91dc4d4e1e0dd1b2fa58b542b02e27ba283cd5d90b7758ebfaf21_s390x"
},
"product_reference": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b0b66c3c98a91dc4d4e1e0dd1b2fa58b542b02e27ba283cd5d90b7758ebfaf21_s390x",
"relates_to_product_reference": "Red Hat Quay 3.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:ddbf02cbfae810853f79628b576abcd0276f27ef27ad07a92f71df93a339cb4a_ppc64le as a component of Red Hat Quay 3.9",
"product_id": "Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:ddbf02cbfae810853f79628b576abcd0276f27ef27ad07a92f71df93a339cb4a_ppc64le"
},
"product_reference": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:ddbf02cbfae810853f79628b576abcd0276f27ef27ad07a92f71df93a339cb4a_ppc64le",
"relates_to_product_reference": "Red Hat Quay 3.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f78eef52e9365e9e2beb65496840748f00d6b6f662da50bbf48b9c695369b359_arm64 as a component of Red Hat Quay 3.9",
"product_id": "Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f78eef52e9365e9e2beb65496840748f00d6b6f662da50bbf48b9c695369b359_arm64"
},
"product_reference": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f78eef52e9365e9e2beb65496840748f00d6b6f662da50bbf48b9c695369b359_arm64",
"relates_to_product_reference": "Red Hat Quay 3.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:47e21d3d9c9ee2de4a1e557e32521f64db2098b9f4dcd32e0d6f4d0962be7993_amd64 as a component of Red Hat Quay 3.9",
"product_id": "Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:47e21d3d9c9ee2de4a1e557e32521f64db2098b9f4dcd32e0d6f4d0962be7993_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:47e21d3d9c9ee2de4a1e557e32521f64db2098b9f4dcd32e0d6f4d0962be7993_amd64",
"relates_to_product_reference": "Red Hat Quay 3.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:69806c46f3439bd780533b2660726a95c8acbff0986e340b040f1fb333e5feaf_arm64 as a component of Red Hat Quay 3.9",
"product_id": "Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:69806c46f3439bd780533b2660726a95c8acbff0986e340b040f1fb333e5feaf_arm64"
},
"product_reference": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:69806c46f3439bd780533b2660726a95c8acbff0986e340b040f1fb333e5feaf_arm64",
"relates_to_product_reference": "Red Hat Quay 3.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:88724eda5d52df59f156b7d318f69c79540faddb41bb770b7f56394fd76ba5e1_ppc64le as a component of Red Hat Quay 3.9",
"product_id": "Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:88724eda5d52df59f156b7d318f69c79540faddb41bb770b7f56394fd76ba5e1_ppc64le"
},
"product_reference": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:88724eda5d52df59f156b7d318f69c79540faddb41bb770b7f56394fd76ba5e1_ppc64le",
"relates_to_product_reference": "Red Hat Quay 3.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:e701896ef9c36202581832d3dd9413f99c94ab7da435f7afb91c9e0ffe2e20ae_s390x as a component of Red Hat Quay 3.9",
"product_id": "Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:e701896ef9c36202581832d3dd9413f99c94ab7da435f7afb91c9e0ffe2e20ae_s390x"
},
"product_reference": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:e701896ef9c36202581832d3dd9413f99c94ab7da435f7afb91c9e0ffe2e20ae_s390x",
"relates_to_product_reference": "Red Hat Quay 3.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:118676c250f94b51d2484414190933c1d8fa61605cef0deff2aab6527f783d73_ppc64le as a component of Red Hat Quay 3.9",
"product_id": "Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:118676c250f94b51d2484414190933c1d8fa61605cef0deff2aab6527f783d73_ppc64le"
},
"product_reference": "registry.redhat.io/quay/quay-builder-rhel8@sha256:118676c250f94b51d2484414190933c1d8fa61605cef0deff2aab6527f783d73_ppc64le",
"relates_to_product_reference": "Red Hat Quay 3.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:5f883757f060b68dfd010f125d31556df3d29c129de088c257debd8239cf7d40_amd64 as a component of Red Hat Quay 3.9",
"product_id": "Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:5f883757f060b68dfd010f125d31556df3d29c129de088c257debd8239cf7d40_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-builder-rhel8@sha256:5f883757f060b68dfd010f125d31556df3d29c129de088c257debd8239cf7d40_amd64",
"relates_to_product_reference": "Red Hat Quay 3.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:a9cbc8c21b24b5a534de5e553040b13d7d02dcb7ebf23d35019a65a253825bb6_arm64 as a component of Red Hat Quay 3.9",
"product_id": "Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:a9cbc8c21b24b5a534de5e553040b13d7d02dcb7ebf23d35019a65a253825bb6_arm64"
},
"product_reference": "registry.redhat.io/quay/quay-builder-rhel8@sha256:a9cbc8c21b24b5a534de5e553040b13d7d02dcb7ebf23d35019a65a253825bb6_arm64",
"relates_to_product_reference": "Red Hat Quay 3.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:c644998824e04ecf279deae25a22cce6c48d8bca44755f76eb4abacf17052519_s390x as a component of Red Hat Quay 3.9",
"product_id": "Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:c644998824e04ecf279deae25a22cce6c48d8bca44755f76eb4abacf17052519_s390x"
},
"product_reference": "registry.redhat.io/quay/quay-builder-rhel8@sha256:c644998824e04ecf279deae25a22cce6c48d8bca44755f76eb4abacf17052519_s390x",
"relates_to_product_reference": "Red Hat Quay 3.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:00dc04b86ae7fd7dd37e9234ed2b4a1d0f0403993c153e197ac8b96233e95048_amd64 as a component of Red Hat Quay 3.9",
"product_id": "Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:00dc04b86ae7fd7dd37e9234ed2b4a1d0f0403993c153e197ac8b96233e95048_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:00dc04b86ae7fd7dd37e9234ed2b4a1d0f0403993c153e197ac8b96233e95048_amd64",
"relates_to_product_reference": "Red Hat Quay 3.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:385004b2d63a6fee322819b91d7d1df2368742b75a88960f9a43adb5a3727ac0_ppc64le as a component of Red Hat Quay 3.9",
"product_id": "Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:385004b2d63a6fee322819b91d7d1df2368742b75a88960f9a43adb5a3727ac0_ppc64le"
},
"product_reference": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:385004b2d63a6fee322819b91d7d1df2368742b75a88960f9a43adb5a3727ac0_ppc64le",
"relates_to_product_reference": "Red Hat Quay 3.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:795bd464d6825f905679d1ad504d7e4f5c6291f89706f3b78c41bc6776522805_arm64 as a component of Red Hat Quay 3.9",
"product_id": "Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:795bd464d6825f905679d1ad504d7e4f5c6291f89706f3b78c41bc6776522805_arm64"
},
"product_reference": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:795bd464d6825f905679d1ad504d7e4f5c6291f89706f3b78c41bc6776522805_arm64",
"relates_to_product_reference": "Red Hat Quay 3.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:b3fc7bb5b6912f68e9b3422eb2f3ad072f0cd8ff412c5b56b9879fd4a6f3f78c_s390x as a component of Red Hat Quay 3.9",
"product_id": "Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:b3fc7bb5b6912f68e9b3422eb2f3ad072f0cd8ff412c5b56b9879fd4a6f3f78c_s390x"
},
"product_reference": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:b3fc7bb5b6912f68e9b3422eb2f3ad072f0cd8ff412c5b56b9879fd4a6f3f78c_s390x",
"relates_to_product_reference": "Red Hat Quay 3.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:cc9d5c2de42541033a2c01aeb385404058cdac60a8cd2fd9889f7d73cdbc6292_amd64 as a component of Red Hat Quay 3.9",
"product_id": "Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:cc9d5c2de42541033a2c01aeb385404058cdac60a8cd2fd9889f7d73cdbc6292_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:cc9d5c2de42541033a2c01aeb385404058cdac60a8cd2fd9889f7d73cdbc6292_amd64",
"relates_to_product_reference": "Red Hat Quay 3.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-operator-bundle@sha256:3c1f25918b505ec71eaf93d2a0b963d209e36d847e7fc48469f9d40b534344ae_amd64 as a component of Red Hat Quay 3.9",
"product_id": "Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-bundle@sha256:3c1f25918b505ec71eaf93d2a0b963d209e36d847e7fc48469f9d40b534344ae_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-operator-bundle@sha256:3c1f25918b505ec71eaf93d2a0b963d209e36d847e7fc48469f9d40b534344ae_amd64",
"relates_to_product_reference": "Red Hat Quay 3.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:02fa492e51729469aaf4e106ad4fbfbf8bfeb63fd51b668782825a4f0ef10194_amd64 as a component of Red Hat Quay 3.9",
"product_id": "Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:02fa492e51729469aaf4e106ad4fbfbf8bfeb63fd51b668782825a4f0ef10194_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-operator-rhel8@sha256:02fa492e51729469aaf4e106ad4fbfbf8bfeb63fd51b668782825a4f0ef10194_amd64",
"relates_to_product_reference": "Red Hat Quay 3.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:1230d53c9bf30d0ef730a403012530c0bf654d597b164687911524f8b5085eac_s390x as a component of Red Hat Quay 3.9",
"product_id": "Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:1230d53c9bf30d0ef730a403012530c0bf654d597b164687911524f8b5085eac_s390x"
},
"product_reference": "registry.redhat.io/quay/quay-operator-rhel8@sha256:1230d53c9bf30d0ef730a403012530c0bf654d597b164687911524f8b5085eac_s390x",
"relates_to_product_reference": "Red Hat Quay 3.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:6d831031c1e4cdc251236b241e4a15b7152900d75fb0bee8bdd39610e249a53b_ppc64le as a component of Red Hat Quay 3.9",
"product_id": "Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:6d831031c1e4cdc251236b241e4a15b7152900d75fb0bee8bdd39610e249a53b_ppc64le"
},
"product_reference": "registry.redhat.io/quay/quay-operator-rhel8@sha256:6d831031c1e4cdc251236b241e4a15b7152900d75fb0bee8bdd39610e249a53b_ppc64le",
"relates_to_product_reference": "Red Hat Quay 3.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:ce4e7a55f2d6768340bf5d13b3b60e61c3d1a783ec338f591dd56003e665895e_arm64 as a component of Red Hat Quay 3.9",
"product_id": "Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:ce4e7a55f2d6768340bf5d13b3b60e61c3d1a783ec338f591dd56003e665895e_arm64"
},
"product_reference": "registry.redhat.io/quay/quay-operator-rhel8@sha256:ce4e7a55f2d6768340bf5d13b3b60e61c3d1a783ec338f591dd56003e665895e_arm64",
"relates_to_product_reference": "Red Hat Quay 3.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-rhel8@sha256:1cb5d4a87d8bd300edace58d2f3658e1296a23c0d4fed13fd0baa2fdb1da27d8_amd64 as a component of Red Hat Quay 3.9",
"product_id": "Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:1cb5d4a87d8bd300edace58d2f3658e1296a23c0d4fed13fd0baa2fdb1da27d8_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-rhel8@sha256:1cb5d4a87d8bd300edace58d2f3658e1296a23c0d4fed13fd0baa2fdb1da27d8_amd64",
"relates_to_product_reference": "Red Hat Quay 3.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-rhel8@sha256:1e95647d265fcc668bb66cc83fff56eb00eb2a7a4c8a7a2d86186bdc68de3ea0_ppc64le as a component of Red Hat Quay 3.9",
"product_id": "Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:1e95647d265fcc668bb66cc83fff56eb00eb2a7a4c8a7a2d86186bdc68de3ea0_ppc64le"
},
"product_reference": "registry.redhat.io/quay/quay-rhel8@sha256:1e95647d265fcc668bb66cc83fff56eb00eb2a7a4c8a7a2d86186bdc68de3ea0_ppc64le",
"relates_to_product_reference": "Red Hat Quay 3.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-rhel8@sha256:2336ad8d4b4874a92c6cfcbc8458b6d26f7f6dde300ca0e159f2b73d7e6839cd_arm64 as a component of Red Hat Quay 3.9",
"product_id": "Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:2336ad8d4b4874a92c6cfcbc8458b6d26f7f6dde300ca0e159f2b73d7e6839cd_arm64"
},
"product_reference": "registry.redhat.io/quay/quay-rhel8@sha256:2336ad8d4b4874a92c6cfcbc8458b6d26f7f6dde300ca0e159f2b73d7e6839cd_arm64",
"relates_to_product_reference": "Red Hat Quay 3.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-rhel8@sha256:55a8de289089989f26365c0011d30310fdc525e8515f7be94956b8c21769edda_s390x as a component of Red Hat Quay 3.9",
"product_id": "Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:55a8de289089989f26365c0011d30310fdc525e8515f7be94956b8c21769edda_s390x"
},
"product_reference": "registry.redhat.io/quay/quay-rhel8@sha256:55a8de289089989f26365c0011d30310fdc525e8515f7be94956b8c21769edda_s390x",
"relates_to_product_reference": "Red Hat Quay 3.9"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-34156",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"discovery_date": "2024-09-06T21:20:09.377905+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:02ced94ebfcce3e21bcc71af6aa1c11db50822c91dd05cec4fb41a34e6669112_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:42a67bb2e5ab681eadc253b413f0bf557d63f282f270e6064f5768fecf6886e5_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:880c746eb5822f68e41ca7b60d97799115c30f39bdc7e458f7a4101e2af36c8c_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:ad995b723102f4472e4190257b61582de5c6b058b908bcee7cebe683ae77be75_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:7db467404171294d793ef0fd1a59fd6e5bd20ed8915913a1edf013d18e4c9a78_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1deefc2cd91d0f2c474eda0fbb81bbce30786754d8fb9100b73823fae9562a40_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b0b66c3c98a91dc4d4e1e0dd1b2fa58b542b02e27ba283cd5d90b7758ebfaf21_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:ddbf02cbfae810853f79628b576abcd0276f27ef27ad07a92f71df93a339cb4a_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f78eef52e9365e9e2beb65496840748f00d6b6f662da50bbf48b9c695369b359_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:47e21d3d9c9ee2de4a1e557e32521f64db2098b9f4dcd32e0d6f4d0962be7993_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:69806c46f3439bd780533b2660726a95c8acbff0986e340b040f1fb333e5feaf_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:88724eda5d52df59f156b7d318f69c79540faddb41bb770b7f56394fd76ba5e1_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:e701896ef9c36202581832d3dd9413f99c94ab7da435f7afb91c9e0ffe2e20ae_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:118676c250f94b51d2484414190933c1d8fa61605cef0deff2aab6527f783d73_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:5f883757f060b68dfd010f125d31556df3d29c129de088c257debd8239cf7d40_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:a9cbc8c21b24b5a534de5e553040b13d7d02dcb7ebf23d35019a65a253825bb6_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:c644998824e04ecf279deae25a22cce6c48d8bca44755f76eb4abacf17052519_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:00dc04b86ae7fd7dd37e9234ed2b4a1d0f0403993c153e197ac8b96233e95048_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-bundle@sha256:3c1f25918b505ec71eaf93d2a0b963d209e36d847e7fc48469f9d40b534344ae_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:1cb5d4a87d8bd300edace58d2f3658e1296a23c0d4fed13fd0baa2fdb1da27d8_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:1e95647d265fcc668bb66cc83fff56eb00eb2a7a4c8a7a2d86186bdc68de3ea0_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:2336ad8d4b4874a92c6cfcbc8458b6d26f7f6dde300ca0e159f2b73d7e6839cd_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:55a8de289089989f26365c0011d30310fdc525e8515f7be94956b8c21769edda_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2310528"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the encoding/gob package of the Golang standard library. Calling Decoder.Decoding, a message that contains deeply nested structures, can cause a panic due to stack exhaustion. This is a follow-up to CVE-2022-30635.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability in Go\u0027s `encoding/gob` package is of high severity because it exposes applications to potential Denial of Service (DoS) attacks through stack exhaustion. Since `gob` relies on recursive function calls to decode nested structures, an attacker could exploit this by sending crafted messages with excessively deep nesting, causing the application to panic due to stack overflow. This risk is particularly important in scenarios where untrusted or external input is processed, as it can lead to system unavailability or crashes, undermining the reliability and availability of services.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:385004b2d63a6fee322819b91d7d1df2368742b75a88960f9a43adb5a3727ac0_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:795bd464d6825f905679d1ad504d7e4f5c6291f89706f3b78c41bc6776522805_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:b3fc7bb5b6912f68e9b3422eb2f3ad072f0cd8ff412c5b56b9879fd4a6f3f78c_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:cc9d5c2de42541033a2c01aeb385404058cdac60a8cd2fd9889f7d73cdbc6292_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:02fa492e51729469aaf4e106ad4fbfbf8bfeb63fd51b668782825a4f0ef10194_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:1230d53c9bf30d0ef730a403012530c0bf654d597b164687911524f8b5085eac_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:6d831031c1e4cdc251236b241e4a15b7152900d75fb0bee8bdd39610e249a53b_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:ce4e7a55f2d6768340bf5d13b3b60e61c3d1a783ec338f591dd56003e665895e_arm64"
],
"known_not_affected": [
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:02ced94ebfcce3e21bcc71af6aa1c11db50822c91dd05cec4fb41a34e6669112_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:42a67bb2e5ab681eadc253b413f0bf557d63f282f270e6064f5768fecf6886e5_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:880c746eb5822f68e41ca7b60d97799115c30f39bdc7e458f7a4101e2af36c8c_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:ad995b723102f4472e4190257b61582de5c6b058b908bcee7cebe683ae77be75_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:7db467404171294d793ef0fd1a59fd6e5bd20ed8915913a1edf013d18e4c9a78_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1deefc2cd91d0f2c474eda0fbb81bbce30786754d8fb9100b73823fae9562a40_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b0b66c3c98a91dc4d4e1e0dd1b2fa58b542b02e27ba283cd5d90b7758ebfaf21_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:ddbf02cbfae810853f79628b576abcd0276f27ef27ad07a92f71df93a339cb4a_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f78eef52e9365e9e2beb65496840748f00d6b6f662da50bbf48b9c695369b359_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:47e21d3d9c9ee2de4a1e557e32521f64db2098b9f4dcd32e0d6f4d0962be7993_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:69806c46f3439bd780533b2660726a95c8acbff0986e340b040f1fb333e5feaf_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:88724eda5d52df59f156b7d318f69c79540faddb41bb770b7f56394fd76ba5e1_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:e701896ef9c36202581832d3dd9413f99c94ab7da435f7afb91c9e0ffe2e20ae_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:118676c250f94b51d2484414190933c1d8fa61605cef0deff2aab6527f783d73_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:5f883757f060b68dfd010f125d31556df3d29c129de088c257debd8239cf7d40_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:a9cbc8c21b24b5a534de5e553040b13d7d02dcb7ebf23d35019a65a253825bb6_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:c644998824e04ecf279deae25a22cce6c48d8bca44755f76eb4abacf17052519_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:00dc04b86ae7fd7dd37e9234ed2b4a1d0f0403993c153e197ac8b96233e95048_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-bundle@sha256:3c1f25918b505ec71eaf93d2a0b963d209e36d847e7fc48469f9d40b534344ae_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:1cb5d4a87d8bd300edace58d2f3658e1296a23c0d4fed13fd0baa2fdb1da27d8_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:1e95647d265fcc668bb66cc83fff56eb00eb2a7a4c8a7a2d86186bdc68de3ea0_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:2336ad8d4b4874a92c6cfcbc8458b6d26f7f6dde300ca0e159f2b73d7e6839cd_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:55a8de289089989f26365c0011d30310fdc525e8515f7be94956b8c21769edda_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-34156"
},
{
"category": "external",
"summary": "RHBZ#2310528",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2310528"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-34156",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34156"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-34156",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-34156"
},
{
"category": "external",
"summary": "https://go.dev/cl/611239",
"url": "https://go.dev/cl/611239"
},
{
"category": "external",
"summary": "https://go.dev/issue/69139",
"url": "https://go.dev/issue/69139"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-dev/c/S9POB9NCTdk",
"url": "https://groups.google.com/g/golang-dev/c/S9POB9NCTdk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2024-3106",
"url": "https://pkg.go.dev/vuln/GO-2024-3106"
}
],
"release_date": "2024-09-06T21:15:12.020000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-12-10T16:13:23+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:385004b2d63a6fee322819b91d7d1df2368742b75a88960f9a43adb5a3727ac0_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:795bd464d6825f905679d1ad504d7e4f5c6291f89706f3b78c41bc6776522805_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:b3fc7bb5b6912f68e9b3422eb2f3ad072f0cd8ff412c5b56b9879fd4a6f3f78c_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:cc9d5c2de42541033a2c01aeb385404058cdac60a8cd2fd9889f7d73cdbc6292_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:02fa492e51729469aaf4e106ad4fbfbf8bfeb63fd51b668782825a4f0ef10194_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:1230d53c9bf30d0ef730a403012530c0bf654d597b164687911524f8b5085eac_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:6d831031c1e4cdc251236b241e4a15b7152900d75fb0bee8bdd39610e249a53b_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:ce4e7a55f2d6768340bf5d13b3b60e61c3d1a783ec338f591dd56003e665895e_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:23061"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:02ced94ebfcce3e21bcc71af6aa1c11db50822c91dd05cec4fb41a34e6669112_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:42a67bb2e5ab681eadc253b413f0bf557d63f282f270e6064f5768fecf6886e5_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:880c746eb5822f68e41ca7b60d97799115c30f39bdc7e458f7a4101e2af36c8c_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:ad995b723102f4472e4190257b61582de5c6b058b908bcee7cebe683ae77be75_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:7db467404171294d793ef0fd1a59fd6e5bd20ed8915913a1edf013d18e4c9a78_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1deefc2cd91d0f2c474eda0fbb81bbce30786754d8fb9100b73823fae9562a40_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b0b66c3c98a91dc4d4e1e0dd1b2fa58b542b02e27ba283cd5d90b7758ebfaf21_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:ddbf02cbfae810853f79628b576abcd0276f27ef27ad07a92f71df93a339cb4a_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f78eef52e9365e9e2beb65496840748f00d6b6f662da50bbf48b9c695369b359_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:47e21d3d9c9ee2de4a1e557e32521f64db2098b9f4dcd32e0d6f4d0962be7993_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:69806c46f3439bd780533b2660726a95c8acbff0986e340b040f1fb333e5feaf_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:88724eda5d52df59f156b7d318f69c79540faddb41bb770b7f56394fd76ba5e1_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:e701896ef9c36202581832d3dd9413f99c94ab7da435f7afb91c9e0ffe2e20ae_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:118676c250f94b51d2484414190933c1d8fa61605cef0deff2aab6527f783d73_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:5f883757f060b68dfd010f125d31556df3d29c129de088c257debd8239cf7d40_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:a9cbc8c21b24b5a534de5e553040b13d7d02dcb7ebf23d35019a65a253825bb6_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:c644998824e04ecf279deae25a22cce6c48d8bca44755f76eb4abacf17052519_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:00dc04b86ae7fd7dd37e9234ed2b4a1d0f0403993c153e197ac8b96233e95048_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:385004b2d63a6fee322819b91d7d1df2368742b75a88960f9a43adb5a3727ac0_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:795bd464d6825f905679d1ad504d7e4f5c6291f89706f3b78c41bc6776522805_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:b3fc7bb5b6912f68e9b3422eb2f3ad072f0cd8ff412c5b56b9879fd4a6f3f78c_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:cc9d5c2de42541033a2c01aeb385404058cdac60a8cd2fd9889f7d73cdbc6292_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-bundle@sha256:3c1f25918b505ec71eaf93d2a0b963d209e36d847e7fc48469f9d40b534344ae_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:02fa492e51729469aaf4e106ad4fbfbf8bfeb63fd51b668782825a4f0ef10194_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:1230d53c9bf30d0ef730a403012530c0bf654d597b164687911524f8b5085eac_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:6d831031c1e4cdc251236b241e4a15b7152900d75fb0bee8bdd39610e249a53b_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:ce4e7a55f2d6768340bf5d13b3b60e61c3d1a783ec338f591dd56003e665895e_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:1cb5d4a87d8bd300edace58d2f3658e1296a23c0d4fed13fd0baa2fdb1da27d8_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:1e95647d265fcc668bb66cc83fff56eb00eb2a7a4c8a7a2d86186bdc68de3ea0_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:2336ad8d4b4874a92c6cfcbc8458b6d26f7f6dde300ca0e159f2b73d7e6839cd_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:55a8de289089989f26365c0011d30310fdc525e8515f7be94956b8c21769edda_s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:02ced94ebfcce3e21bcc71af6aa1c11db50822c91dd05cec4fb41a34e6669112_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:42a67bb2e5ab681eadc253b413f0bf557d63f282f270e6064f5768fecf6886e5_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:880c746eb5822f68e41ca7b60d97799115c30f39bdc7e458f7a4101e2af36c8c_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:ad995b723102f4472e4190257b61582de5c6b058b908bcee7cebe683ae77be75_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:7db467404171294d793ef0fd1a59fd6e5bd20ed8915913a1edf013d18e4c9a78_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1deefc2cd91d0f2c474eda0fbb81bbce30786754d8fb9100b73823fae9562a40_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b0b66c3c98a91dc4d4e1e0dd1b2fa58b542b02e27ba283cd5d90b7758ebfaf21_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:ddbf02cbfae810853f79628b576abcd0276f27ef27ad07a92f71df93a339cb4a_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f78eef52e9365e9e2beb65496840748f00d6b6f662da50bbf48b9c695369b359_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:47e21d3d9c9ee2de4a1e557e32521f64db2098b9f4dcd32e0d6f4d0962be7993_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:69806c46f3439bd780533b2660726a95c8acbff0986e340b040f1fb333e5feaf_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:88724eda5d52df59f156b7d318f69c79540faddb41bb770b7f56394fd76ba5e1_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:e701896ef9c36202581832d3dd9413f99c94ab7da435f7afb91c9e0ffe2e20ae_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:118676c250f94b51d2484414190933c1d8fa61605cef0deff2aab6527f783d73_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:5f883757f060b68dfd010f125d31556df3d29c129de088c257debd8239cf7d40_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:a9cbc8c21b24b5a534de5e553040b13d7d02dcb7ebf23d35019a65a253825bb6_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:c644998824e04ecf279deae25a22cce6c48d8bca44755f76eb4abacf17052519_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:00dc04b86ae7fd7dd37e9234ed2b4a1d0f0403993c153e197ac8b96233e95048_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:385004b2d63a6fee322819b91d7d1df2368742b75a88960f9a43adb5a3727ac0_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:795bd464d6825f905679d1ad504d7e4f5c6291f89706f3b78c41bc6776522805_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:b3fc7bb5b6912f68e9b3422eb2f3ad072f0cd8ff412c5b56b9879fd4a6f3f78c_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:cc9d5c2de42541033a2c01aeb385404058cdac60a8cd2fd9889f7d73cdbc6292_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-bundle@sha256:3c1f25918b505ec71eaf93d2a0b963d209e36d847e7fc48469f9d40b534344ae_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:02fa492e51729469aaf4e106ad4fbfbf8bfeb63fd51b668782825a4f0ef10194_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:1230d53c9bf30d0ef730a403012530c0bf654d597b164687911524f8b5085eac_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:6d831031c1e4cdc251236b241e4a15b7152900d75fb0bee8bdd39610e249a53b_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:ce4e7a55f2d6768340bf5d13b3b60e61c3d1a783ec338f591dd56003e665895e_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:1cb5d4a87d8bd300edace58d2f3658e1296a23c0d4fed13fd0baa2fdb1da27d8_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:1e95647d265fcc668bb66cc83fff56eb00eb2a7a4c8a7a2d86186bdc68de3ea0_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:2336ad8d4b4874a92c6cfcbc8458b6d26f7f6dde300ca0e159f2b73d7e6839cd_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:55a8de289089989f26365c0011d30310fdc525e8515f7be94956b8c21769edda_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion"
},
{
"cve": "CVE-2024-45337",
"cwe": {
"id": "CWE-285",
"name": "Improper Authorization"
},
"discovery_date": "2024-12-11T19:00:54.247490+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:02ced94ebfcce3e21bcc71af6aa1c11db50822c91dd05cec4fb41a34e6669112_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:42a67bb2e5ab681eadc253b413f0bf557d63f282f270e6064f5768fecf6886e5_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:880c746eb5822f68e41ca7b60d97799115c30f39bdc7e458f7a4101e2af36c8c_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:ad995b723102f4472e4190257b61582de5c6b058b908bcee7cebe683ae77be75_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:7db467404171294d793ef0fd1a59fd6e5bd20ed8915913a1edf013d18e4c9a78_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1deefc2cd91d0f2c474eda0fbb81bbce30786754d8fb9100b73823fae9562a40_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b0b66c3c98a91dc4d4e1e0dd1b2fa58b542b02e27ba283cd5d90b7758ebfaf21_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:ddbf02cbfae810853f79628b576abcd0276f27ef27ad07a92f71df93a339cb4a_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f78eef52e9365e9e2beb65496840748f00d6b6f662da50bbf48b9c695369b359_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:47e21d3d9c9ee2de4a1e557e32521f64db2098b9f4dcd32e0d6f4d0962be7993_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:69806c46f3439bd780533b2660726a95c8acbff0986e340b040f1fb333e5feaf_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:88724eda5d52df59f156b7d318f69c79540faddb41bb770b7f56394fd76ba5e1_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:e701896ef9c36202581832d3dd9413f99c94ab7da435f7afb91c9e0ffe2e20ae_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:118676c250f94b51d2484414190933c1d8fa61605cef0deff2aab6527f783d73_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:5f883757f060b68dfd010f125d31556df3d29c129de088c257debd8239cf7d40_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:a9cbc8c21b24b5a534de5e553040b13d7d02dcb7ebf23d35019a65a253825bb6_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:c644998824e04ecf279deae25a22cce6c48d8bca44755f76eb4abacf17052519_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:00dc04b86ae7fd7dd37e9234ed2b4a1d0f0403993c153e197ac8b96233e95048_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:385004b2d63a6fee322819b91d7d1df2368742b75a88960f9a43adb5a3727ac0_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:795bd464d6825f905679d1ad504d7e4f5c6291f89706f3b78c41bc6776522805_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:b3fc7bb5b6912f68e9b3422eb2f3ad072f0cd8ff412c5b56b9879fd4a6f3f78c_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:cc9d5c2de42541033a2c01aeb385404058cdac60a8cd2fd9889f7d73cdbc6292_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-bundle@sha256:3c1f25918b505ec71eaf93d2a0b963d209e36d847e7fc48469f9d40b534344ae_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:1cb5d4a87d8bd300edace58d2f3658e1296a23c0d4fed13fd0baa2fdb1da27d8_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:1e95647d265fcc668bb66cc83fff56eb00eb2a7a4c8a7a2d86186bdc68de3ea0_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:2336ad8d4b4874a92c6cfcbc8458b6d26f7f6dde300ca0e159f2b73d7e6839cd_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:55a8de289089989f26365c0011d30310fdc525e8515f7be94956b8c21769edda_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2331720"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the x/crypto/ssh go library. Applications and libraries that misuse the ServerConfig.PublicKeyCallback callback may be susceptible to an authorization bypass. For example, an attacker may send public keys A and B and authenticate with A. PublicKeyCallback would be called only twice, first with A and then with B. A vulnerable application may then make authorization decisions based on key B, for which the attacker does not control the private key. The misuse of ServerConfig.PublicKeyCallback may cause an authorization bypass.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang.org/x/crypto/ssh: Misuse of ServerConfig.PublicKeyCallback may cause authorization bypass in golang.org/x/crypto",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is classified as important rather than critical because it does not directly enable unauthorized access but rather introduces a risk of authorization bypass if the application or library misuses the PublicKeyCallback API. The vulnerability relies on incorrect assumptions made by the application when handling the sequence or state of keys provided during SSH authentication. Properly implemented systems that use the Permissions field or avoid relying on external state remain unaffected. Additionally, the vulnerability does not allow direct exploitation to gain control over a system without the presence of insecure logic in the application\u0027s handling of authentication attempts.\n\n\nRed Hat Enterprise Linux(RHEL) 8 \u0026 9 and Red Hat Openshift marked as not affected as it was determined that the problem function `ServerConfig.PublicKeyCallback`, as noted in the CVE-2024-45337 issue, is not called by Podman, Buildah, containers-common, or the gvisor-tap-vsock projects.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:02fa492e51729469aaf4e106ad4fbfbf8bfeb63fd51b668782825a4f0ef10194_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:1230d53c9bf30d0ef730a403012530c0bf654d597b164687911524f8b5085eac_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:6d831031c1e4cdc251236b241e4a15b7152900d75fb0bee8bdd39610e249a53b_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:ce4e7a55f2d6768340bf5d13b3b60e61c3d1a783ec338f591dd56003e665895e_arm64"
],
"known_not_affected": [
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:02ced94ebfcce3e21bcc71af6aa1c11db50822c91dd05cec4fb41a34e6669112_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:42a67bb2e5ab681eadc253b413f0bf557d63f282f270e6064f5768fecf6886e5_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:880c746eb5822f68e41ca7b60d97799115c30f39bdc7e458f7a4101e2af36c8c_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:ad995b723102f4472e4190257b61582de5c6b058b908bcee7cebe683ae77be75_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:7db467404171294d793ef0fd1a59fd6e5bd20ed8915913a1edf013d18e4c9a78_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1deefc2cd91d0f2c474eda0fbb81bbce30786754d8fb9100b73823fae9562a40_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b0b66c3c98a91dc4d4e1e0dd1b2fa58b542b02e27ba283cd5d90b7758ebfaf21_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:ddbf02cbfae810853f79628b576abcd0276f27ef27ad07a92f71df93a339cb4a_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f78eef52e9365e9e2beb65496840748f00d6b6f662da50bbf48b9c695369b359_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:47e21d3d9c9ee2de4a1e557e32521f64db2098b9f4dcd32e0d6f4d0962be7993_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:69806c46f3439bd780533b2660726a95c8acbff0986e340b040f1fb333e5feaf_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:88724eda5d52df59f156b7d318f69c79540faddb41bb770b7f56394fd76ba5e1_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:e701896ef9c36202581832d3dd9413f99c94ab7da435f7afb91c9e0ffe2e20ae_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:118676c250f94b51d2484414190933c1d8fa61605cef0deff2aab6527f783d73_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:5f883757f060b68dfd010f125d31556df3d29c129de088c257debd8239cf7d40_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:a9cbc8c21b24b5a534de5e553040b13d7d02dcb7ebf23d35019a65a253825bb6_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:c644998824e04ecf279deae25a22cce6c48d8bca44755f76eb4abacf17052519_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:00dc04b86ae7fd7dd37e9234ed2b4a1d0f0403993c153e197ac8b96233e95048_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:385004b2d63a6fee322819b91d7d1df2368742b75a88960f9a43adb5a3727ac0_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:795bd464d6825f905679d1ad504d7e4f5c6291f89706f3b78c41bc6776522805_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:b3fc7bb5b6912f68e9b3422eb2f3ad072f0cd8ff412c5b56b9879fd4a6f3f78c_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:cc9d5c2de42541033a2c01aeb385404058cdac60a8cd2fd9889f7d73cdbc6292_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-bundle@sha256:3c1f25918b505ec71eaf93d2a0b963d209e36d847e7fc48469f9d40b534344ae_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:1cb5d4a87d8bd300edace58d2f3658e1296a23c0d4fed13fd0baa2fdb1da27d8_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:1e95647d265fcc668bb66cc83fff56eb00eb2a7a4c8a7a2d86186bdc68de3ea0_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:2336ad8d4b4874a92c6cfcbc8458b6d26f7f6dde300ca0e159f2b73d7e6839cd_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:55a8de289089989f26365c0011d30310fdc525e8515f7be94956b8c21769edda_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-45337"
},
{
"category": "external",
"summary": "RHBZ#2331720",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331720"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-45337",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-45337"
},
{
"category": "external",
"summary": "https://github.com/golang/crypto/commit/b4f1988a35dee11ec3e05d6bf3e90b695fbd8909",
"url": "https://github.com/golang/crypto/commit/b4f1988a35dee11ec3e05d6bf3e90b695fbd8909"
},
{
"category": "external",
"summary": "https://go.dev/cl/635315",
"url": "https://go.dev/cl/635315"
},
{
"category": "external",
"summary": "https://go.dev/issue/70779",
"url": "https://go.dev/issue/70779"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/-nPEi39gI4Q/m/cGVPJCqdAQAJ",
"url": "https://groups.google.com/g/golang-announce/c/-nPEi39gI4Q/m/cGVPJCqdAQAJ"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2024-3321",
"url": "https://pkg.go.dev/vuln/GO-2024-3321"
}
],
"release_date": "2024-12-11T18:55:58.506000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-12-10T16:13:23+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:02fa492e51729469aaf4e106ad4fbfbf8bfeb63fd51b668782825a4f0ef10194_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:1230d53c9bf30d0ef730a403012530c0bf654d597b164687911524f8b5085eac_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:6d831031c1e4cdc251236b241e4a15b7152900d75fb0bee8bdd39610e249a53b_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:ce4e7a55f2d6768340bf5d13b3b60e61c3d1a783ec338f591dd56003e665895e_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:23061"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:02ced94ebfcce3e21bcc71af6aa1c11db50822c91dd05cec4fb41a34e6669112_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:42a67bb2e5ab681eadc253b413f0bf557d63f282f270e6064f5768fecf6886e5_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:880c746eb5822f68e41ca7b60d97799115c30f39bdc7e458f7a4101e2af36c8c_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:ad995b723102f4472e4190257b61582de5c6b058b908bcee7cebe683ae77be75_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:7db467404171294d793ef0fd1a59fd6e5bd20ed8915913a1edf013d18e4c9a78_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1deefc2cd91d0f2c474eda0fbb81bbce30786754d8fb9100b73823fae9562a40_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b0b66c3c98a91dc4d4e1e0dd1b2fa58b542b02e27ba283cd5d90b7758ebfaf21_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:ddbf02cbfae810853f79628b576abcd0276f27ef27ad07a92f71df93a339cb4a_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f78eef52e9365e9e2beb65496840748f00d6b6f662da50bbf48b9c695369b359_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:47e21d3d9c9ee2de4a1e557e32521f64db2098b9f4dcd32e0d6f4d0962be7993_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:69806c46f3439bd780533b2660726a95c8acbff0986e340b040f1fb333e5feaf_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:88724eda5d52df59f156b7d318f69c79540faddb41bb770b7f56394fd76ba5e1_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:e701896ef9c36202581832d3dd9413f99c94ab7da435f7afb91c9e0ffe2e20ae_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:118676c250f94b51d2484414190933c1d8fa61605cef0deff2aab6527f783d73_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:5f883757f060b68dfd010f125d31556df3d29c129de088c257debd8239cf7d40_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:a9cbc8c21b24b5a534de5e553040b13d7d02dcb7ebf23d35019a65a253825bb6_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:c644998824e04ecf279deae25a22cce6c48d8bca44755f76eb4abacf17052519_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:00dc04b86ae7fd7dd37e9234ed2b4a1d0f0403993c153e197ac8b96233e95048_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:385004b2d63a6fee322819b91d7d1df2368742b75a88960f9a43adb5a3727ac0_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:795bd464d6825f905679d1ad504d7e4f5c6291f89706f3b78c41bc6776522805_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:b3fc7bb5b6912f68e9b3422eb2f3ad072f0cd8ff412c5b56b9879fd4a6f3f78c_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:cc9d5c2de42541033a2c01aeb385404058cdac60a8cd2fd9889f7d73cdbc6292_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-bundle@sha256:3c1f25918b505ec71eaf93d2a0b963d209e36d847e7fc48469f9d40b534344ae_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:02fa492e51729469aaf4e106ad4fbfbf8bfeb63fd51b668782825a4f0ef10194_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:1230d53c9bf30d0ef730a403012530c0bf654d597b164687911524f8b5085eac_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:6d831031c1e4cdc251236b241e4a15b7152900d75fb0bee8bdd39610e249a53b_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:ce4e7a55f2d6768340bf5d13b3b60e61c3d1a783ec338f591dd56003e665895e_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:1cb5d4a87d8bd300edace58d2f3658e1296a23c0d4fed13fd0baa2fdb1da27d8_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:1e95647d265fcc668bb66cc83fff56eb00eb2a7a4c8a7a2d86186bdc68de3ea0_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:2336ad8d4b4874a92c6cfcbc8458b6d26f7f6dde300ca0e159f2b73d7e6839cd_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:55a8de289089989f26365c0011d30310fdc525e8515f7be94956b8c21769edda_s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:02ced94ebfcce3e21bcc71af6aa1c11db50822c91dd05cec4fb41a34e6669112_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:42a67bb2e5ab681eadc253b413f0bf557d63f282f270e6064f5768fecf6886e5_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:880c746eb5822f68e41ca7b60d97799115c30f39bdc7e458f7a4101e2af36c8c_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:ad995b723102f4472e4190257b61582de5c6b058b908bcee7cebe683ae77be75_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:7db467404171294d793ef0fd1a59fd6e5bd20ed8915913a1edf013d18e4c9a78_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1deefc2cd91d0f2c474eda0fbb81bbce30786754d8fb9100b73823fae9562a40_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b0b66c3c98a91dc4d4e1e0dd1b2fa58b542b02e27ba283cd5d90b7758ebfaf21_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:ddbf02cbfae810853f79628b576abcd0276f27ef27ad07a92f71df93a339cb4a_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f78eef52e9365e9e2beb65496840748f00d6b6f662da50bbf48b9c695369b359_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:47e21d3d9c9ee2de4a1e557e32521f64db2098b9f4dcd32e0d6f4d0962be7993_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:69806c46f3439bd780533b2660726a95c8acbff0986e340b040f1fb333e5feaf_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:88724eda5d52df59f156b7d318f69c79540faddb41bb770b7f56394fd76ba5e1_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:e701896ef9c36202581832d3dd9413f99c94ab7da435f7afb91c9e0ffe2e20ae_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:118676c250f94b51d2484414190933c1d8fa61605cef0deff2aab6527f783d73_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:5f883757f060b68dfd010f125d31556df3d29c129de088c257debd8239cf7d40_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:a9cbc8c21b24b5a534de5e553040b13d7d02dcb7ebf23d35019a65a253825bb6_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:c644998824e04ecf279deae25a22cce6c48d8bca44755f76eb4abacf17052519_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:00dc04b86ae7fd7dd37e9234ed2b4a1d0f0403993c153e197ac8b96233e95048_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:385004b2d63a6fee322819b91d7d1df2368742b75a88960f9a43adb5a3727ac0_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:795bd464d6825f905679d1ad504d7e4f5c6291f89706f3b78c41bc6776522805_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:b3fc7bb5b6912f68e9b3422eb2f3ad072f0cd8ff412c5b56b9879fd4a6f3f78c_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:cc9d5c2de42541033a2c01aeb385404058cdac60a8cd2fd9889f7d73cdbc6292_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-bundle@sha256:3c1f25918b505ec71eaf93d2a0b963d209e36d847e7fc48469f9d40b534344ae_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:02fa492e51729469aaf4e106ad4fbfbf8bfeb63fd51b668782825a4f0ef10194_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:1230d53c9bf30d0ef730a403012530c0bf654d597b164687911524f8b5085eac_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:6d831031c1e4cdc251236b241e4a15b7152900d75fb0bee8bdd39610e249a53b_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:ce4e7a55f2d6768340bf5d13b3b60e61c3d1a783ec338f591dd56003e665895e_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:1cb5d4a87d8bd300edace58d2f3658e1296a23c0d4fed13fd0baa2fdb1da27d8_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:1e95647d265fcc668bb66cc83fff56eb00eb2a7a4c8a7a2d86186bdc68de3ea0_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:2336ad8d4b4874a92c6cfcbc8458b6d26f7f6dde300ca0e159f2b73d7e6839cd_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:55a8de289089989f26365c0011d30310fdc525e8515f7be94956b8c21769edda_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang.org/x/crypto/ssh: Misuse of ServerConfig.PublicKeyCallback may cause authorization bypass in golang.org/x/crypto"
},
{
"cve": "CVE-2024-45338",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2024-12-18T21:00:59.938173+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:02ced94ebfcce3e21bcc71af6aa1c11db50822c91dd05cec4fb41a34e6669112_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:42a67bb2e5ab681eadc253b413f0bf557d63f282f270e6064f5768fecf6886e5_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:880c746eb5822f68e41ca7b60d97799115c30f39bdc7e458f7a4101e2af36c8c_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:ad995b723102f4472e4190257b61582de5c6b058b908bcee7cebe683ae77be75_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:7db467404171294d793ef0fd1a59fd6e5bd20ed8915913a1edf013d18e4c9a78_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1deefc2cd91d0f2c474eda0fbb81bbce30786754d8fb9100b73823fae9562a40_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b0b66c3c98a91dc4d4e1e0dd1b2fa58b542b02e27ba283cd5d90b7758ebfaf21_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:ddbf02cbfae810853f79628b576abcd0276f27ef27ad07a92f71df93a339cb4a_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f78eef52e9365e9e2beb65496840748f00d6b6f662da50bbf48b9c695369b359_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:47e21d3d9c9ee2de4a1e557e32521f64db2098b9f4dcd32e0d6f4d0962be7993_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:69806c46f3439bd780533b2660726a95c8acbff0986e340b040f1fb333e5feaf_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:88724eda5d52df59f156b7d318f69c79540faddb41bb770b7f56394fd76ba5e1_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:e701896ef9c36202581832d3dd9413f99c94ab7da435f7afb91c9e0ffe2e20ae_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:118676c250f94b51d2484414190933c1d8fa61605cef0deff2aab6527f783d73_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:5f883757f060b68dfd010f125d31556df3d29c129de088c257debd8239cf7d40_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:a9cbc8c21b24b5a534de5e553040b13d7d02dcb7ebf23d35019a65a253825bb6_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:c644998824e04ecf279deae25a22cce6c48d8bca44755f76eb4abacf17052519_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:00dc04b86ae7fd7dd37e9234ed2b4a1d0f0403993c153e197ac8b96233e95048_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:385004b2d63a6fee322819b91d7d1df2368742b75a88960f9a43adb5a3727ac0_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:795bd464d6825f905679d1ad504d7e4f5c6291f89706f3b78c41bc6776522805_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:b3fc7bb5b6912f68e9b3422eb2f3ad072f0cd8ff412c5b56b9879fd4a6f3f78c_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:cc9d5c2de42541033a2c01aeb385404058cdac60a8cd2fd9889f7d73cdbc6292_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-bundle@sha256:3c1f25918b505ec71eaf93d2a0b963d209e36d847e7fc48469f9d40b534344ae_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:1cb5d4a87d8bd300edace58d2f3658e1296a23c0d4fed13fd0baa2fdb1da27d8_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:1e95647d265fcc668bb66cc83fff56eb00eb2a7a4c8a7a2d86186bdc68de3ea0_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:2336ad8d4b4874a92c6cfcbc8458b6d26f7f6dde300ca0e159f2b73d7e6839cd_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:55a8de289089989f26365c0011d30310fdc525e8515f7be94956b8c21769edda_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2333122"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang.org/x/net/html. This flaw allows an attacker to craft input to the parse functions that would be processed non-linearly with respect to its length, resulting in extremely slow parsing. This issue can cause a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated as an Important severity because an attacker can craft malicious input that causes the parsing functions to process data non-linearly, resulting in significant delays which leads to a denial of service by exhausting system resources.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:02fa492e51729469aaf4e106ad4fbfbf8bfeb63fd51b668782825a4f0ef10194_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:1230d53c9bf30d0ef730a403012530c0bf654d597b164687911524f8b5085eac_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:6d831031c1e4cdc251236b241e4a15b7152900d75fb0bee8bdd39610e249a53b_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:ce4e7a55f2d6768340bf5d13b3b60e61c3d1a783ec338f591dd56003e665895e_arm64"
],
"known_not_affected": [
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:02ced94ebfcce3e21bcc71af6aa1c11db50822c91dd05cec4fb41a34e6669112_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:42a67bb2e5ab681eadc253b413f0bf557d63f282f270e6064f5768fecf6886e5_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:880c746eb5822f68e41ca7b60d97799115c30f39bdc7e458f7a4101e2af36c8c_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:ad995b723102f4472e4190257b61582de5c6b058b908bcee7cebe683ae77be75_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:7db467404171294d793ef0fd1a59fd6e5bd20ed8915913a1edf013d18e4c9a78_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1deefc2cd91d0f2c474eda0fbb81bbce30786754d8fb9100b73823fae9562a40_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b0b66c3c98a91dc4d4e1e0dd1b2fa58b542b02e27ba283cd5d90b7758ebfaf21_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:ddbf02cbfae810853f79628b576abcd0276f27ef27ad07a92f71df93a339cb4a_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f78eef52e9365e9e2beb65496840748f00d6b6f662da50bbf48b9c695369b359_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:47e21d3d9c9ee2de4a1e557e32521f64db2098b9f4dcd32e0d6f4d0962be7993_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:69806c46f3439bd780533b2660726a95c8acbff0986e340b040f1fb333e5feaf_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:88724eda5d52df59f156b7d318f69c79540faddb41bb770b7f56394fd76ba5e1_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:e701896ef9c36202581832d3dd9413f99c94ab7da435f7afb91c9e0ffe2e20ae_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:118676c250f94b51d2484414190933c1d8fa61605cef0deff2aab6527f783d73_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:5f883757f060b68dfd010f125d31556df3d29c129de088c257debd8239cf7d40_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:a9cbc8c21b24b5a534de5e553040b13d7d02dcb7ebf23d35019a65a253825bb6_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:c644998824e04ecf279deae25a22cce6c48d8bca44755f76eb4abacf17052519_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:00dc04b86ae7fd7dd37e9234ed2b4a1d0f0403993c153e197ac8b96233e95048_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:385004b2d63a6fee322819b91d7d1df2368742b75a88960f9a43adb5a3727ac0_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:795bd464d6825f905679d1ad504d7e4f5c6291f89706f3b78c41bc6776522805_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:b3fc7bb5b6912f68e9b3422eb2f3ad072f0cd8ff412c5b56b9879fd4a6f3f78c_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:cc9d5c2de42541033a2c01aeb385404058cdac60a8cd2fd9889f7d73cdbc6292_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-bundle@sha256:3c1f25918b505ec71eaf93d2a0b963d209e36d847e7fc48469f9d40b534344ae_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:1cb5d4a87d8bd300edace58d2f3658e1296a23c0d4fed13fd0baa2fdb1da27d8_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:1e95647d265fcc668bb66cc83fff56eb00eb2a7a4c8a7a2d86186bdc68de3ea0_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:2336ad8d4b4874a92c6cfcbc8458b6d26f7f6dde300ca0e159f2b73d7e6839cd_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:55a8de289089989f26365c0011d30310fdc525e8515f7be94956b8c21769edda_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-45338"
},
{
"category": "external",
"summary": "RHBZ#2333122",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333122"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-45338",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45338"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-45338",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-45338"
},
{
"category": "external",
"summary": "https://go.dev/cl/637536",
"url": "https://go.dev/cl/637536"
},
{
"category": "external",
"summary": "https://go.dev/issue/70906",
"url": "https://go.dev/issue/70906"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/wSCRmFnNmPA/m/Lvcd0mRMAwAJ",
"url": "https://groups.google.com/g/golang-announce/c/wSCRmFnNmPA/m/Lvcd0mRMAwAJ"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2024-3333",
"url": "https://pkg.go.dev/vuln/GO-2024-3333"
}
],
"release_date": "2024-12-18T20:38:22.660000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-12-10T16:13:23+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:02fa492e51729469aaf4e106ad4fbfbf8bfeb63fd51b668782825a4f0ef10194_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:1230d53c9bf30d0ef730a403012530c0bf654d597b164687911524f8b5085eac_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:6d831031c1e4cdc251236b241e4a15b7152900d75fb0bee8bdd39610e249a53b_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:ce4e7a55f2d6768340bf5d13b3b60e61c3d1a783ec338f591dd56003e665895e_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:23061"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:02ced94ebfcce3e21bcc71af6aa1c11db50822c91dd05cec4fb41a34e6669112_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:42a67bb2e5ab681eadc253b413f0bf557d63f282f270e6064f5768fecf6886e5_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:880c746eb5822f68e41ca7b60d97799115c30f39bdc7e458f7a4101e2af36c8c_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:ad995b723102f4472e4190257b61582de5c6b058b908bcee7cebe683ae77be75_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:7db467404171294d793ef0fd1a59fd6e5bd20ed8915913a1edf013d18e4c9a78_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1deefc2cd91d0f2c474eda0fbb81bbce30786754d8fb9100b73823fae9562a40_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b0b66c3c98a91dc4d4e1e0dd1b2fa58b542b02e27ba283cd5d90b7758ebfaf21_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:ddbf02cbfae810853f79628b576abcd0276f27ef27ad07a92f71df93a339cb4a_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f78eef52e9365e9e2beb65496840748f00d6b6f662da50bbf48b9c695369b359_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:47e21d3d9c9ee2de4a1e557e32521f64db2098b9f4dcd32e0d6f4d0962be7993_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:69806c46f3439bd780533b2660726a95c8acbff0986e340b040f1fb333e5feaf_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:88724eda5d52df59f156b7d318f69c79540faddb41bb770b7f56394fd76ba5e1_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:e701896ef9c36202581832d3dd9413f99c94ab7da435f7afb91c9e0ffe2e20ae_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:118676c250f94b51d2484414190933c1d8fa61605cef0deff2aab6527f783d73_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:5f883757f060b68dfd010f125d31556df3d29c129de088c257debd8239cf7d40_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:a9cbc8c21b24b5a534de5e553040b13d7d02dcb7ebf23d35019a65a253825bb6_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:c644998824e04ecf279deae25a22cce6c48d8bca44755f76eb4abacf17052519_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:00dc04b86ae7fd7dd37e9234ed2b4a1d0f0403993c153e197ac8b96233e95048_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:385004b2d63a6fee322819b91d7d1df2368742b75a88960f9a43adb5a3727ac0_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:795bd464d6825f905679d1ad504d7e4f5c6291f89706f3b78c41bc6776522805_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:b3fc7bb5b6912f68e9b3422eb2f3ad072f0cd8ff412c5b56b9879fd4a6f3f78c_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:cc9d5c2de42541033a2c01aeb385404058cdac60a8cd2fd9889f7d73cdbc6292_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-bundle@sha256:3c1f25918b505ec71eaf93d2a0b963d209e36d847e7fc48469f9d40b534344ae_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:02fa492e51729469aaf4e106ad4fbfbf8bfeb63fd51b668782825a4f0ef10194_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:1230d53c9bf30d0ef730a403012530c0bf654d597b164687911524f8b5085eac_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:6d831031c1e4cdc251236b241e4a15b7152900d75fb0bee8bdd39610e249a53b_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:ce4e7a55f2d6768340bf5d13b3b60e61c3d1a783ec338f591dd56003e665895e_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:1cb5d4a87d8bd300edace58d2f3658e1296a23c0d4fed13fd0baa2fdb1da27d8_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:1e95647d265fcc668bb66cc83fff56eb00eb2a7a4c8a7a2d86186bdc68de3ea0_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:2336ad8d4b4874a92c6cfcbc8458b6d26f7f6dde300ca0e159f2b73d7e6839cd_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:55a8de289089989f26365c0011d30310fdc525e8515f7be94956b8c21769edda_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html"
},
{
"cve": "CVE-2025-47913",
"discovery_date": "2025-11-13T22:01:26.092452+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:02ced94ebfcce3e21bcc71af6aa1c11db50822c91dd05cec4fb41a34e6669112_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:42a67bb2e5ab681eadc253b413f0bf557d63f282f270e6064f5768fecf6886e5_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:880c746eb5822f68e41ca7b60d97799115c30f39bdc7e458f7a4101e2af36c8c_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:ad995b723102f4472e4190257b61582de5c6b058b908bcee7cebe683ae77be75_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:7db467404171294d793ef0fd1a59fd6e5bd20ed8915913a1edf013d18e4c9a78_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1deefc2cd91d0f2c474eda0fbb81bbce30786754d8fb9100b73823fae9562a40_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b0b66c3c98a91dc4d4e1e0dd1b2fa58b542b02e27ba283cd5d90b7758ebfaf21_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:ddbf02cbfae810853f79628b576abcd0276f27ef27ad07a92f71df93a339cb4a_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f78eef52e9365e9e2beb65496840748f00d6b6f662da50bbf48b9c695369b359_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:47e21d3d9c9ee2de4a1e557e32521f64db2098b9f4dcd32e0d6f4d0962be7993_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:69806c46f3439bd780533b2660726a95c8acbff0986e340b040f1fb333e5feaf_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:88724eda5d52df59f156b7d318f69c79540faddb41bb770b7f56394fd76ba5e1_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:e701896ef9c36202581832d3dd9413f99c94ab7da435f7afb91c9e0ffe2e20ae_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:00dc04b86ae7fd7dd37e9234ed2b4a1d0f0403993c153e197ac8b96233e95048_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:385004b2d63a6fee322819b91d7d1df2368742b75a88960f9a43adb5a3727ac0_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:795bd464d6825f905679d1ad504d7e4f5c6291f89706f3b78c41bc6776522805_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:b3fc7bb5b6912f68e9b3422eb2f3ad072f0cd8ff412c5b56b9879fd4a6f3f78c_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:cc9d5c2de42541033a2c01aeb385404058cdac60a8cd2fd9889f7d73cdbc6292_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-bundle@sha256:3c1f25918b505ec71eaf93d2a0b963d209e36d847e7fc48469f9d40b534344ae_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:02fa492e51729469aaf4e106ad4fbfbf8bfeb63fd51b668782825a4f0ef10194_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:1230d53c9bf30d0ef730a403012530c0bf654d597b164687911524f8b5085eac_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:6d831031c1e4cdc251236b241e4a15b7152900d75fb0bee8bdd39610e249a53b_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:ce4e7a55f2d6768340bf5d13b3b60e61c3d1a783ec338f591dd56003e665895e_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:1cb5d4a87d8bd300edace58d2f3658e1296a23c0d4fed13fd0baa2fdb1da27d8_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:1e95647d265fcc668bb66cc83fff56eb00eb2a7a4c8a7a2d86186bdc68de3ea0_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:2336ad8d4b4874a92c6cfcbc8458b6d26f7f6dde300ca0e159f2b73d7e6839cd_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:55a8de289089989f26365c0011d30310fdc525e8515f7be94956b8c21769edda_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2414943"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in golang.org/x/crypto/ssh/agent causes the SSH agent client to panic when a peer responds with the generic SSH_AGENT_SUCCESS (0x06) message to requests expecting typed replies (e.g., List, Sign). The unmarshal layer produces an unexpected message type, which the client code does not handle, leading to panic(\"unreachable\") or a nil-pointer dereference. A malicious agent or forwarded connection can exploit this to terminate the client process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang.org/x/crypto/ssh/agent: golang.org/x/crypto/ssh/agent: SSH client panic due to unexpected SSH_AGENT_SUCCESS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability was marked as Important because it allows any malicious or misbehaving SSH agent to force a crash in the client process using a single valid protocol byte. The panic occurs before the client has a chance to validate message structure or recover, which means an attacker controlling\u2014or intercepting\u2014SSH agent traffic can reliably terminate processes that rely on agent interactions. In environments where SSH agents operate over forwarded sockets, shared workspaces, or CI/CD runners, this turns into a reliable, unauthenticated remote denial of service against critical automation or developer tooling. The flaw also stems from unsafe assumptions in the unmarshalling logic, where unexpected but protocol-legal message types drop into \u201cunreachable\u201d code paths instead of being handled gracefully\u2014making it a design-level reliability break rather than a simple error-handling bug. For this reason, it is rated as an important availability-impacting vulnerability rather than a moderate issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:118676c250f94b51d2484414190933c1d8fa61605cef0deff2aab6527f783d73_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:5f883757f060b68dfd010f125d31556df3d29c129de088c257debd8239cf7d40_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:a9cbc8c21b24b5a534de5e553040b13d7d02dcb7ebf23d35019a65a253825bb6_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:c644998824e04ecf279deae25a22cce6c48d8bca44755f76eb4abacf17052519_s390x"
],
"known_not_affected": [
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:02ced94ebfcce3e21bcc71af6aa1c11db50822c91dd05cec4fb41a34e6669112_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:42a67bb2e5ab681eadc253b413f0bf557d63f282f270e6064f5768fecf6886e5_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:880c746eb5822f68e41ca7b60d97799115c30f39bdc7e458f7a4101e2af36c8c_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:ad995b723102f4472e4190257b61582de5c6b058b908bcee7cebe683ae77be75_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:7db467404171294d793ef0fd1a59fd6e5bd20ed8915913a1edf013d18e4c9a78_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1deefc2cd91d0f2c474eda0fbb81bbce30786754d8fb9100b73823fae9562a40_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b0b66c3c98a91dc4d4e1e0dd1b2fa58b542b02e27ba283cd5d90b7758ebfaf21_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:ddbf02cbfae810853f79628b576abcd0276f27ef27ad07a92f71df93a339cb4a_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f78eef52e9365e9e2beb65496840748f00d6b6f662da50bbf48b9c695369b359_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:47e21d3d9c9ee2de4a1e557e32521f64db2098b9f4dcd32e0d6f4d0962be7993_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:69806c46f3439bd780533b2660726a95c8acbff0986e340b040f1fb333e5feaf_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:88724eda5d52df59f156b7d318f69c79540faddb41bb770b7f56394fd76ba5e1_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:e701896ef9c36202581832d3dd9413f99c94ab7da435f7afb91c9e0ffe2e20ae_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:00dc04b86ae7fd7dd37e9234ed2b4a1d0f0403993c153e197ac8b96233e95048_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:385004b2d63a6fee322819b91d7d1df2368742b75a88960f9a43adb5a3727ac0_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:795bd464d6825f905679d1ad504d7e4f5c6291f89706f3b78c41bc6776522805_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:b3fc7bb5b6912f68e9b3422eb2f3ad072f0cd8ff412c5b56b9879fd4a6f3f78c_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:cc9d5c2de42541033a2c01aeb385404058cdac60a8cd2fd9889f7d73cdbc6292_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-bundle@sha256:3c1f25918b505ec71eaf93d2a0b963d209e36d847e7fc48469f9d40b534344ae_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:02fa492e51729469aaf4e106ad4fbfbf8bfeb63fd51b668782825a4f0ef10194_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:1230d53c9bf30d0ef730a403012530c0bf654d597b164687911524f8b5085eac_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:6d831031c1e4cdc251236b241e4a15b7152900d75fb0bee8bdd39610e249a53b_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:ce4e7a55f2d6768340bf5d13b3b60e61c3d1a783ec338f591dd56003e665895e_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:1cb5d4a87d8bd300edace58d2f3658e1296a23c0d4fed13fd0baa2fdb1da27d8_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:1e95647d265fcc668bb66cc83fff56eb00eb2a7a4c8a7a2d86186bdc68de3ea0_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:2336ad8d4b4874a92c6cfcbc8458b6d26f7f6dde300ca0e159f2b73d7e6839cd_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:55a8de289089989f26365c0011d30310fdc525e8515f7be94956b8c21769edda_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-47913"
},
{
"category": "external",
"summary": "RHBZ#2414943",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2414943"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-47913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47913"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-47913",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47913"
},
{
"category": "external",
"summary": "https://github.com/advisories/GHSA-hcg3-q754-cr77",
"url": "https://github.com/advisories/GHSA-hcg3-q754-cr77"
},
{
"category": "external",
"summary": "https://go.dev/cl/700295",
"url": "https://go.dev/cl/700295"
},
{
"category": "external",
"summary": "https://go.dev/issue/75178",
"url": "https://go.dev/issue/75178"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4116",
"url": "https://pkg.go.dev/vuln/GO-2025-4116"
}
],
"release_date": "2025-11-13T21:29:39.907000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-12-10T16:13:23+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:118676c250f94b51d2484414190933c1d8fa61605cef0deff2aab6527f783d73_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:5f883757f060b68dfd010f125d31556df3d29c129de088c257debd8239cf7d40_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:a9cbc8c21b24b5a534de5e553040b13d7d02dcb7ebf23d35019a65a253825bb6_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:c644998824e04ecf279deae25a22cce6c48d8bca44755f76eb4abacf17052519_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:23061"
},
{
"category": "workaround",
"details": "No mitigation is currently available that meets Red Hat Product Security\u2019s standards for usability, deployment, applicability, or stability.",
"product_ids": [
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:02ced94ebfcce3e21bcc71af6aa1c11db50822c91dd05cec4fb41a34e6669112_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:42a67bb2e5ab681eadc253b413f0bf557d63f282f270e6064f5768fecf6886e5_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:880c746eb5822f68e41ca7b60d97799115c30f39bdc7e458f7a4101e2af36c8c_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:ad995b723102f4472e4190257b61582de5c6b058b908bcee7cebe683ae77be75_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:7db467404171294d793ef0fd1a59fd6e5bd20ed8915913a1edf013d18e4c9a78_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1deefc2cd91d0f2c474eda0fbb81bbce30786754d8fb9100b73823fae9562a40_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b0b66c3c98a91dc4d4e1e0dd1b2fa58b542b02e27ba283cd5d90b7758ebfaf21_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:ddbf02cbfae810853f79628b576abcd0276f27ef27ad07a92f71df93a339cb4a_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f78eef52e9365e9e2beb65496840748f00d6b6f662da50bbf48b9c695369b359_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:47e21d3d9c9ee2de4a1e557e32521f64db2098b9f4dcd32e0d6f4d0962be7993_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:69806c46f3439bd780533b2660726a95c8acbff0986e340b040f1fb333e5feaf_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:88724eda5d52df59f156b7d318f69c79540faddb41bb770b7f56394fd76ba5e1_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:e701896ef9c36202581832d3dd9413f99c94ab7da435f7afb91c9e0ffe2e20ae_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:118676c250f94b51d2484414190933c1d8fa61605cef0deff2aab6527f783d73_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:5f883757f060b68dfd010f125d31556df3d29c129de088c257debd8239cf7d40_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:a9cbc8c21b24b5a534de5e553040b13d7d02dcb7ebf23d35019a65a253825bb6_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:c644998824e04ecf279deae25a22cce6c48d8bca44755f76eb4abacf17052519_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:00dc04b86ae7fd7dd37e9234ed2b4a1d0f0403993c153e197ac8b96233e95048_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:385004b2d63a6fee322819b91d7d1df2368742b75a88960f9a43adb5a3727ac0_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:795bd464d6825f905679d1ad504d7e4f5c6291f89706f3b78c41bc6776522805_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:b3fc7bb5b6912f68e9b3422eb2f3ad072f0cd8ff412c5b56b9879fd4a6f3f78c_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:cc9d5c2de42541033a2c01aeb385404058cdac60a8cd2fd9889f7d73cdbc6292_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-bundle@sha256:3c1f25918b505ec71eaf93d2a0b963d209e36d847e7fc48469f9d40b534344ae_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:02fa492e51729469aaf4e106ad4fbfbf8bfeb63fd51b668782825a4f0ef10194_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:1230d53c9bf30d0ef730a403012530c0bf654d597b164687911524f8b5085eac_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:6d831031c1e4cdc251236b241e4a15b7152900d75fb0bee8bdd39610e249a53b_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:ce4e7a55f2d6768340bf5d13b3b60e61c3d1a783ec338f591dd56003e665895e_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:1cb5d4a87d8bd300edace58d2f3658e1296a23c0d4fed13fd0baa2fdb1da27d8_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:1e95647d265fcc668bb66cc83fff56eb00eb2a7a4c8a7a2d86186bdc68de3ea0_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:2336ad8d4b4874a92c6cfcbc8458b6d26f7f6dde300ca0e159f2b73d7e6839cd_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:55a8de289089989f26365c0011d30310fdc525e8515f7be94956b8c21769edda_s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:02ced94ebfcce3e21bcc71af6aa1c11db50822c91dd05cec4fb41a34e6669112_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:42a67bb2e5ab681eadc253b413f0bf557d63f282f270e6064f5768fecf6886e5_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:880c746eb5822f68e41ca7b60d97799115c30f39bdc7e458f7a4101e2af36c8c_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:ad995b723102f4472e4190257b61582de5c6b058b908bcee7cebe683ae77be75_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:7db467404171294d793ef0fd1a59fd6e5bd20ed8915913a1edf013d18e4c9a78_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1deefc2cd91d0f2c474eda0fbb81bbce30786754d8fb9100b73823fae9562a40_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b0b66c3c98a91dc4d4e1e0dd1b2fa58b542b02e27ba283cd5d90b7758ebfaf21_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:ddbf02cbfae810853f79628b576abcd0276f27ef27ad07a92f71df93a339cb4a_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f78eef52e9365e9e2beb65496840748f00d6b6f662da50bbf48b9c695369b359_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:47e21d3d9c9ee2de4a1e557e32521f64db2098b9f4dcd32e0d6f4d0962be7993_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:69806c46f3439bd780533b2660726a95c8acbff0986e340b040f1fb333e5feaf_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:88724eda5d52df59f156b7d318f69c79540faddb41bb770b7f56394fd76ba5e1_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:e701896ef9c36202581832d3dd9413f99c94ab7da435f7afb91c9e0ffe2e20ae_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:118676c250f94b51d2484414190933c1d8fa61605cef0deff2aab6527f783d73_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:5f883757f060b68dfd010f125d31556df3d29c129de088c257debd8239cf7d40_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:a9cbc8c21b24b5a534de5e553040b13d7d02dcb7ebf23d35019a65a253825bb6_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:c644998824e04ecf279deae25a22cce6c48d8bca44755f76eb4abacf17052519_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:00dc04b86ae7fd7dd37e9234ed2b4a1d0f0403993c153e197ac8b96233e95048_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:385004b2d63a6fee322819b91d7d1df2368742b75a88960f9a43adb5a3727ac0_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:795bd464d6825f905679d1ad504d7e4f5c6291f89706f3b78c41bc6776522805_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:b3fc7bb5b6912f68e9b3422eb2f3ad072f0cd8ff412c5b56b9879fd4a6f3f78c_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:cc9d5c2de42541033a2c01aeb385404058cdac60a8cd2fd9889f7d73cdbc6292_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-bundle@sha256:3c1f25918b505ec71eaf93d2a0b963d209e36d847e7fc48469f9d40b534344ae_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:02fa492e51729469aaf4e106ad4fbfbf8bfeb63fd51b668782825a4f0ef10194_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:1230d53c9bf30d0ef730a403012530c0bf654d597b164687911524f8b5085eac_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:6d831031c1e4cdc251236b241e4a15b7152900d75fb0bee8bdd39610e249a53b_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:ce4e7a55f2d6768340bf5d13b3b60e61c3d1a783ec338f591dd56003e665895e_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:1cb5d4a87d8bd300edace58d2f3658e1296a23c0d4fed13fd0baa2fdb1da27d8_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:1e95647d265fcc668bb66cc83fff56eb00eb2a7a4c8a7a2d86186bdc68de3ea0_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:2336ad8d4b4874a92c6cfcbc8458b6d26f7f6dde300ca0e159f2b73d7e6839cd_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:55a8de289089989f26365c0011d30310fdc525e8515f7be94956b8c21769edda_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang.org/x/crypto/ssh/agent: golang.org/x/crypto/ssh/agent: SSH client panic due to unexpected SSH_AGENT_SUCCESS"
},
{
"cve": "CVE-2025-59420",
"cwe": {
"id": "CWE-440",
"name": "Expected Behavior Violation"
},
"discovery_date": "2025-09-22T18:01:35.379361+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:02ced94ebfcce3e21bcc71af6aa1c11db50822c91dd05cec4fb41a34e6669112_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:42a67bb2e5ab681eadc253b413f0bf557d63f282f270e6064f5768fecf6886e5_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:880c746eb5822f68e41ca7b60d97799115c30f39bdc7e458f7a4101e2af36c8c_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:ad995b723102f4472e4190257b61582de5c6b058b908bcee7cebe683ae77be75_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:7db467404171294d793ef0fd1a59fd6e5bd20ed8915913a1edf013d18e4c9a78_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1deefc2cd91d0f2c474eda0fbb81bbce30786754d8fb9100b73823fae9562a40_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b0b66c3c98a91dc4d4e1e0dd1b2fa58b542b02e27ba283cd5d90b7758ebfaf21_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:ddbf02cbfae810853f79628b576abcd0276f27ef27ad07a92f71df93a339cb4a_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f78eef52e9365e9e2beb65496840748f00d6b6f662da50bbf48b9c695369b359_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:47e21d3d9c9ee2de4a1e557e32521f64db2098b9f4dcd32e0d6f4d0962be7993_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:69806c46f3439bd780533b2660726a95c8acbff0986e340b040f1fb333e5feaf_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:88724eda5d52df59f156b7d318f69c79540faddb41bb770b7f56394fd76ba5e1_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:e701896ef9c36202581832d3dd9413f99c94ab7da435f7afb91c9e0ffe2e20ae_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:118676c250f94b51d2484414190933c1d8fa61605cef0deff2aab6527f783d73_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:5f883757f060b68dfd010f125d31556df3d29c129de088c257debd8239cf7d40_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:a9cbc8c21b24b5a534de5e553040b13d7d02dcb7ebf23d35019a65a253825bb6_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:c644998824e04ecf279deae25a22cce6c48d8bca44755f76eb4abacf17052519_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:00dc04b86ae7fd7dd37e9234ed2b4a1d0f0403993c153e197ac8b96233e95048_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:385004b2d63a6fee322819b91d7d1df2368742b75a88960f9a43adb5a3727ac0_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:795bd464d6825f905679d1ad504d7e4f5c6291f89706f3b78c41bc6776522805_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:b3fc7bb5b6912f68e9b3422eb2f3ad072f0cd8ff412c5b56b9879fd4a6f3f78c_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:cc9d5c2de42541033a2c01aeb385404058cdac60a8cd2fd9889f7d73cdbc6292_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-bundle@sha256:3c1f25918b505ec71eaf93d2a0b963d209e36d847e7fc48469f9d40b534344ae_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:02fa492e51729469aaf4e106ad4fbfbf8bfeb63fd51b668782825a4f0ef10194_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:1230d53c9bf30d0ef730a403012530c0bf654d597b164687911524f8b5085eac_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:6d831031c1e4cdc251236b241e4a15b7152900d75fb0bee8bdd39610e249a53b_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:ce4e7a55f2d6768340bf5d13b3b60e61c3d1a783ec338f591dd56003e665895e_arm64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2397460"
}
],
"notes": [
{
"category": "description",
"text": "Authlib\u2019s JWS verification accepts tokens that declare unknown critical header parameters (crit), violating RFC 7515 \u201cmust\u2011understand\u201d semantics. An attacker can craft a signed token with a critical header (for example, bork or cnf) that strict verifiers reject but Authlib accepts. In mixed\u2011language fleets, this enables split\u2011brain verification and can lead to policy bypass, replay, or privilege escalation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "authlib: Authlib RFC violation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:1cb5d4a87d8bd300edace58d2f3658e1296a23c0d4fed13fd0baa2fdb1da27d8_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:1e95647d265fcc668bb66cc83fff56eb00eb2a7a4c8a7a2d86186bdc68de3ea0_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:2336ad8d4b4874a92c6cfcbc8458b6d26f7f6dde300ca0e159f2b73d7e6839cd_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:55a8de289089989f26365c0011d30310fdc525e8515f7be94956b8c21769edda_s390x"
],
"known_not_affected": [
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:02ced94ebfcce3e21bcc71af6aa1c11db50822c91dd05cec4fb41a34e6669112_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:42a67bb2e5ab681eadc253b413f0bf557d63f282f270e6064f5768fecf6886e5_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:880c746eb5822f68e41ca7b60d97799115c30f39bdc7e458f7a4101e2af36c8c_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:ad995b723102f4472e4190257b61582de5c6b058b908bcee7cebe683ae77be75_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:7db467404171294d793ef0fd1a59fd6e5bd20ed8915913a1edf013d18e4c9a78_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1deefc2cd91d0f2c474eda0fbb81bbce30786754d8fb9100b73823fae9562a40_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b0b66c3c98a91dc4d4e1e0dd1b2fa58b542b02e27ba283cd5d90b7758ebfaf21_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:ddbf02cbfae810853f79628b576abcd0276f27ef27ad07a92f71df93a339cb4a_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f78eef52e9365e9e2beb65496840748f00d6b6f662da50bbf48b9c695369b359_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:47e21d3d9c9ee2de4a1e557e32521f64db2098b9f4dcd32e0d6f4d0962be7993_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:69806c46f3439bd780533b2660726a95c8acbff0986e340b040f1fb333e5feaf_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:88724eda5d52df59f156b7d318f69c79540faddb41bb770b7f56394fd76ba5e1_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:e701896ef9c36202581832d3dd9413f99c94ab7da435f7afb91c9e0ffe2e20ae_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:118676c250f94b51d2484414190933c1d8fa61605cef0deff2aab6527f783d73_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:5f883757f060b68dfd010f125d31556df3d29c129de088c257debd8239cf7d40_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:a9cbc8c21b24b5a534de5e553040b13d7d02dcb7ebf23d35019a65a253825bb6_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:c644998824e04ecf279deae25a22cce6c48d8bca44755f76eb4abacf17052519_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:00dc04b86ae7fd7dd37e9234ed2b4a1d0f0403993c153e197ac8b96233e95048_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:385004b2d63a6fee322819b91d7d1df2368742b75a88960f9a43adb5a3727ac0_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:795bd464d6825f905679d1ad504d7e4f5c6291f89706f3b78c41bc6776522805_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:b3fc7bb5b6912f68e9b3422eb2f3ad072f0cd8ff412c5b56b9879fd4a6f3f78c_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:cc9d5c2de42541033a2c01aeb385404058cdac60a8cd2fd9889f7d73cdbc6292_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-bundle@sha256:3c1f25918b505ec71eaf93d2a0b963d209e36d847e7fc48469f9d40b534344ae_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:02fa492e51729469aaf4e106ad4fbfbf8bfeb63fd51b668782825a4f0ef10194_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:1230d53c9bf30d0ef730a403012530c0bf654d597b164687911524f8b5085eac_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:6d831031c1e4cdc251236b241e4a15b7152900d75fb0bee8bdd39610e249a53b_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:ce4e7a55f2d6768340bf5d13b3b60e61c3d1a783ec338f591dd56003e665895e_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-59420"
},
{
"category": "external",
"summary": "RHBZ#2397460",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2397460"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-59420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59420"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-59420",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-59420"
},
{
"category": "external",
"summary": "https://github.com/authlib/authlib/commit/6b1813e4392eb7c168c276099ff7783b176479df",
"url": "https://github.com/authlib/authlib/commit/6b1813e4392eb7c168c276099ff7783b176479df"
},
{
"category": "external",
"summary": "https://github.com/authlib/authlib/security/advisories/GHSA-9ggr-2464-2j32",
"url": "https://github.com/authlib/authlib/security/advisories/GHSA-9ggr-2464-2j32"
}
],
"release_date": "2025-09-22T17:28:53.869000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-12-10T16:13:23+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:1cb5d4a87d8bd300edace58d2f3658e1296a23c0d4fed13fd0baa2fdb1da27d8_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:1e95647d265fcc668bb66cc83fff56eb00eb2a7a4c8a7a2d86186bdc68de3ea0_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:2336ad8d4b4874a92c6cfcbc8458b6d26f7f6dde300ca0e159f2b73d7e6839cd_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:55a8de289089989f26365c0011d30310fdc525e8515f7be94956b8c21769edda_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:23061"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:02ced94ebfcce3e21bcc71af6aa1c11db50822c91dd05cec4fb41a34e6669112_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:42a67bb2e5ab681eadc253b413f0bf557d63f282f270e6064f5768fecf6886e5_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:880c746eb5822f68e41ca7b60d97799115c30f39bdc7e458f7a4101e2af36c8c_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:ad995b723102f4472e4190257b61582de5c6b058b908bcee7cebe683ae77be75_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:7db467404171294d793ef0fd1a59fd6e5bd20ed8915913a1edf013d18e4c9a78_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1deefc2cd91d0f2c474eda0fbb81bbce30786754d8fb9100b73823fae9562a40_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b0b66c3c98a91dc4d4e1e0dd1b2fa58b542b02e27ba283cd5d90b7758ebfaf21_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:ddbf02cbfae810853f79628b576abcd0276f27ef27ad07a92f71df93a339cb4a_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f78eef52e9365e9e2beb65496840748f00d6b6f662da50bbf48b9c695369b359_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:47e21d3d9c9ee2de4a1e557e32521f64db2098b9f4dcd32e0d6f4d0962be7993_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:69806c46f3439bd780533b2660726a95c8acbff0986e340b040f1fb333e5feaf_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:88724eda5d52df59f156b7d318f69c79540faddb41bb770b7f56394fd76ba5e1_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:e701896ef9c36202581832d3dd9413f99c94ab7da435f7afb91c9e0ffe2e20ae_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:118676c250f94b51d2484414190933c1d8fa61605cef0deff2aab6527f783d73_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:5f883757f060b68dfd010f125d31556df3d29c129de088c257debd8239cf7d40_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:a9cbc8c21b24b5a534de5e553040b13d7d02dcb7ebf23d35019a65a253825bb6_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:c644998824e04ecf279deae25a22cce6c48d8bca44755f76eb4abacf17052519_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:00dc04b86ae7fd7dd37e9234ed2b4a1d0f0403993c153e197ac8b96233e95048_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:385004b2d63a6fee322819b91d7d1df2368742b75a88960f9a43adb5a3727ac0_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:795bd464d6825f905679d1ad504d7e4f5c6291f89706f3b78c41bc6776522805_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:b3fc7bb5b6912f68e9b3422eb2f3ad072f0cd8ff412c5b56b9879fd4a6f3f78c_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:cc9d5c2de42541033a2c01aeb385404058cdac60a8cd2fd9889f7d73cdbc6292_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-bundle@sha256:3c1f25918b505ec71eaf93d2a0b963d209e36d847e7fc48469f9d40b534344ae_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:02fa492e51729469aaf4e106ad4fbfbf8bfeb63fd51b668782825a4f0ef10194_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:1230d53c9bf30d0ef730a403012530c0bf654d597b164687911524f8b5085eac_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:6d831031c1e4cdc251236b241e4a15b7152900d75fb0bee8bdd39610e249a53b_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:ce4e7a55f2d6768340bf5d13b3b60e61c3d1a783ec338f591dd56003e665895e_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:1cb5d4a87d8bd300edace58d2f3658e1296a23c0d4fed13fd0baa2fdb1da27d8_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:1e95647d265fcc668bb66cc83fff56eb00eb2a7a4c8a7a2d86186bdc68de3ea0_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:2336ad8d4b4874a92c6cfcbc8458b6d26f7f6dde300ca0e159f2b73d7e6839cd_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:55a8de289089989f26365c0011d30310fdc525e8515f7be94956b8c21769edda_s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:02ced94ebfcce3e21bcc71af6aa1c11db50822c91dd05cec4fb41a34e6669112_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:42a67bb2e5ab681eadc253b413f0bf557d63f282f270e6064f5768fecf6886e5_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:880c746eb5822f68e41ca7b60d97799115c30f39bdc7e458f7a4101e2af36c8c_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:ad995b723102f4472e4190257b61582de5c6b058b908bcee7cebe683ae77be75_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:7db467404171294d793ef0fd1a59fd6e5bd20ed8915913a1edf013d18e4c9a78_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1deefc2cd91d0f2c474eda0fbb81bbce30786754d8fb9100b73823fae9562a40_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b0b66c3c98a91dc4d4e1e0dd1b2fa58b542b02e27ba283cd5d90b7758ebfaf21_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:ddbf02cbfae810853f79628b576abcd0276f27ef27ad07a92f71df93a339cb4a_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f78eef52e9365e9e2beb65496840748f00d6b6f662da50bbf48b9c695369b359_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:47e21d3d9c9ee2de4a1e557e32521f64db2098b9f4dcd32e0d6f4d0962be7993_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:69806c46f3439bd780533b2660726a95c8acbff0986e340b040f1fb333e5feaf_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:88724eda5d52df59f156b7d318f69c79540faddb41bb770b7f56394fd76ba5e1_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:e701896ef9c36202581832d3dd9413f99c94ab7da435f7afb91c9e0ffe2e20ae_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:118676c250f94b51d2484414190933c1d8fa61605cef0deff2aab6527f783d73_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:5f883757f060b68dfd010f125d31556df3d29c129de088c257debd8239cf7d40_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:a9cbc8c21b24b5a534de5e553040b13d7d02dcb7ebf23d35019a65a253825bb6_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:c644998824e04ecf279deae25a22cce6c48d8bca44755f76eb4abacf17052519_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:00dc04b86ae7fd7dd37e9234ed2b4a1d0f0403993c153e197ac8b96233e95048_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:385004b2d63a6fee322819b91d7d1df2368742b75a88960f9a43adb5a3727ac0_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:795bd464d6825f905679d1ad504d7e4f5c6291f89706f3b78c41bc6776522805_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:b3fc7bb5b6912f68e9b3422eb2f3ad072f0cd8ff412c5b56b9879fd4a6f3f78c_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:cc9d5c2de42541033a2c01aeb385404058cdac60a8cd2fd9889f7d73cdbc6292_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-bundle@sha256:3c1f25918b505ec71eaf93d2a0b963d209e36d847e7fc48469f9d40b534344ae_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:02fa492e51729469aaf4e106ad4fbfbf8bfeb63fd51b668782825a4f0ef10194_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:1230d53c9bf30d0ef730a403012530c0bf654d597b164687911524f8b5085eac_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:6d831031c1e4cdc251236b241e4a15b7152900d75fb0bee8bdd39610e249a53b_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:ce4e7a55f2d6768340bf5d13b3b60e61c3d1a783ec338f591dd56003e665895e_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:1cb5d4a87d8bd300edace58d2f3658e1296a23c0d4fed13fd0baa2fdb1da27d8_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:1e95647d265fcc668bb66cc83fff56eb00eb2a7a4c8a7a2d86186bdc68de3ea0_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:2336ad8d4b4874a92c6cfcbc8458b6d26f7f6dde300ca0e159f2b73d7e6839cd_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:55a8de289089989f26365c0011d30310fdc525e8515f7be94956b8c21769edda_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "authlib: Authlib RFC violation"
},
{
"cve": "CVE-2025-61920",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2025-10-10T20:01:12.833962+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:02ced94ebfcce3e21bcc71af6aa1c11db50822c91dd05cec4fb41a34e6669112_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:42a67bb2e5ab681eadc253b413f0bf557d63f282f270e6064f5768fecf6886e5_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:880c746eb5822f68e41ca7b60d97799115c30f39bdc7e458f7a4101e2af36c8c_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:ad995b723102f4472e4190257b61582de5c6b058b908bcee7cebe683ae77be75_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:7db467404171294d793ef0fd1a59fd6e5bd20ed8915913a1edf013d18e4c9a78_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1deefc2cd91d0f2c474eda0fbb81bbce30786754d8fb9100b73823fae9562a40_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b0b66c3c98a91dc4d4e1e0dd1b2fa58b542b02e27ba283cd5d90b7758ebfaf21_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:ddbf02cbfae810853f79628b576abcd0276f27ef27ad07a92f71df93a339cb4a_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f78eef52e9365e9e2beb65496840748f00d6b6f662da50bbf48b9c695369b359_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:47e21d3d9c9ee2de4a1e557e32521f64db2098b9f4dcd32e0d6f4d0962be7993_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:69806c46f3439bd780533b2660726a95c8acbff0986e340b040f1fb333e5feaf_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:88724eda5d52df59f156b7d318f69c79540faddb41bb770b7f56394fd76ba5e1_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:e701896ef9c36202581832d3dd9413f99c94ab7da435f7afb91c9e0ffe2e20ae_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:118676c250f94b51d2484414190933c1d8fa61605cef0deff2aab6527f783d73_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:5f883757f060b68dfd010f125d31556df3d29c129de088c257debd8239cf7d40_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:a9cbc8c21b24b5a534de5e553040b13d7d02dcb7ebf23d35019a65a253825bb6_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:c644998824e04ecf279deae25a22cce6c48d8bca44755f76eb4abacf17052519_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:00dc04b86ae7fd7dd37e9234ed2b4a1d0f0403993c153e197ac8b96233e95048_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:385004b2d63a6fee322819b91d7d1df2368742b75a88960f9a43adb5a3727ac0_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:795bd464d6825f905679d1ad504d7e4f5c6291f89706f3b78c41bc6776522805_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:b3fc7bb5b6912f68e9b3422eb2f3ad072f0cd8ff412c5b56b9879fd4a6f3f78c_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:cc9d5c2de42541033a2c01aeb385404058cdac60a8cd2fd9889f7d73cdbc6292_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-bundle@sha256:3c1f25918b505ec71eaf93d2a0b963d209e36d847e7fc48469f9d40b534344ae_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:02fa492e51729469aaf4e106ad4fbfbf8bfeb63fd51b668782825a4f0ef10194_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:1230d53c9bf30d0ef730a403012530c0bf654d597b164687911524f8b5085eac_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:6d831031c1e4cdc251236b241e4a15b7152900d75fb0bee8bdd39610e249a53b_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:ce4e7a55f2d6768340bf5d13b3b60e61c3d1a783ec338f591dd56003e665895e_arm64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2403179"
}
],
"notes": [
{
"category": "description",
"text": "A denial of service flaw has been discovered in the python Authlib package. Authlib\u2019s JOSE implementation accepts unbounded JWS/JWT header and signature segments. A remote attacker can craft a token whose base64url\u2011encoded header or signature spans hundreds of megabytes. During verification, Authlib decodes and parses the full input before it is rejected, driving CPU and memory consumption to hostile levels and enabling denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "authlib: Authlib Denial of Service",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:1cb5d4a87d8bd300edace58d2f3658e1296a23c0d4fed13fd0baa2fdb1da27d8_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:1e95647d265fcc668bb66cc83fff56eb00eb2a7a4c8a7a2d86186bdc68de3ea0_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:2336ad8d4b4874a92c6cfcbc8458b6d26f7f6dde300ca0e159f2b73d7e6839cd_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:55a8de289089989f26365c0011d30310fdc525e8515f7be94956b8c21769edda_s390x"
],
"known_not_affected": [
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:02ced94ebfcce3e21bcc71af6aa1c11db50822c91dd05cec4fb41a34e6669112_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:42a67bb2e5ab681eadc253b413f0bf557d63f282f270e6064f5768fecf6886e5_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:880c746eb5822f68e41ca7b60d97799115c30f39bdc7e458f7a4101e2af36c8c_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:ad995b723102f4472e4190257b61582de5c6b058b908bcee7cebe683ae77be75_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:7db467404171294d793ef0fd1a59fd6e5bd20ed8915913a1edf013d18e4c9a78_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1deefc2cd91d0f2c474eda0fbb81bbce30786754d8fb9100b73823fae9562a40_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b0b66c3c98a91dc4d4e1e0dd1b2fa58b542b02e27ba283cd5d90b7758ebfaf21_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:ddbf02cbfae810853f79628b576abcd0276f27ef27ad07a92f71df93a339cb4a_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f78eef52e9365e9e2beb65496840748f00d6b6f662da50bbf48b9c695369b359_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:47e21d3d9c9ee2de4a1e557e32521f64db2098b9f4dcd32e0d6f4d0962be7993_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:69806c46f3439bd780533b2660726a95c8acbff0986e340b040f1fb333e5feaf_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:88724eda5d52df59f156b7d318f69c79540faddb41bb770b7f56394fd76ba5e1_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:e701896ef9c36202581832d3dd9413f99c94ab7da435f7afb91c9e0ffe2e20ae_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:118676c250f94b51d2484414190933c1d8fa61605cef0deff2aab6527f783d73_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:5f883757f060b68dfd010f125d31556df3d29c129de088c257debd8239cf7d40_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:a9cbc8c21b24b5a534de5e553040b13d7d02dcb7ebf23d35019a65a253825bb6_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:c644998824e04ecf279deae25a22cce6c48d8bca44755f76eb4abacf17052519_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:00dc04b86ae7fd7dd37e9234ed2b4a1d0f0403993c153e197ac8b96233e95048_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:385004b2d63a6fee322819b91d7d1df2368742b75a88960f9a43adb5a3727ac0_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:795bd464d6825f905679d1ad504d7e4f5c6291f89706f3b78c41bc6776522805_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:b3fc7bb5b6912f68e9b3422eb2f3ad072f0cd8ff412c5b56b9879fd4a6f3f78c_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:cc9d5c2de42541033a2c01aeb385404058cdac60a8cd2fd9889f7d73cdbc6292_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-bundle@sha256:3c1f25918b505ec71eaf93d2a0b963d209e36d847e7fc48469f9d40b534344ae_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:02fa492e51729469aaf4e106ad4fbfbf8bfeb63fd51b668782825a4f0ef10194_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:1230d53c9bf30d0ef730a403012530c0bf654d597b164687911524f8b5085eac_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:6d831031c1e4cdc251236b241e4a15b7152900d75fb0bee8bdd39610e249a53b_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:ce4e7a55f2d6768340bf5d13b3b60e61c3d1a783ec338f591dd56003e665895e_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61920"
},
{
"category": "external",
"summary": "RHBZ#2403179",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2403179"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61920",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61920"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61920",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61920"
},
{
"category": "external",
"summary": "https://github.com/authlib/authlib/commit/867e3f87b072347a1ae9cf6983cc8bbf88447e5e",
"url": "https://github.com/authlib/authlib/commit/867e3f87b072347a1ae9cf6983cc8bbf88447e5e"
},
{
"category": "external",
"summary": "https://github.com/authlib/authlib/security/advisories/GHSA-pq5p-34cr-23v9",
"url": "https://github.com/authlib/authlib/security/advisories/GHSA-pq5p-34cr-23v9"
}
],
"release_date": "2025-10-10T19:25:07.679000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-12-10T16:13:23+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:1cb5d4a87d8bd300edace58d2f3658e1296a23c0d4fed13fd0baa2fdb1da27d8_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:1e95647d265fcc668bb66cc83fff56eb00eb2a7a4c8a7a2d86186bdc68de3ea0_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:2336ad8d4b4874a92c6cfcbc8458b6d26f7f6dde300ca0e159f2b73d7e6839cd_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:55a8de289089989f26365c0011d30310fdc525e8515f7be94956b8c21769edda_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:23061"
},
{
"category": "workaround",
"details": "Users unable to upgrade may manually enforce input size limits before handing tokens to Authlib and/or use application-level throttling to reduce amplification risk.",
"product_ids": [
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:02ced94ebfcce3e21bcc71af6aa1c11db50822c91dd05cec4fb41a34e6669112_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:42a67bb2e5ab681eadc253b413f0bf557d63f282f270e6064f5768fecf6886e5_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:880c746eb5822f68e41ca7b60d97799115c30f39bdc7e458f7a4101e2af36c8c_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:ad995b723102f4472e4190257b61582de5c6b058b908bcee7cebe683ae77be75_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:7db467404171294d793ef0fd1a59fd6e5bd20ed8915913a1edf013d18e4c9a78_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1deefc2cd91d0f2c474eda0fbb81bbce30786754d8fb9100b73823fae9562a40_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b0b66c3c98a91dc4d4e1e0dd1b2fa58b542b02e27ba283cd5d90b7758ebfaf21_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:ddbf02cbfae810853f79628b576abcd0276f27ef27ad07a92f71df93a339cb4a_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f78eef52e9365e9e2beb65496840748f00d6b6f662da50bbf48b9c695369b359_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:47e21d3d9c9ee2de4a1e557e32521f64db2098b9f4dcd32e0d6f4d0962be7993_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:69806c46f3439bd780533b2660726a95c8acbff0986e340b040f1fb333e5feaf_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:88724eda5d52df59f156b7d318f69c79540faddb41bb770b7f56394fd76ba5e1_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:e701896ef9c36202581832d3dd9413f99c94ab7da435f7afb91c9e0ffe2e20ae_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:118676c250f94b51d2484414190933c1d8fa61605cef0deff2aab6527f783d73_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:5f883757f060b68dfd010f125d31556df3d29c129de088c257debd8239cf7d40_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:a9cbc8c21b24b5a534de5e553040b13d7d02dcb7ebf23d35019a65a253825bb6_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:c644998824e04ecf279deae25a22cce6c48d8bca44755f76eb4abacf17052519_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:00dc04b86ae7fd7dd37e9234ed2b4a1d0f0403993c153e197ac8b96233e95048_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:385004b2d63a6fee322819b91d7d1df2368742b75a88960f9a43adb5a3727ac0_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:795bd464d6825f905679d1ad504d7e4f5c6291f89706f3b78c41bc6776522805_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:b3fc7bb5b6912f68e9b3422eb2f3ad072f0cd8ff412c5b56b9879fd4a6f3f78c_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:cc9d5c2de42541033a2c01aeb385404058cdac60a8cd2fd9889f7d73cdbc6292_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-bundle@sha256:3c1f25918b505ec71eaf93d2a0b963d209e36d847e7fc48469f9d40b534344ae_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:02fa492e51729469aaf4e106ad4fbfbf8bfeb63fd51b668782825a4f0ef10194_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:1230d53c9bf30d0ef730a403012530c0bf654d597b164687911524f8b5085eac_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:6d831031c1e4cdc251236b241e4a15b7152900d75fb0bee8bdd39610e249a53b_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:ce4e7a55f2d6768340bf5d13b3b60e61c3d1a783ec338f591dd56003e665895e_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:1cb5d4a87d8bd300edace58d2f3658e1296a23c0d4fed13fd0baa2fdb1da27d8_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:1e95647d265fcc668bb66cc83fff56eb00eb2a7a4c8a7a2d86186bdc68de3ea0_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:2336ad8d4b4874a92c6cfcbc8458b6d26f7f6dde300ca0e159f2b73d7e6839cd_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:55a8de289089989f26365c0011d30310fdc525e8515f7be94956b8c21769edda_s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:02ced94ebfcce3e21bcc71af6aa1c11db50822c91dd05cec4fb41a34e6669112_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:42a67bb2e5ab681eadc253b413f0bf557d63f282f270e6064f5768fecf6886e5_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:880c746eb5822f68e41ca7b60d97799115c30f39bdc7e458f7a4101e2af36c8c_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:ad995b723102f4472e4190257b61582de5c6b058b908bcee7cebe683ae77be75_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:7db467404171294d793ef0fd1a59fd6e5bd20ed8915913a1edf013d18e4c9a78_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1deefc2cd91d0f2c474eda0fbb81bbce30786754d8fb9100b73823fae9562a40_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:b0b66c3c98a91dc4d4e1e0dd1b2fa58b542b02e27ba283cd5d90b7758ebfaf21_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:ddbf02cbfae810853f79628b576abcd0276f27ef27ad07a92f71df93a339cb4a_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f78eef52e9365e9e2beb65496840748f00d6b6f662da50bbf48b9c695369b359_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:47e21d3d9c9ee2de4a1e557e32521f64db2098b9f4dcd32e0d6f4d0962be7993_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:69806c46f3439bd780533b2660726a95c8acbff0986e340b040f1fb333e5feaf_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:88724eda5d52df59f156b7d318f69c79540faddb41bb770b7f56394fd76ba5e1_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:e701896ef9c36202581832d3dd9413f99c94ab7da435f7afb91c9e0ffe2e20ae_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:118676c250f94b51d2484414190933c1d8fa61605cef0deff2aab6527f783d73_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:5f883757f060b68dfd010f125d31556df3d29c129de088c257debd8239cf7d40_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:a9cbc8c21b24b5a534de5e553040b13d7d02dcb7ebf23d35019a65a253825bb6_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:c644998824e04ecf279deae25a22cce6c48d8bca44755f76eb4abacf17052519_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:00dc04b86ae7fd7dd37e9234ed2b4a1d0f0403993c153e197ac8b96233e95048_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:385004b2d63a6fee322819b91d7d1df2368742b75a88960f9a43adb5a3727ac0_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:795bd464d6825f905679d1ad504d7e4f5c6291f89706f3b78c41bc6776522805_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:b3fc7bb5b6912f68e9b3422eb2f3ad072f0cd8ff412c5b56b9879fd4a6f3f78c_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:cc9d5c2de42541033a2c01aeb385404058cdac60a8cd2fd9889f7d73cdbc6292_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-bundle@sha256:3c1f25918b505ec71eaf93d2a0b963d209e36d847e7fc48469f9d40b534344ae_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:02fa492e51729469aaf4e106ad4fbfbf8bfeb63fd51b668782825a4f0ef10194_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:1230d53c9bf30d0ef730a403012530c0bf654d597b164687911524f8b5085eac_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:6d831031c1e4cdc251236b241e4a15b7152900d75fb0bee8bdd39610e249a53b_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:ce4e7a55f2d6768340bf5d13b3b60e61c3d1a783ec338f591dd56003e665895e_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:1cb5d4a87d8bd300edace58d2f3658e1296a23c0d4fed13fd0baa2fdb1da27d8_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:1e95647d265fcc668bb66cc83fff56eb00eb2a7a4c8a7a2d86186bdc68de3ea0_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:2336ad8d4b4874a92c6cfcbc8458b6d26f7f6dde300ca0e159f2b73d7e6839cd_arm64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:55a8de289089989f26365c0011d30310fdc525e8515f7be94956b8c21769edda_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "authlib: Authlib Denial of Service"
}
]
}
RHSA-2026:4215
Vulnerability from csaf_redhat - Published: 2026-03-10 15:34 - Updated: 2026-03-16 20:25Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat Quay 3.14.6 is now available with bug fixes.",
"title": "Topic"
},
{
"category": "general",
"text": "Quay 3.14.6",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:4215",
"url": "https://access.redhat.com/errata/RHSA-2026:4215"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-47273",
"url": "https://access.redhat.com/security/cve/CVE-2025-47273"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2022-30187",
"url": "https://access.redhat.com/security/cve/CVE-2022-30187"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2024-34156",
"url": "https://access.redhat.com/security/cve/CVE-2024-34156"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2024-47081",
"url": "https://access.redhat.com/security/cve/CVE-2024-47081"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-12816",
"url": "https://access.redhat.com/security/cve/CVE-2025-12816"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-15284",
"url": "https://access.redhat.com/security/cve/CVE-2025-15284"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-47913",
"url": "https://access.redhat.com/security/cve/CVE-2025-47913"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-50181",
"url": "https://access.redhat.com/security/cve/CVE-2025-50181"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-52881",
"url": "https://access.redhat.com/security/cve/CVE-2025-52881"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-58183",
"url": "https://access.redhat.com/security/cve/CVE-2025-58183"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-58754",
"url": "https://access.redhat.com/security/cve/CVE-2025-58754"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-59420",
"url": "https://access.redhat.com/security/cve/CVE-2025-59420"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61729",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61920",
"url": "https://access.redhat.com/security/cve/CVE-2025-61920"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-65945",
"url": "https://access.redhat.com/security/cve/CVE-2025-65945"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-66418",
"url": "https://access.redhat.com/security/cve/CVE-2025-66418"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-66471",
"url": "https://access.redhat.com/security/cve/CVE-2025-66471"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-66506",
"url": "https://access.redhat.com/security/cve/CVE-2025-66506"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-21441",
"url": "https://access.redhat.com/security/cve/CVE-2026-21441"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-24049",
"url": "https://access.redhat.com/security/cve/CVE-2026-24049"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-45768",
"url": "https://access.redhat.com/security/cve/CVE-2025-45768"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_4215.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Quay 3.14.6",
"tracking": {
"current_release_date": "2026-03-16T20:25:07+00:00",
"generator": {
"date": "2026-03-16T20:25:07+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.3"
}
},
"id": "RHSA-2026:4215",
"initial_release_date": "2026-03-10T15:34:38+00:00",
"revision_history": [
{
"date": "2026-03-10T15:34:38+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-03-10T15:34:48+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-16T20:25:07+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Quay 3.14",
"product": {
"name": "Red Hat Quay 3.14",
"product_id": "Red Hat Quay 3.14",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:quay:3.14::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat Quay"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"product_id": "registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-container-security-operator-bundle@sha256%3Aa7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=1773097791"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"product_id": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-container-security-operator-rhel8@sha256%3A191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=1773097298"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"product_id": "registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-bridge-operator-bundle@sha256%3Ac4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=1773097803"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"product_id": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-bridge-operator-rhel8@sha256%3A1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=1773097302"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"product_id": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-builder-qemu-rhcos-rhel8@sha256%3Afd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=1771008628"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"product_id": "registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-builder-rhel8@sha256%3Aaea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=1771265622"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"product": {
"name": "registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"product_id": "registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"product_identification_helper": {
"purl": "pkg:oci/clair-rhel8@sha256%3Aa4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=1773097327"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"product_id": "registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-operator-bundle@sha256%3Aef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=1773101667"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"product_id": "registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-operator-rhel8@sha256%3A6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=1773097311"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"product_id": "registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-rhel8@sha256%3A225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=1773097621"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"product": {
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"product_id": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"product_identification_helper": {
"purl": "pkg:oci/quay-container-security-operator-rhel8@sha256%3A7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a?arch=arm64\u0026repository_url=registry.redhat.io/quay\u0026tag=1773097298"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"product": {
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"product_id": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"product_identification_helper": {
"purl": "pkg:oci/quay-bridge-operator-rhel8@sha256%3A2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88?arch=arm64\u0026repository_url=registry.redhat.io/quay\u0026tag=1773097302"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"product": {
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"product_id": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"product_identification_helper": {
"purl": "pkg:oci/quay-builder-qemu-rhcos-rhel8@sha256%3A9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8?arch=arm64\u0026repository_url=registry.redhat.io/quay\u0026tag=1771008628"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"product": {
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"product_id": "registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"product_identification_helper": {
"purl": "pkg:oci/quay-builder-rhel8@sha256%3A47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9?arch=arm64\u0026repository_url=registry.redhat.io/quay\u0026tag=1771265622"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"product": {
"name": "registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"product_id": "registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"product_identification_helper": {
"purl": "pkg:oci/clair-rhel8@sha256%3A1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279?arch=arm64\u0026repository_url=registry.redhat.io/quay\u0026tag=1773097327"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"product": {
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"product_id": "registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"product_identification_helper": {
"purl": "pkg:oci/quay-operator-rhel8@sha256%3A7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322?arch=arm64\u0026repository_url=registry.redhat.io/quay\u0026tag=1773097311"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"product": {
"name": "registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"product_id": "registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"product_identification_helper": {
"purl": "pkg:oci/quay-rhel8@sha256%3A05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899?arch=arm64\u0026repository_url=registry.redhat.io/quay\u0026tag=1773097621"
}
}
}
],
"category": "architecture",
"name": "arm64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"product": {
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"product_id": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/quay-container-security-operator-rhel8@sha256%3A19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58?arch=ppc64le\u0026repository_url=registry.redhat.io/quay\u0026tag=1773097298"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"product": {
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"product_id": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/quay-bridge-operator-rhel8@sha256%3Aaa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b?arch=ppc64le\u0026repository_url=registry.redhat.io/quay\u0026tag=1773097302"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"product": {
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"product_id": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/quay-builder-qemu-rhcos-rhel8@sha256%3A0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a?arch=ppc64le\u0026repository_url=registry.redhat.io/quay\u0026tag=1771008628"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"product": {
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"product_id": "registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/quay-builder-rhel8@sha256%3A00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80?arch=ppc64le\u0026repository_url=registry.redhat.io/quay\u0026tag=1771265622"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"product": {
"name": "registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"product_id": "registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/clair-rhel8@sha256%3Aaad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293?arch=ppc64le\u0026repository_url=registry.redhat.io/quay\u0026tag=1773097327"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le",
"product": {
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le",
"product_id": "registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/quay-operator-rhel8@sha256%3A91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b?arch=ppc64le\u0026repository_url=registry.redhat.io/quay\u0026tag=1773097311"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le",
"product": {
"name": "registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le",
"product_id": "registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/quay-rhel8@sha256%3Ae2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90?arch=ppc64le\u0026repository_url=registry.redhat.io/quay\u0026tag=1773097621"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"product": {
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"product_id": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"product_identification_helper": {
"purl": "pkg:oci/quay-container-security-operator-rhel8@sha256%3A14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b?arch=s390x\u0026repository_url=registry.redhat.io/quay\u0026tag=1773097298"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"product": {
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"product_id": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"product_identification_helper": {
"purl": "pkg:oci/quay-bridge-operator-rhel8@sha256%3Ac33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7?arch=s390x\u0026repository_url=registry.redhat.io/quay\u0026tag=1773097302"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"product": {
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"product_id": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"product_identification_helper": {
"purl": "pkg:oci/quay-builder-qemu-rhcos-rhel8@sha256%3Abec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10?arch=s390x\u0026repository_url=registry.redhat.io/quay\u0026tag=1771008628"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"product": {
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"product_id": "registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"product_identification_helper": {
"purl": "pkg:oci/quay-builder-rhel8@sha256%3A78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745?arch=s390x\u0026repository_url=registry.redhat.io/quay\u0026tag=1771265622"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"product": {
"name": "registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"product_id": "registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"product_identification_helper": {
"purl": "pkg:oci/clair-rhel8@sha256%3A698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6?arch=s390x\u0026repository_url=registry.redhat.io/quay\u0026tag=1773097327"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"product": {
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"product_id": "registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"product_identification_helper": {
"purl": "pkg:oci/quay-operator-rhel8@sha256%3A420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4?arch=s390x\u0026repository_url=registry.redhat.io/quay\u0026tag=1773097311"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"product": {
"name": "registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"product_id": "registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"product_identification_helper": {
"purl": "pkg:oci/quay-rhel8@sha256%3A51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4?arch=s390x\u0026repository_url=registry.redhat.io/quay\u0026tag=1773097621"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64 as a component of Red Hat Quay 3.14",
"product_id": "Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64"
},
"product_reference": "registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"relates_to_product_reference": "Red Hat Quay 3.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x as a component of Red Hat Quay 3.14",
"product_id": "Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x"
},
"product_reference": "registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"relates_to_product_reference": "Red Hat Quay 3.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64 as a component of Red Hat Quay 3.14",
"product_id": "Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64"
},
"product_reference": "registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"relates_to_product_reference": "Red Hat Quay 3.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le as a component of Red Hat Quay 3.14",
"product_id": "Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le"
},
"product_reference": "registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"relates_to_product_reference": "Red Hat Quay 3.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64 as a component of Red Hat Quay 3.14",
"product_id": "Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"relates_to_product_reference": "Red Hat Quay 3.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64 as a component of Red Hat Quay 3.14",
"product_id": "Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"relates_to_product_reference": "Red Hat Quay 3.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64 as a component of Red Hat Quay 3.14",
"product_id": "Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64"
},
"product_reference": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"relates_to_product_reference": "Red Hat Quay 3.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le as a component of Red Hat Quay 3.14",
"product_id": "Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le"
},
"product_reference": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"relates_to_product_reference": "Red Hat Quay 3.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x as a component of Red Hat Quay 3.14",
"product_id": "Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x"
},
"product_reference": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"relates_to_product_reference": "Red Hat Quay 3.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le as a component of Red Hat Quay 3.14",
"product_id": "Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le"
},
"product_reference": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"relates_to_product_reference": "Red Hat Quay 3.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64 as a component of Red Hat Quay 3.14",
"product_id": "Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64"
},
"product_reference": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"relates_to_product_reference": "Red Hat Quay 3.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x as a component of Red Hat Quay 3.14",
"product_id": "Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x"
},
"product_reference": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"relates_to_product_reference": "Red Hat Quay 3.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64 as a component of Red Hat Quay 3.14",
"product_id": "Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"relates_to_product_reference": "Red Hat Quay 3.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le as a component of Red Hat Quay 3.14",
"product_id": "Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le"
},
"product_reference": "registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"relates_to_product_reference": "Red Hat Quay 3.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64 as a component of Red Hat Quay 3.14",
"product_id": "Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64"
},
"product_reference": "registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"relates_to_product_reference": "Red Hat Quay 3.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x as a component of Red Hat Quay 3.14",
"product_id": "Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x"
},
"product_reference": "registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"relates_to_product_reference": "Red Hat Quay 3.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64 as a component of Red Hat Quay 3.14",
"product_id": "Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"relates_to_product_reference": "Red Hat Quay 3.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64 as a component of Red Hat Quay 3.14",
"product_id": "Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"relates_to_product_reference": "Red Hat Quay 3.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x as a component of Red Hat Quay 3.14",
"product_id": "Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x"
},
"product_reference": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"relates_to_product_reference": "Red Hat Quay 3.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64 as a component of Red Hat Quay 3.14",
"product_id": "Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"relates_to_product_reference": "Red Hat Quay 3.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le as a component of Red Hat Quay 3.14",
"product_id": "Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le"
},
"product_reference": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"relates_to_product_reference": "Red Hat Quay 3.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64 as a component of Red Hat Quay 3.14",
"product_id": "Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64"
},
"product_reference": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"relates_to_product_reference": "Red Hat Quay 3.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64 as a component of Red Hat Quay 3.14",
"product_id": "Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"relates_to_product_reference": "Red Hat Quay 3.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x as a component of Red Hat Quay 3.14",
"product_id": "Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x"
},
"product_reference": "registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"relates_to_product_reference": "Red Hat Quay 3.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64 as a component of Red Hat Quay 3.14",
"product_id": "Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"relates_to_product_reference": "Red Hat Quay 3.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64 as a component of Red Hat Quay 3.14",
"product_id": "Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64"
},
"product_reference": "registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"relates_to_product_reference": "Red Hat Quay 3.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le as a component of Red Hat Quay 3.14",
"product_id": "Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le"
},
"product_reference": "registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le",
"relates_to_product_reference": "Red Hat Quay 3.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64 as a component of Red Hat Quay 3.14",
"product_id": "Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64"
},
"product_reference": "registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"relates_to_product_reference": "Red Hat Quay 3.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64 as a component of Red Hat Quay 3.14",
"product_id": "Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"relates_to_product_reference": "Red Hat Quay 3.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x as a component of Red Hat Quay 3.14",
"product_id": "Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x"
},
"product_reference": "registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"relates_to_product_reference": "Red Hat Quay 3.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le as a component of Red Hat Quay 3.14",
"product_id": "Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
},
"product_reference": "registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le",
"relates_to_product_reference": "Red Hat Quay 3.14"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-30187",
"discovery_date": "2025-05-06T16:30:59.189000+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le"
]
}
],
"notes": [
{
"category": "description",
"text": "Azure Storage Library Information Disclosure Vulnerability",
"title": "Vulnerability description"
},
{
"category": "other",
"text": "Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.",
"title": "Statement"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
],
"known_not_affected": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-30187"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-30187",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30187"
}
],
"release_date": "2022-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-10T15:34:38+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11458",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:4215"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Azure Storage: Azure Storage Library Information Disclosure Vulnerability"
},
{
"cve": "CVE-2024-34156",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"discovery_date": "2024-09-06T21:20:09.377905+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2310528"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the encoding/gob package of the Golang standard library. Calling Decoder.Decoding, a message that contains deeply nested structures, can cause a panic due to stack exhaustion. This is a follow-up to CVE-2022-30635.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability in Go\u0027s `encoding/gob` package is of high severity because it exposes applications to potential Denial of Service (DoS) attacks through stack exhaustion. Since `gob` relies on recursive function calls to decode nested structures, an attacker could exploit this by sending crafted messages with excessively deep nesting, causing the application to panic due to stack overflow. This risk is particularly important in scenarios where untrusted or external input is processed, as it can lead to system unavailability or crashes, undermining the reliability and availability of services.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
],
"known_not_affected": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-34156"
},
{
"category": "external",
"summary": "RHBZ#2310528",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2310528"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-34156",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34156"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-34156",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-34156"
},
{
"category": "external",
"summary": "https://go.dev/cl/611239",
"url": "https://go.dev/cl/611239"
},
{
"category": "external",
"summary": "https://go.dev/issue/69139",
"url": "https://go.dev/issue/69139"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-dev/c/S9POB9NCTdk",
"url": "https://groups.google.com/g/golang-dev/c/S9POB9NCTdk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2024-3106",
"url": "https://pkg.go.dev/vuln/GO-2024-3106"
}
],
"release_date": "2024-09-06T21:15:12.020000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-10T15:34:38+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11458",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:4215"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion"
},
{
"cve": "CVE-2024-47081",
"cwe": {
"id": "CWE-522",
"name": "Insufficiently Protected Credentials"
},
"discovery_date": "2025-06-09T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2371272"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Requests HTTP library. This vulnerability allows leakage of .netrc credentials to third parties via maliciously crafted URLs that exploit a URL parsing issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "requests: Requests vulnerable to .netrc credentials leak via malicious URLs",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
],
"known_not_affected": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-47081"
},
{
"category": "external",
"summary": "RHBZ#2371272",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2371272"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-47081",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47081"
},
{
"category": "external",
"summary": "http://seclists.org/fulldisclosure/2025/Jun/2",
"url": "http://seclists.org/fulldisclosure/2025/Jun/2"
},
{
"category": "external",
"summary": "http://www.openwall.com/lists/oss-security/2025/06/03/11",
"url": "http://www.openwall.com/lists/oss-security/2025/06/03/11"
},
{
"category": "external",
"summary": "http://www.openwall.com/lists/oss-security/2025/06/03/9",
"url": "http://www.openwall.com/lists/oss-security/2025/06/03/9"
},
{
"category": "external",
"summary": "http://www.openwall.com/lists/oss-security/2025/06/04/1",
"url": "http://www.openwall.com/lists/oss-security/2025/06/04/1"
},
{
"category": "external",
"summary": "http://www.openwall.com/lists/oss-security/2025/06/04/6",
"url": "http://www.openwall.com/lists/oss-security/2025/06/04/6"
},
{
"category": "external",
"summary": "https://github.com/psf/requests/commit/96ba401c1296ab1dda74a2365ef36d88f7d144ef",
"url": "https://github.com/psf/requests/commit/96ba401c1296ab1dda74a2365ef36d88f7d144ef"
},
{
"category": "external",
"summary": "https://github.com/psf/requests/pull/6965",
"url": "https://github.com/psf/requests/pull/6965"
},
{
"category": "external",
"summary": "https://github.com/psf/requests/security/advisories/GHSA-9hjg-9r4m-mvj7",
"url": "https://github.com/psf/requests/security/advisories/GHSA-9hjg-9r4m-mvj7"
},
{
"category": "external",
"summary": "https://requests.readthedocs.io/en/latest/api/#requests.Session.trust_env",
"url": "https://requests.readthedocs.io/en/latest/api/#requests.Session.trust_env"
},
{
"category": "external",
"summary": "https://seclists.org/fulldisclosure/2025/Jun/2",
"url": "https://seclists.org/fulldisclosure/2025/Jun/2"
}
],
"release_date": "2025-06-09T17:57:47.731000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-10T15:34:38+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11458",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:4215"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "requests: Requests vulnerable to .netrc credentials leak via malicious URLs"
},
{
"cve": "CVE-2025-12816",
"cwe": {
"id": "CWE-179",
"name": "Incorrect Behavior Order: Early Validation"
},
"discovery_date": "2025-11-25T20:01:05.875196+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2417097"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in node-forge. This vulnerability allows unauthenticated attackers to bypass downstream cryptographic verifications and security decisions via crafting ASN.1 (Abstract Syntax Notation One) structures to desynchronize schema validations, yielding a semantic divergence.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "node-forge: node-forge: Interpretation conflict vulnerability allows bypassing cryptographic verifications",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat products due to an interpretation conflict in the node-forge library. An unauthenticated attacker could exploit this flaw by crafting malicious ASN.1 structures, leading to a bypass of cryptographic verifications and security decisions in affected applications. This impacts various Red Hat products that utilize node-forge for cryptographic operations.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
],
"known_not_affected": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-12816"
},
{
"category": "external",
"summary": "RHBZ#2417097",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2417097"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-12816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12816"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-12816",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-12816"
},
{
"category": "external",
"summary": "https://github.com/digitalbazaar/forge",
"url": "https://github.com/digitalbazaar/forge"
},
{
"category": "external",
"summary": "https://github.com/digitalbazaar/forge/pull/1124",
"url": "https://github.com/digitalbazaar/forge/pull/1124"
},
{
"category": "external",
"summary": "https://github.com/digitalbazaar/forge/security/advisories/GHSA-5gfm-wpxj-wjgq",
"url": "https://github.com/digitalbazaar/forge/security/advisories/GHSA-5gfm-wpxj-wjgq"
},
{
"category": "external",
"summary": "https://kb.cert.org/vuls/id/521113",
"url": "https://kb.cert.org/vuls/id/521113"
},
{
"category": "external",
"summary": "https://www.npmjs.com/package/node-forge",
"url": "https://www.npmjs.com/package/node-forge"
}
],
"release_date": "2025-11-25T19:15:50.243000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-10T15:34:38+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11458",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:4215"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "node-forge: node-forge: Interpretation conflict vulnerability allows bypassing cryptographic verifications"
},
{
"cve": "CVE-2025-15284",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2025-12-29T23:00:58.541337+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2425946"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in qs, a module used for parsing query strings. A remote attacker can exploit an improper input validation vulnerability by sending specially crafted HTTP requests that use bracket notation (e.g., `a[]=value`). This bypasses the `arrayLimit` option, which is designed to limit the size of parsed arrays and prevent resource exhaustion. Successful exploitation can lead to memory exhaustion, causing a Denial of Service (DoS) where the application crashes or becomes unresponsive, making the service unavailable to users.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "qs: qs: Denial of Service via improper input validation in array parsing",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat products that utilize the `qs` module for parsing query strings, particularly when processing user-controlled input with bracket notation. The `arrayLimit` option, intended to prevent resource exhaustion, is bypassed when bracket notation (`a[]=value`) is used, allowing a remote attacker to cause a denial of service through memory exhaustion. This can lead to application crashes or unresponsiveness, making the service unavailable.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
],
"known_not_affected": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-15284"
},
{
"category": "external",
"summary": "RHBZ#2425946",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2425946"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-15284",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15284"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-15284",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-15284"
},
{
"category": "external",
"summary": "https://github.com/ljharb/qs/commit/3086902ecf7f088d0d1803887643ac6c03d415b9",
"url": "https://github.com/ljharb/qs/commit/3086902ecf7f088d0d1803887643ac6c03d415b9"
},
{
"category": "external",
"summary": "https://github.com/ljharb/qs/security/advisories/GHSA-6rw7-vpxm-498p",
"url": "https://github.com/ljharb/qs/security/advisories/GHSA-6rw7-vpxm-498p"
}
],
"release_date": "2025-12-29T22:56:45.240000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-10T15:34:38+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11458",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:4215"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "qs: qs: Denial of Service via improper input validation in array parsing"
},
{
"cve": "CVE-2025-45768",
"discovery_date": "2025-07-31T21:01:30.698283+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le"
]
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in pyjwt. The library uses weak encryption, allowing an attacker to potentially decrypt sensitive data. A network-based attacker can exploit this vulnerability without authentication, possibly resulting in a denial of service or data exposure. This weakness stems from the use of inadequate cryptographic algorithms.",
"title": "Vulnerability description"
},
{
"category": "other",
"text": "This CVE has been disputed by the PyJWT. The developers of PyJWT confirm that this issue is not a flaw in the library\u0027s function but rather a potential risk if an application developer chooses to use weak, short cryptographic keys.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
],
"known_not_affected": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-45768"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-45768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45768"
}
],
"release_date": "2025-07-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-10T15:34:38+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11458",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:4215"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 0.0,
"baseSeverity": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "pyjwt: pyjwt Weak Encryption Vulnerability"
},
{
"cve": "CVE-2025-47273",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2025-05-17T16:00:41.145177+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2366982"
}
],
"notes": [
{
"category": "description",
"text": "A path traversal vulnerability in the Python setuptools library allows attackers with limited system access to write files outside the intended temporary directory by manipulating package download URLs. This flaw bypasses basic filename sanitization and can lead to unauthorized overwrites of important system files, creating opportunities for further compromise. While it doesn\u0027t expose data or require user interaction, it poses a high integrity risk and is especially concerning in environments that rely on automated package handling or internal tooling built on setuptools.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "setuptools: Path Traversal Vulnerability in setuptools PackageIndex",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security has rated this vulnerability \"Moderate\" based on the impact of the damage caused by a successful exploitation and the pre-requisites.\n\n* Exploitation requires that the attacker have limited code execution access to a Python environment where they can trigger the vulnerable PackageIndex.download() function\u2014this might be via a script, plugin, or automated job. Full admin rights aren\u0027t needed but a user with no access at all will be unable to exploit this vulnerability.\n* The vulnerability impacts the integrity of the system within the same security boundary\u2014it does not enable access or compromise across trust boundaries (e.g., from one container to another or from user space to kernel).\n* Successful exploitation only allows the attacker to \"create\" new files. The vulnerability does not provide access to existing files and by an extension to any confidential information. \n* Arbitrary file writes can overwrite critical config files, executables, or scripts. This can lead to persistent code execution, system misconfiguration, or unauthorized behavior, especially in automated environments. While overwriting critical files could theoretically lead to service disruption, the vulnerability in isolation does not inherently cause denial of service. The exploit doesn\u0027t target availability directly, and in many cases, systems may continue running.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
],
"known_not_affected": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-47273"
},
{
"category": "external",
"summary": "RHBZ#2366982",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366982"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-47273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47273"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-47273",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47273"
},
{
"category": "external",
"summary": "https://github.com/pypa/setuptools/blob/6ead555c5fb29bc57fe6105b1bffc163f56fd558/setuptools/package_index.py#L810C1-L825C88",
"url": "https://github.com/pypa/setuptools/blob/6ead555c5fb29bc57fe6105b1bffc163f56fd558/setuptools/package_index.py#L810C1-L825C88"
},
{
"category": "external",
"summary": "https://github.com/pypa/setuptools/commit/250a6d17978f9f6ac3ac887091f2d32886fbbb0b",
"url": "https://github.com/pypa/setuptools/commit/250a6d17978f9f6ac3ac887091f2d32886fbbb0b"
},
{
"category": "external",
"summary": "https://github.com/pypa/setuptools/issues/4946",
"url": "https://github.com/pypa/setuptools/issues/4946"
},
{
"category": "external",
"summary": "https://github.com/pypa/setuptools/security/advisories/GHSA-5rjg-fvgr-3xxf",
"url": "https://github.com/pypa/setuptools/security/advisories/GHSA-5rjg-fvgr-3xxf"
}
],
"release_date": "2025-05-17T15:46:11.399000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-10T15:34:38+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11458",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:4215"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "setuptools: Path Traversal Vulnerability in setuptools PackageIndex"
},
{
"cve": "CVE-2025-47913",
"discovery_date": "2025-11-13T22:01:26.092452+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2414943"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in golang.org/x/crypto/ssh/agent causes the SSH agent client to panic when a peer responds with the generic SSH_AGENT_SUCCESS (0x06) message to requests expecting typed replies (e.g., List, Sign). The unmarshal layer produces an unexpected message type, which the client code does not handle, leading to panic(\"unreachable\") or a nil-pointer dereference. A malicious agent or forwarded connection can exploit this to terminate the client process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang.org/x/crypto/ssh/agent: golang.org/x/crypto/ssh/agent: SSH client panic due to unexpected SSH_AGENT_SUCCESS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability was marked as Important because it allows any malicious or misbehaving SSH agent to force a crash in the client process using a single valid protocol byte. The panic occurs before the client has a chance to validate message structure or recover, which means an attacker controlling\u2014or intercepting\u2014SSH agent traffic can reliably terminate processes that rely on agent interactions. In environments where SSH agents operate over forwarded sockets, shared workspaces, or CI/CD runners, this turns into a reliable, unauthenticated remote denial of service against critical automation or developer tooling. The flaw also stems from unsafe assumptions in the unmarshalling logic, where unexpected but protocol-legal message types drop into \u201cunreachable\u201d code paths instead of being handled gracefully\u2014making it a design-level reliability break rather than a simple error-handling bug. For this reason, it is rated as an important availability-impacting vulnerability rather than a moderate issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
],
"known_not_affected": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-47913"
},
{
"category": "external",
"summary": "RHBZ#2414943",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2414943"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-47913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47913"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-47913",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47913"
},
{
"category": "external",
"summary": "https://github.com/advisories/GHSA-hcg3-q754-cr77",
"url": "https://github.com/advisories/GHSA-hcg3-q754-cr77"
},
{
"category": "external",
"summary": "https://go.dev/cl/700295",
"url": "https://go.dev/cl/700295"
},
{
"category": "external",
"summary": "https://go.dev/issue/75178",
"url": "https://go.dev/issue/75178"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4116",
"url": "https://pkg.go.dev/vuln/GO-2025-4116"
}
],
"release_date": "2025-11-13T21:29:39.907000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-10T15:34:38+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11458",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:4215"
},
{
"category": "workaround",
"details": "No mitigation is currently available that meets Red Hat Product Security\u2019s standards for usability, deployment, applicability, or stability.",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang.org/x/crypto/ssh/agent: golang.org/x/crypto/ssh/agent: SSH client panic due to unexpected SSH_AGENT_SUCCESS"
},
{
"cve": "CVE-2025-50181",
"cwe": {
"id": "CWE-601",
"name": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)"
},
"discovery_date": "2025-06-19T02:00:42.866992+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2373799"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in urllib3. The `PoolManager` class allows redirects to be disabled by configuring retries in a specific manner, effectively bypassing intended HTTP redirection behavior. A network attacker can leverage this configuration to manipulate request flows and disrupt service. This bypass occurs through improper handling of retry parameters during PoolManager instantiation. This issue can reult in a denial of service or unintended data exposure due to altered request destinations.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "urllib3: urllib3 redirects are not disabled when retries are disabled on PoolManager instantiation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "A flaw was found in the urllib3 library where it could be tricked into disclosing the Proxy-Authorization header to a destination server when a CONNECT tunnel is used. An attacker can set up a malicious redirect to a crafted URL, which, when followed by the client application, will cause the Proxy-Authorization header to be sent to the attacker-controlled server. This leaks sensitive credentials for the proxy. The impact is primarily on confidentiality. While urllib3 is a ubiquitous component, the vulnerability requires a specific scenario where a user is connecting to a proxy that requires authentication and is redirected to a malicious endpoint. This lowers the exploitability compared to a direct, unauthenticated remote attack, thus, warranting a Moderate severity rating.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
],
"known_not_affected": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-50181"
},
{
"category": "external",
"summary": "RHBZ#2373799",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373799"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50181"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-50181",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-50181"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/commit/f05b1329126d5be6de501f9d1e3e36738bc08857",
"url": "https://github.com/urllib3/urllib3/commit/f05b1329126d5be6de501f9d1e3e36738bc08857"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/security/advisories/GHSA-pq67-6m6q-mj2v",
"url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-pq67-6m6q-mj2v"
}
],
"release_date": "2025-06-19T01:08:00.340000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-10T15:34:38+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11458",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:4215"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "urllib3: urllib3 redirects are not disabled when retries are disabled on PoolManager instantiation"
},
{
"cve": "CVE-2025-52881",
"cwe": {
"id": "CWE-59",
"name": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)"
},
"discovery_date": "2025-10-17T14:19:18.652000+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2404715"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in runc. This attack is a more sophisticated variant of CVE-2019-16884, which was a flaw that allowed an attacker to trick runc into writing the LSM process labels for a container process into a dummy tmpfs file and thus not apply the correct LSM labels to the container process. The mitigation applied for CVE-2019-16884 was fairly limited and effectively only caused runc to verify that when we write LSM labels that those labels are actual procfs files.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "runc: opencontainers/selinux: container escape and denial of service due to arbitrary write gadgets and procfs write redirects",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat considers this as an Important flaw since the impact is limited to local attack with minimal privileges in order to jeopardize the environment.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
],
"known_not_affected": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-52881"
},
{
"category": "external",
"summary": "RHBZ#2404715",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2404715"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-52881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52881"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-52881",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52881"
},
{
"category": "external",
"summary": "https://github.com/opencontainers/runc/security/advisories/GHSA-cgrx-mc8f-2prm",
"url": "https://github.com/opencontainers/runc/security/advisories/GHSA-cgrx-mc8f-2prm"
},
{
"category": "external",
"summary": "https://github.com/opencontainers/selinux/pull/237",
"url": "https://github.com/opencontainers/selinux/pull/237"
}
],
"release_date": "2025-11-05T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-10T15:34:38+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11458",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:4215"
},
{
"category": "workaround",
"details": "Potential mitigations for this issue include:\n\n* Using rootless containers, as doing so will block most of the inadvertent writes (runc would run with reduced privileges, making attempts to write to procfs files ineffective).\n* Based on our analysis, neither AppArmor or SELinux can protect against the full version of the redirected write attack. The container runtime is generally privileged enough to write to arbitrary procfs files, which is more than sufficient to cause a container breakout.",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "runc: opencontainers/selinux: container escape and denial of service due to arbitrary write gadgets and procfs write redirects"
},
{
"cve": "CVE-2025-58183",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2025-10-29T23:01:50.573951+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2407258"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the archive/tar package in the Go standard library. tar.Reader does not set a maximum size on the number of sparse region data blocks in GNU tar pax 1.0 sparse files. A specially crafted tar archive with a pax header indicating a big number of sparse regions can cause a Go program to try to allocate a large amount of memory, causing an out-of-memory condition and resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: archive/tar: Unbounded allocation when parsing GNU sparse map",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this issue, an attacker needs to be able to process a specially crafted GNU tar pax 1.0 archive with the application using the archive/tar package. Additionally, this issue can cause the Go application to allocate a large amount of memory, eventually leading to an out-of-memory condition and resulting in a denial of service with no other security impact. Due to these reasons, this flaw has been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
],
"known_not_affected": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-58183"
},
{
"category": "external",
"summary": "RHBZ#2407258",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2407258"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-58183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58183"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-58183",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58183"
},
{
"category": "external",
"summary": "https://go.dev/cl/709861",
"url": "https://go.dev/cl/709861"
},
{
"category": "external",
"summary": "https://go.dev/issue/75677",
"url": "https://go.dev/issue/75677"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/4Emdl2iQ_bI",
"url": "https://groups.google.com/g/golang-announce/c/4Emdl2iQ_bI"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4014",
"url": "https://pkg.go.dev/vuln/GO-2025-4014"
}
],
"release_date": "2025-10-29T22:10:14.376000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-10T15:34:38+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11458",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:4215"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: archive/tar: Unbounded allocation when parsing GNU sparse map"
},
{
"cve": "CVE-2025-58754",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2025-09-12T02:00:53.897605+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2394735"
}
],
"notes": [
{
"category": "description",
"text": "A denial of service flaw has been discovered in the Axios npm package. When Axios runs on Node.js and is given a URL with the `data:` scheme, it does not perform HTTP. Instead, its Node http adapter decodes the entire payload into memory (`Buffer`/`Blob`) and returns a synthetic 200 response.\nThis path ignores `maxContentLength` / `maxBodyLength` (which only protect HTTP responses), so an attacker can supply a very large `data:` URI and cause the process to allocate unbounded memory and crash (DoS), even if the caller requested responseType: \u0027stream\u0027.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "axios: Axios DoS via lack of data size check",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Availability impact is limited to the application which bundles axios and not the host Red Hat system.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
],
"known_not_affected": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-58754"
},
{
"category": "external",
"summary": "RHBZ#2394735",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2394735"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-58754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58754"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-58754",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58754"
},
{
"category": "external",
"summary": "https://github.com/axios/axios/commit/945435fc51467303768202250debb8d4ae892593",
"url": "https://github.com/axios/axios/commit/945435fc51467303768202250debb8d4ae892593"
},
{
"category": "external",
"summary": "https://github.com/axios/axios/pull/7011",
"url": "https://github.com/axios/axios/pull/7011"
},
{
"category": "external",
"summary": "https://github.com/axios/axios/releases/tag/v1.12.0",
"url": "https://github.com/axios/axios/releases/tag/v1.12.0"
},
{
"category": "external",
"summary": "https://github.com/axios/axios/security/advisories/GHSA-4hjh-wcwx-xvwj",
"url": "https://github.com/axios/axios/security/advisories/GHSA-4hjh-wcwx-xvwj"
}
],
"release_date": "2025-09-12T01:16:40.513000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-10T15:34:38+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11458",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:4215"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "axios: Axios DoS via lack of data size check"
},
{
"cve": "CVE-2025-59420",
"cwe": {
"id": "CWE-440",
"name": "Expected Behavior Violation"
},
"discovery_date": "2025-09-22T18:01:35.379361+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2397460"
}
],
"notes": [
{
"category": "description",
"text": "Authlib\u2019s JWS verification accepts tokens that declare unknown critical header parameters (crit), violating RFC 7515 \u201cmust\u2011understand\u201d semantics. An attacker can craft a signed token with a critical header (for example, bork or cnf) that strict verifiers reject but Authlib accepts. In mixed\u2011language fleets, this enables split\u2011brain verification and can lead to policy bypass, replay, or privilege escalation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "authlib: Authlib RFC violation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
],
"known_not_affected": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-59420"
},
{
"category": "external",
"summary": "RHBZ#2397460",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2397460"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-59420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59420"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-59420",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-59420"
},
{
"category": "external",
"summary": "https://github.com/authlib/authlib/commit/6b1813e4392eb7c168c276099ff7783b176479df",
"url": "https://github.com/authlib/authlib/commit/6b1813e4392eb7c168c276099ff7783b176479df"
},
{
"category": "external",
"summary": "https://github.com/authlib/authlib/security/advisories/GHSA-9ggr-2464-2j32",
"url": "https://github.com/authlib/authlib/security/advisories/GHSA-9ggr-2464-2j32"
}
],
"release_date": "2025-09-22T17:28:53.869000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-10T15:34:38+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11458",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:4215"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "authlib: Authlib RFC violation"
},
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang. A remote attacker could exploit this vulnerability by providing a specially crafted certificate during the error string construction process within the `HostnameError.Error()` function. This flaw, caused by unbounded string concatenation, leads to excessive resource consumption. Successful exploitation can result in a denial of service (DoS) for the affected system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
],
"known_not_affected": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-10T15:34:38+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11458",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:4215"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
},
{
"cve": "CVE-2025-61920",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2025-10-10T20:01:12.833962+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2403179"
}
],
"notes": [
{
"category": "description",
"text": "A denial of service flaw has been discovered in the python Authlib package. Authlib\u2019s JOSE implementation accepts unbounded JWS/JWT header and signature segments. A remote attacker can craft a token whose base64url\u2011encoded header or signature spans hundreds of megabytes. During verification, Authlib decodes and parses the full input before it is rejected, driving CPU and memory consumption to hostile levels and enabling denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "authlib: Authlib Denial of Service",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
],
"known_not_affected": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61920"
},
{
"category": "external",
"summary": "RHBZ#2403179",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2403179"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61920",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61920"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61920",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61920"
},
{
"category": "external",
"summary": "https://github.com/authlib/authlib/commit/867e3f87b072347a1ae9cf6983cc8bbf88447e5e",
"url": "https://github.com/authlib/authlib/commit/867e3f87b072347a1ae9cf6983cc8bbf88447e5e"
},
{
"category": "external",
"summary": "https://github.com/authlib/authlib/security/advisories/GHSA-pq5p-34cr-23v9",
"url": "https://github.com/authlib/authlib/security/advisories/GHSA-pq5p-34cr-23v9"
}
],
"release_date": "2025-10-10T19:25:07.679000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-10T15:34:38+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11458",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:4215"
},
{
"category": "workaround",
"details": "Users unable to upgrade may manually enforce input size limits before handing tokens to Authlib and/or use application-level throttling to reduce amplification risk.",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "authlib: Authlib Denial of Service"
},
{
"cve": "CVE-2025-65945",
"cwe": {
"id": "CWE-347",
"name": "Improper Verification of Cryptographic Signature"
},
"discovery_date": "2025-12-04T19:01:14.733682+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418904"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in auth0/node-jws. This vulnerability allows improper signature verification via using the HS256 (Hash-based Message Authentication Code using SHA-256) algorithm under specific conditions, where applications use the jws.createVerify() function for HMAC (Keyed-Hash Message Authentication Code) algorithms and user-provided data from the JSON (JavaScript Object Notation) Web Signature protected header or payload in HMAC secret lookup routines.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "node-jws: auth0/node-jws: Improper signature verification in HS256 algorithm",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
],
"known_not_affected": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-65945"
},
{
"category": "external",
"summary": "RHBZ#2418904",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418904"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-65945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-65945"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-65945",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-65945"
},
{
"category": "external",
"summary": "https://github.com/auth0/node-jws/commit/34c45b2c04434f925b638de6a061de9339c0ea2e",
"url": "https://github.com/auth0/node-jws/commit/34c45b2c04434f925b638de6a061de9339c0ea2e"
},
{
"category": "external",
"summary": "https://github.com/auth0/node-jws/security/advisories/GHSA-869p-cjfg-cm3x",
"url": "https://github.com/auth0/node-jws/security/advisories/GHSA-869p-cjfg-cm3x"
}
],
"release_date": "2025-12-04T18:45:37.517000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-10T15:34:38+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11458",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:4215"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "node-jws: auth0/node-jws: Improper signature verification in HS256 algorithm"
},
{
"cve": "CVE-2025-66418",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2025-12-05T17:01:20.277857+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2419455"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in urllib3 Python library that could lead to a Denial of Service condition. A remote, malicious server can exploit this flaw by responding to a client request with an HTTP message that uses an excessive number of chained compression algorithms. This unlimited decompression chain causes the client system to consume a virtually unbounded amount of CPU resources and memory. The high resource usage leads to service disruption, making the application unresponsive.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "urllib3: urllib3: Unbounded decompression chain leads to resource exhaustion",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
],
"known_not_affected": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-66418"
},
{
"category": "external",
"summary": "RHBZ#2419455",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419455"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-66418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66418"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-66418",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-66418"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/commit/24d7b67eac89f94e11003424bcf0d8f7b72222a8",
"url": "https://github.com/urllib3/urllib3/commit/24d7b67eac89f94e11003424bcf0d8f7b72222a8"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/security/advisories/GHSA-gm62-xv2j-4w53",
"url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-gm62-xv2j-4w53"
}
],
"release_date": "2025-12-05T16:02:15.271000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-10T15:34:38+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11458",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:4215"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "urllib3: urllib3: Unbounded decompression chain leads to resource exhaustion"
},
{
"cve": "CVE-2025-66471",
"cwe": {
"id": "CWE-409",
"name": "Improper Handling of Highly Compressed Data (Data Amplification)"
},
"discovery_date": "2025-12-05T17:02:21.597728+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2419467"
}
],
"notes": [
{
"category": "description",
"text": "A decompression handling flaw has been discovered in urllib3. When streaming a compressed response, urllib3 can perform decoding or decompression based on the HTTP Content-Encoding header (e.g., gzip, deflate, br, or zstd). The library must read compressed data from the network and decompress it until the requested chunk size is met. Any resulting decompressed data that exceeds the requested amount is held in an internal buffer for the next read operation. The decompression logic could cause urllib3 to fully decode a small amount of highly compressed data in a single operation. This can result in excessive resource consumption (high CPU usage and massive memory allocation for the decompressed data; CWE-409) on the client side, even if the application only requested a small chunk of data.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "urllib3: urllib3 Streaming API improperly handles highly compressed data",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
],
"known_not_affected": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-66471"
},
{
"category": "external",
"summary": "RHBZ#2419467",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419467"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-66471",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66471"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-66471",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-66471"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/commit/c19571de34c47de3a766541b041637ba5f716ed7",
"url": "https://github.com/urllib3/urllib3/commit/c19571de34c47de3a766541b041637ba5f716ed7"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/security/advisories/GHSA-2xpw-w6gg-jr37",
"url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-2xpw-w6gg-jr37"
}
],
"release_date": "2025-12-05T16:06:08.531000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-10T15:34:38+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11458",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:4215"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "urllib3: urllib3 Streaming API improperly handles highly compressed data"
},
{
"cve": "CVE-2025-66506",
"cwe": {
"id": "CWE-405",
"name": "Asymmetric Resource Consumption (Amplification)"
},
"discovery_date": "2025-12-04T23:01:20.507333+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2419056"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Fulcio, a free-to-use certificate authority. This vulnerability allows a denial of service (DoS) due to excessive memory allocation when processing a malicious OpenID Connect (OIDC) identity token containing numerous period characters.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "github.com/sigstore/fulcio: Fulcio: Denial of Service via crafted OpenID Connect (OIDC) token",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat as Fulcio, a certificate authority used for issuing code signing certificates, is susceptible to a denial of service when processing a specially crafted OpenID Connect (OIDC) token. This could lead to resource exhaustion and service unavailability in affected Red Hat products that utilize Fulcio.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
],
"known_not_affected": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-66506"
},
{
"category": "external",
"summary": "RHBZ#2419056",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419056"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-66506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66506"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-66506",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-66506"
},
{
"category": "external",
"summary": "https://github.com/sigstore/fulcio/commit/765a0e57608b9ef390e1eeeea8595b9054c63a5a",
"url": "https://github.com/sigstore/fulcio/commit/765a0e57608b9ef390e1eeeea8595b9054c63a5a"
},
{
"category": "external",
"summary": "https://github.com/sigstore/fulcio/security/advisories/GHSA-f83f-xpx7-ffpw",
"url": "https://github.com/sigstore/fulcio/security/advisories/GHSA-f83f-xpx7-ffpw"
}
],
"release_date": "2025-12-04T22:04:41.637000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-10T15:34:38+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11458",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:4215"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "github.com/sigstore/fulcio: Fulcio: Denial of Service via crafted OpenID Connect (OIDC) token"
},
{
"cve": "CVE-2026-21441",
"cwe": {
"id": "CWE-409",
"name": "Improper Handling of Highly Compressed Data (Data Amplification)"
},
"discovery_date": "2026-01-07T23:01:59.422078+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2427726"
}
],
"notes": [
{
"category": "description",
"text": "urllib3 is an HTTP client library for Python. urllib3\u0027s streaming API is designed for the efficient handling of large HTTP responses by reading the content in chunks, rather than loading the entire response body into memory at once. urllib3 can perform decoding or decompression based on the HTTP `Content-Encoding` header (e.g., `gzip`, `deflate`, `br`, or `zstd`). When using the streaming API, the library decompresses only the necessary bytes, enabling partial content consumption. Starting in version 1.22 and prior to version 2.6.3, for HTTP redirect responses, the library would read the entire response body to drain the connection and decompress the content unnecessarily. This decompression occurred even before any read methods were called, and configured read limits did not restrict the amount of decompressed data. As a result, there was no safeguard against decompression bombs. A malicious server could exploit this to trigger excessive resource consumption on the client. Applications and libraries are affected when they stream content from untrusted sources by setting `preload_content=False` when they do not disable redirects. Users should upgrade to at least urllib3 v2.6.3, in which the library does not decode content of redirect responses when `preload_content=False`. If upgrading is not immediately possible, disable redirects by setting `redirect=False` for requests to untrusted source.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "urllib3: urllib3 vulnerable to decompression-bomb safeguard bypass when following HTTP redirects (streaming API)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
],
"known_not_affected": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-21441"
},
{
"category": "external",
"summary": "RHBZ#2427726",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2427726"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-21441",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21441"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-21441",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-21441"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/commit/8864ac407bba8607950025e0979c4c69bc7abc7b",
"url": "https://github.com/urllib3/urllib3/commit/8864ac407bba8607950025e0979c4c69bc7abc7b"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/security/advisories/GHSA-38jv-5279-wg99",
"url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-38jv-5279-wg99"
}
],
"release_date": "2026-01-07T22:09:01.936000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-10T15:34:38+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11458",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:4215"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "urllib3: urllib3 vulnerable to decompression-bomb safeguard bypass when following HTTP redirects (streaming API)"
},
{
"cve": "CVE-2026-24049",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2026-01-22T05:00:54.709179+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2431959"
}
],
"notes": [
{
"category": "description",
"text": "A path traversal flaw has been discovered in the python wheel too. The unpack function is vulnerable to file permission modification through mishandling of file permissions after extraction. The logic blindly trusts the filename from the archive header for the chmod operation, even though the extraction process itself might have sanitized the path. Attackers can craft a malicious wheel file that, when unpacked, changes the permissions of critical system files (e.g., /etc/passwd, SSH keys, config files), allowing for Privilege Escalation or arbitrary code execution by modifying now-writable scripts.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "wheel: wheel: Privilege Escalation or Arbitrary Code Execution via malicious wheel file unpacking",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
],
"known_not_affected": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-24049"
},
{
"category": "external",
"summary": "RHBZ#2431959",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2431959"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-24049",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24049"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-24049",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-24049"
},
{
"category": "external",
"summary": "https://github.com/pypa/wheel/commit/7a7d2de96b22a9adf9208afcc9547e1001569fef",
"url": "https://github.com/pypa/wheel/commit/7a7d2de96b22a9adf9208afcc9547e1001569fef"
},
{
"category": "external",
"summary": "https://github.com/pypa/wheel/releases/tag/0.46.2",
"url": "https://github.com/pypa/wheel/releases/tag/0.46.2"
},
{
"category": "external",
"summary": "https://github.com/pypa/wheel/security/advisories/GHSA-8rrh-rw8j-w5fx",
"url": "https://github.com/pypa/wheel/security/advisories/GHSA-8rrh-rw8j-w5fx"
}
],
"release_date": "2026-01-22T04:02:08.706000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-10T15:34:38+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11458",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:4215"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "wheel: wheel: Privilege Escalation or Arbitrary Code Execution via malicious wheel file unpacking"
}
]
}
GHSA-PQ5P-34CR-23V9
Vulnerability from github – Published: 2025-10-10 20:26 – Updated: 2025-11-03 18:31Summary Authlib’s JOSE implementation accepts unbounded JWS/JWT header and signature segments. A remote attacker can craft a token whose base64url‑encoded header or signature spans hundreds of megabytes. During verification, Authlib decodes and parses the full input before it is rejected, driving CPU and memory consumption to hostile levels and enabling denial of service.
Impact
-
Attack vector: unauthenticated network attacker submits a malicious JWS/JWT.
-
Effect: base64 decode + JSON/crypto processing of huge buffers pegs CPU and allocates large amounts of RAM; a single request can exhaust service capacity.
-
Observed behaviour: on a test host, the legacy code verified a 500 MB header, consuming ~4 GB RSS and ~9 s CPU before failing.
-
Severity: High. CVSS v3.1: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H (7.5).
Affected Versions Authlib ≤ 1.6.3 (and earlier) when verifying JWS/JWT tokens. Later snapshots with 256 KB header/signature limits are not affected.
Proof of concept
Local demo (do not run against third-party systems): Download jws_segment_dos_demo.py the PoC in direcotry authlib/ Run following Command
python3 jws_segment_dos_demo.py --variant both --sizes "500MB" --fork-per-case
Environment: Python 3.13.6, Authlib 1.6.4, Linux x86_64, CPUs=8
Sample output: Refined
The compilation script prints separate “[ATTACKER]” (token construction) and “[SERVER]” (Authlib verification) RSS deltas so defenders can distinguish client-side preparation from server-side amplification. Regression tests authlib/tests/dos/test_jose_dos.py further capture the issue; the saved original_util.py/original_jws.py reproductions still accept the malicious payload.
Remediation
-
Apply the upstream patch that introduces decoded size limits:
-
MAX_HEADER_SEGMENT_BYTES = 256 KB
-
MAX_SIGNATURE_SEGMENT_BYTES = 256 KB
-
Enforce Limits in authlib/jose/util.extract_segment and _extract_signature.
-
Deploy the patched release immediately.
-
For additional defence in depth, reject JWS/JWT inputs above a few kilobytes at the proxy or WAF layer, and rate-limit verification endpoints.
Workarounds (temporary)
-
Enforce input size limits before handing tokens to Authlib.
-
Use application-level throttling to reduce amplification risk.
Resources
-
Demo script: jws_segment_dos_demo.py
-
Tests: authlib/tests/dos/test_jose_dos.py
-
OWASP JWT Cheat Sheet (DoS guidance)
{
"affected": [
{
"package": {
"ecosystem": "PyPI",
"name": "authlib"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.6.5"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2025-61920"
],
"database_specific": {
"cwe_ids": [
"CWE-20",
"CWE-400",
"CWE-770"
],
"github_reviewed": true,
"github_reviewed_at": "2025-10-10T20:26:43Z",
"nvd_published_at": "2025-10-10T20:15:37Z",
"severity": "HIGH"
},
"details": "**Summary**\nAuthlib\u2019s JOSE implementation accepts unbounded JWS/JWT header and signature segments. A remote attacker can craft a token whose base64url\u2011encoded header or signature spans hundreds of megabytes. During verification, Authlib decodes and parses the full input before it is rejected, driving CPU and memory consumption to hostile levels and enabling denial of service.\n\n**Impact**\n\n- Attack vector: unauthenticated network attacker submits a malicious JWS/JWT.\n\n- Effect: base64 decode + JSON/crypto processing of huge buffers pegs CPU and allocates large amounts of RAM; a single request can exhaust service capacity.\n\n- Observed behaviour: on a test host, the legacy code verified a 500\u202fMB header, consuming ~4\u202fGB RSS and ~9\u202fs CPU before failing.\n\n- Severity: High. CVSS v3.1: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H (7.5).\n\nAffected Versions\nAuthlib \u2264\u202f1.6.3 (and earlier) when verifying JWS/JWT tokens. Later snapshots with 256\u202fKB header/signature limits are not affected.\n\n**Proof of concept**\n\nLocal demo (do not run against third-party systems):\nDownload [jws_segment_dos_demo.py](https://github.com/user-attachments/files/22450820/jws_segment_dos_demo.py) the PoC in direcotry authlib/\nRun following Command\n```\npython3 jws_segment_dos_demo.py --variant both --sizes \"500MB\" --fork-per-case\n\n```\nEnvironment: Python 3.13.6, Authlib 1.6.4, Linux x86_64, CPUs=8 \nSample output: Refined\n\u003cimg width=\"1295\" height=\"306\" alt=\"image\" src=\"https://github.com/user-attachments/assets/6dd8410f-bc36-4717-8cee-649bac9bf291\" /\u003e\n\n\n\n\nThe compilation script prints separate \u201c[ATTACKER]\u201d (token construction) and \u201c[SERVER]\u201d (Authlib verification) RSS deltas so defenders can distinguish client-side preparation from server-side amplification. Regression tests authlib/tests/dos/test_jose_dos.py further capture the issue; the saved original_util.py/original_jws.py reproductions still accept the malicious payload.\n\n**Remediation**\n\n- Apply the upstream patch that introduces decoded size limits:\n\n- MAX_HEADER_SEGMENT_BYTES = 256 KB\n\n- MAX_SIGNATURE_SEGMENT_BYTES = 256 KB\n\n- Enforce Limits in authlib/jose/util.extract_segment and _extract_signature.\n\n- Deploy the patched release immediately.\n\n- For additional defence in depth, reject JWS/JWT inputs above a few kilobytes at the proxy or WAF layer, and rate-limit verification endpoints.\n\n**Workarounds (temporary)**\n\n- Enforce input size limits before handing tokens to Authlib.\n\n- Use application-level throttling to reduce amplification risk.\n\n**Resources**\n\n- Demo script: jws_segment_dos_demo.py\n\n- Tests: authlib/tests/dos/test_jose_dos.py\n\n- OWASP JWT Cheat Sheet (DoS guidance)",
"id": "GHSA-pq5p-34cr-23v9",
"modified": "2025-11-03T18:31:46Z",
"published": "2025-10-10T20:26:43Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/authlib/authlib/security/advisories/GHSA-pq5p-34cr-23v9"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61920"
},
{
"type": "WEB",
"url": "https://github.com/authlib/authlib/commit/867e3f87b072347a1ae9cf6983cc8bbf88447e5e"
},
{
"type": "PACKAGE",
"url": "https://github.com/authlib/authlib"
},
{
"type": "WEB",
"url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00032.html"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
],
"summary": "Authlib is vulnerable to Denial of Service via Oversized JOSE Segments"
}
OPENSUSE-SU-2025:15629-1
Vulnerability from csaf_opensuse - Published: 2025-10-13 00:00 - Updated: 2025-10-13 00:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "python311-Authlib-1.6.5-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the python311-Authlib-1.6.5-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-15629",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15629-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61920 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61920/"
}
],
"title": "python311-Authlib-1.6.5-1.1 on GA media",
"tracking": {
"current_release_date": "2025-10-13T00:00:00Z",
"generator": {
"date": "2025-10-13T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:15629-1",
"initial_release_date": "2025-10-13T00:00:00Z",
"revision_history": [
{
"date": "2025-10-13T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "python311-Authlib-1.6.5-1.1.aarch64",
"product": {
"name": "python311-Authlib-1.6.5-1.1.aarch64",
"product_id": "python311-Authlib-1.6.5-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "python312-Authlib-1.6.5-1.1.aarch64",
"product": {
"name": "python312-Authlib-1.6.5-1.1.aarch64",
"product_id": "python312-Authlib-1.6.5-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "python313-Authlib-1.6.5-1.1.aarch64",
"product": {
"name": "python313-Authlib-1.6.5-1.1.aarch64",
"product_id": "python313-Authlib-1.6.5-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "python311-Authlib-1.6.5-1.1.ppc64le",
"product": {
"name": "python311-Authlib-1.6.5-1.1.ppc64le",
"product_id": "python311-Authlib-1.6.5-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python312-Authlib-1.6.5-1.1.ppc64le",
"product": {
"name": "python312-Authlib-1.6.5-1.1.ppc64le",
"product_id": "python312-Authlib-1.6.5-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python313-Authlib-1.6.5-1.1.ppc64le",
"product": {
"name": "python313-Authlib-1.6.5-1.1.ppc64le",
"product_id": "python313-Authlib-1.6.5-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "python311-Authlib-1.6.5-1.1.s390x",
"product": {
"name": "python311-Authlib-1.6.5-1.1.s390x",
"product_id": "python311-Authlib-1.6.5-1.1.s390x"
}
},
{
"category": "product_version",
"name": "python312-Authlib-1.6.5-1.1.s390x",
"product": {
"name": "python312-Authlib-1.6.5-1.1.s390x",
"product_id": "python312-Authlib-1.6.5-1.1.s390x"
}
},
{
"category": "product_version",
"name": "python313-Authlib-1.6.5-1.1.s390x",
"product": {
"name": "python313-Authlib-1.6.5-1.1.s390x",
"product_id": "python313-Authlib-1.6.5-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "python311-Authlib-1.6.5-1.1.x86_64",
"product": {
"name": "python311-Authlib-1.6.5-1.1.x86_64",
"product_id": "python311-Authlib-1.6.5-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "python312-Authlib-1.6.5-1.1.x86_64",
"product": {
"name": "python312-Authlib-1.6.5-1.1.x86_64",
"product_id": "python312-Authlib-1.6.5-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "python313-Authlib-1.6.5-1.1.x86_64",
"product": {
"name": "python313-Authlib-1.6.5-1.1.x86_64",
"product_id": "python313-Authlib-1.6.5-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-Authlib-1.6.5-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python311-Authlib-1.6.5-1.1.aarch64"
},
"product_reference": "python311-Authlib-1.6.5-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-Authlib-1.6.5-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python311-Authlib-1.6.5-1.1.ppc64le"
},
"product_reference": "python311-Authlib-1.6.5-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-Authlib-1.6.5-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python311-Authlib-1.6.5-1.1.s390x"
},
"product_reference": "python311-Authlib-1.6.5-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-Authlib-1.6.5-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python311-Authlib-1.6.5-1.1.x86_64"
},
"product_reference": "python311-Authlib-1.6.5-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-Authlib-1.6.5-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python312-Authlib-1.6.5-1.1.aarch64"
},
"product_reference": "python312-Authlib-1.6.5-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-Authlib-1.6.5-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python312-Authlib-1.6.5-1.1.ppc64le"
},
"product_reference": "python312-Authlib-1.6.5-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-Authlib-1.6.5-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python312-Authlib-1.6.5-1.1.s390x"
},
"product_reference": "python312-Authlib-1.6.5-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-Authlib-1.6.5-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python312-Authlib-1.6.5-1.1.x86_64"
},
"product_reference": "python312-Authlib-1.6.5-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python313-Authlib-1.6.5-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python313-Authlib-1.6.5-1.1.aarch64"
},
"product_reference": "python313-Authlib-1.6.5-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python313-Authlib-1.6.5-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python313-Authlib-1.6.5-1.1.ppc64le"
},
"product_reference": "python313-Authlib-1.6.5-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python313-Authlib-1.6.5-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python313-Authlib-1.6.5-1.1.s390x"
},
"product_reference": "python313-Authlib-1.6.5-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python313-Authlib-1.6.5-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python313-Authlib-1.6.5-1.1.x86_64"
},
"product_reference": "python313-Authlib-1.6.5-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61920",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61920"
}
],
"notes": [
{
"category": "general",
"text": "Authlib is a Python library which builds OAuth and OpenID Connect servers. Prior to version 1.6.5, Authlib\u0027s JOSE implementation accepts unbounded JWS/JWT header and signature segments. A remote attacker can craft a token whose base64url-encoded header or signature spans hundreds of megabytes. During verification, Authlib decodes and parses the full input before it is rejected, driving CPU and memory consumption to hostile levels and enabling denial of service. Version 1.6.5 patches the issue. Some temporary workarounds are available. Enforce input size limits before handing tokens to Authlib and/or use application-level throttling to reduce amplification risk.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python311-Authlib-1.6.5-1.1.aarch64",
"openSUSE Tumbleweed:python311-Authlib-1.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:python311-Authlib-1.6.5-1.1.s390x",
"openSUSE Tumbleweed:python311-Authlib-1.6.5-1.1.x86_64",
"openSUSE Tumbleweed:python312-Authlib-1.6.5-1.1.aarch64",
"openSUSE Tumbleweed:python312-Authlib-1.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:python312-Authlib-1.6.5-1.1.s390x",
"openSUSE Tumbleweed:python312-Authlib-1.6.5-1.1.x86_64",
"openSUSE Tumbleweed:python313-Authlib-1.6.5-1.1.aarch64",
"openSUSE Tumbleweed:python313-Authlib-1.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:python313-Authlib-1.6.5-1.1.s390x",
"openSUSE Tumbleweed:python313-Authlib-1.6.5-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61920",
"url": "https://www.suse.com/security/cve/CVE-2025-61920"
},
{
"category": "external",
"summary": "SUSE Bug 1251921 for CVE-2025-61920",
"url": "https://bugzilla.suse.com/1251921"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python311-Authlib-1.6.5-1.1.aarch64",
"openSUSE Tumbleweed:python311-Authlib-1.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:python311-Authlib-1.6.5-1.1.s390x",
"openSUSE Tumbleweed:python311-Authlib-1.6.5-1.1.x86_64",
"openSUSE Tumbleweed:python312-Authlib-1.6.5-1.1.aarch64",
"openSUSE Tumbleweed:python312-Authlib-1.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:python312-Authlib-1.6.5-1.1.s390x",
"openSUSE Tumbleweed:python312-Authlib-1.6.5-1.1.x86_64",
"openSUSE Tumbleweed:python313-Authlib-1.6.5-1.1.aarch64",
"openSUSE Tumbleweed:python313-Authlib-1.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:python313-Authlib-1.6.5-1.1.s390x",
"openSUSE Tumbleweed:python313-Authlib-1.6.5-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python311-Authlib-1.6.5-1.1.aarch64",
"openSUSE Tumbleweed:python311-Authlib-1.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:python311-Authlib-1.6.5-1.1.s390x",
"openSUSE Tumbleweed:python311-Authlib-1.6.5-1.1.x86_64",
"openSUSE Tumbleweed:python312-Authlib-1.6.5-1.1.aarch64",
"openSUSE Tumbleweed:python312-Authlib-1.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:python312-Authlib-1.6.5-1.1.s390x",
"openSUSE Tumbleweed:python312-Authlib-1.6.5-1.1.x86_64",
"openSUSE Tumbleweed:python313-Authlib-1.6.5-1.1.aarch64",
"openSUSE Tumbleweed:python313-Authlib-1.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:python313-Authlib-1.6.5-1.1.s390x",
"openSUSE Tumbleweed:python313-Authlib-1.6.5-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-13T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-61920"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.