Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-66418 (GCVE-0-2025-66418)
Vulnerability from cvelistv5 – Published: 2025-12-05 16:02 – Updated: 2025-12-05 18:15- CWE-770 - Allocation of Resources Without Limits or Throttling
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-66418",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-12-05T16:15:39.701596Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-12-05T16:16:08.790Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "urllib3",
"vendor": "urllib3",
"versions": [
{
"status": "affected",
"version": "\u003e= 1.24, \u003c 2.6.0"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "urllib3 is a user-friendly HTTP client library for Python. Starting in version 1.24 and prior to 2.6.0, the number of links in the decompression chain was unbounded allowing a malicious server to insert a virtually unlimited number of compression steps leading to high CPU usage and massive memory allocation for the decompressed data. This vulnerability is fixed in 2.6.0."
}
],
"metrics": [
{
"cvssV4_0": {
"attackComplexity": "LOW",
"attackRequirements": "PRESENT",
"attackVector": "NETWORK",
"baseScore": 8.9,
"baseSeverity": "HIGH",
"privilegesRequired": "NONE",
"subAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "NONE"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-770",
"description": "CWE-770: Allocation of Resources Without Limits or Throttling",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-12-05T18:15:28.505Z",
"orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"shortName": "GitHub_M"
},
"references": [
{
"name": "https://github.com/urllib3/urllib3/security/advisories/GHSA-gm62-xv2j-4w53",
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-gm62-xv2j-4w53"
},
{
"name": "https://github.com/urllib3/urllib3/commit/24d7b67eac89f94e11003424bcf0d8f7b72222a8",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/urllib3/urllib3/commit/24d7b67eac89f94e11003424bcf0d8f7b72222a8"
}
],
"source": {
"advisory": "GHSA-gm62-xv2j-4w53",
"discovery": "UNKNOWN"
},
"title": "urllib3 allows an unbounded number of links in the decompression chain"
}
},
"cveMetadata": {
"assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"assignerShortName": "GitHub_M",
"cveId": "CVE-2025-66418",
"datePublished": "2025-12-05T16:02:15.271Z",
"dateReserved": "2025-11-28T23:33:56.367Z",
"dateUpdated": "2025-12-05T18:15:28.505Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-66418\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2025-12-05T16:15:51.053\",\"lastModified\":\"2025-12-10T16:08:32.193\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"urllib3 is a user-friendly HTTP client library for Python. Starting in version 1.24 and prior to 2.6.0, the number of links in the decompression chain was unbounded allowing a malicious server to insert a virtually unlimited number of compression steps leading to high CPU usage and massive memory allocation for the decompressed data. This vulnerability is fixed in 2.6.0.\"}],\"metrics\":{\"cvssMetricV40\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"4.0\",\"vectorString\":\"CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X\",\"baseScore\":8.9,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"attackRequirements\":\"PRESENT\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"vulnConfidentialityImpact\":\"NONE\",\"vulnIntegrityImpact\":\"NONE\",\"vulnAvailabilityImpact\":\"HIGH\",\"subConfidentialityImpact\":\"NONE\",\"subIntegrityImpact\":\"NONE\",\"subAvailabilityImpact\":\"HIGH\",\"exploitMaturity\":\"NOT_DEFINED\",\"confidentialityRequirement\":\"NOT_DEFINED\",\"integrityRequirement\":\"NOT_DEFINED\",\"availabilityRequirement\":\"NOT_DEFINED\",\"modifiedAttackVector\":\"NOT_DEFINED\",\"modifiedAttackComplexity\":\"NOT_DEFINED\",\"modifiedAttackRequirements\":\"NOT_DEFINED\",\"modifiedPrivilegesRequired\":\"NOT_DEFINED\",\"modifiedUserInteraction\":\"NOT_DEFINED\",\"modifiedVulnConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedVulnIntegrityImpact\":\"NOT_DEFINED\",\"modifiedVulnAvailabilityImpact\":\"NOT_DEFINED\",\"modifiedSubConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedSubIntegrityImpact\":\"NOT_DEFINED\",\"modifiedSubAvailabilityImpact\":\"NOT_DEFINED\",\"Safety\":\"NOT_DEFINED\",\"Automatable\":\"NOT_DEFINED\",\"Recovery\":\"NOT_DEFINED\",\"valueDensity\":\"NOT_DEFINED\",\"vulnerabilityResponseEffort\":\"NOT_DEFINED\",\"providerUrgency\":\"NOT_DEFINED\"}}],\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-770\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:python:urllib3:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.24\",\"versionEndExcluding\":\"2.6.0\",\"matchCriteriaId\":\"AE1F753E-4D9D-48B1-B893-B3FD39917478\"}]}]}],\"references\":[{\"url\":\"https://github.com/urllib3/urllib3/commit/24d7b67eac89f94e11003424bcf0d8f7b72222a8\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Patch\"]},{\"url\":\"https://github.com/urllib3/urllib3/security/advisories/GHSA-gm62-xv2j-4w53\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-66418\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-12-05T16:15:39.701596Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-12-05T16:15:58.171Z\"}}], \"cna\": {\"title\": \"urllib3 allows an unbounded number of links in the decompression chain\", \"source\": {\"advisory\": \"GHSA-gm62-xv2j-4w53\", \"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"cvssV4_0\": {\"version\": \"4.0\", \"baseScore\": 8.9, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"attackRequirements\": \"PRESENT\", \"privilegesRequired\": \"NONE\", \"subIntegrityImpact\": \"NONE\", \"vulnIntegrityImpact\": \"NONE\", \"subAvailabilityImpact\": \"HIGH\", \"vulnAvailabilityImpact\": \"HIGH\", \"subConfidentialityImpact\": \"NONE\", \"vulnConfidentialityImpact\": \"NONE\"}}], \"affected\": [{\"vendor\": \"urllib3\", \"product\": \"urllib3\", \"versions\": [{\"status\": \"affected\", \"version\": \"\u003e= 1.24, \u003c 2.6.0\"}]}], \"references\": [{\"url\": \"https://github.com/urllib3/urllib3/security/advisories/GHSA-gm62-xv2j-4w53\", \"name\": \"https://github.com/urllib3/urllib3/security/advisories/GHSA-gm62-xv2j-4w53\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"https://github.com/urllib3/urllib3/commit/24d7b67eac89f94e11003424bcf0d8f7b72222a8\", \"name\": \"https://github.com/urllib3/urllib3/commit/24d7b67eac89f94e11003424bcf0d8f7b72222a8\", \"tags\": [\"x_refsource_MISC\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"urllib3 is a user-friendly HTTP client library for Python. Starting in version 1.24 and prior to 2.6.0, the number of links in the decompression chain was unbounded allowing a malicious server to insert a virtually unlimited number of compression steps leading to high CPU usage and massive memory allocation for the decompressed data. This vulnerability is fixed in 2.6.0.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-770\", \"description\": \"CWE-770: Allocation of Resources Without Limits or Throttling\"}]}], \"providerMetadata\": {\"orgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"shortName\": \"GitHub_M\", \"dateUpdated\": \"2025-12-05T18:15:28.505Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-66418\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-12-05T18:15:28.505Z\", \"dateReserved\": \"2025-11-28T23:33:56.367Z\", \"assignerOrgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"datePublished\": \"2025-12-05T16:02:15.271Z\", \"assignerShortName\": \"GitHub_M\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
FKIE_CVE-2025-66418
Vulnerability from fkie_nvd - Published: 2025-12-05 16:15 - Updated: 2025-12-10 16:08{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:python:urllib3:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AE1F753E-4D9D-48B1-B893-B3FD39917478",
"versionEndExcluding": "2.6.0",
"versionStartIncluding": "1.24",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "urllib3 is a user-friendly HTTP client library for Python. Starting in version 1.24 and prior to 2.6.0, the number of links in the decompression chain was unbounded allowing a malicious server to insert a virtually unlimited number of compression steps leading to high CPU usage and massive memory allocation for the decompressed data. This vulnerability is fixed in 2.6.0."
}
],
"id": "CVE-2025-66418",
"lastModified": "2025-12-10T16:08:32.193",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "PRESENT",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 8.9,
"baseSeverity": "HIGH",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "NONE",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "security-advisories@github.com",
"type": "Secondary"
}
]
},
"published": "2025-12-05T16:15:51.053",
"references": [
{
"source": "security-advisories@github.com",
"tags": [
"Patch"
],
"url": "https://github.com/urllib3/urllib3/commit/24d7b67eac89f94e11003424bcf0d8f7b72222a8"
},
{
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
],
"url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-gm62-xv2j-4w53"
}
],
"sourceIdentifier": "security-advisories@github.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-770"
}
],
"source": "security-advisories@github.com",
"type": "Secondary"
}
]
}
RHSA-2026:0050
Vulnerability from csaf_redhat - Published: 2026-01-05 08:04 - Updated: 2026-01-14 14:07Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Builds 1.6.2",
"title": "Topic"
},
{
"category": "general",
"text": "Releases of Red Hat OpenShift Builds 1.6.2",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:0050",
"url": "https://access.redhat.com/errata/RHSA-2026:0050"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-52881",
"url": "https://access.redhat.com/security/cve/CVE-2025-52881"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-66418",
"url": "https://access.redhat.com/security/cve/CVE-2025-66418"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/builds_for_red_hat_openshift/1.6",
"url": "https://docs.redhat.com/en/documentation/builds_for_red_hat_openshift/1.6"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_0050.json"
}
],
"title": "Red Hat Security Advisory: Red Hat OpenShift Builds 1.6.2",
"tracking": {
"current_release_date": "2026-01-14T14:07:31+00:00",
"generator": {
"date": "2026-01-14T14:07:31+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.15"
}
},
"id": "RHSA-2026:0050",
"initial_release_date": "2026-01-05T08:04:03+00:00",
"revision_history": [
{
"date": "2026-01-05T08:04:03+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-01-05T08:04:12+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-01-14T14:07:31+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Builds for Red Hat OpenShift 1.6.1",
"product": {
"name": "Builds for Red Hat OpenShift 1.6.1",
"product_id": "Builds for Red Hat OpenShift 1.6.1",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift_builds:1.6::el9"
}
}
}
],
"category": "product_family",
"name": "Builds for Red Hat OpenShift"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:6696d83a6b93b43d56b9363fce455b46983a081dc5acaadaf9397645c01466da_amd64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:6696d83a6b93b43d56b9363fce455b46983a081dc5acaadaf9397645c01466da_amd64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:6696d83a6b93b43d56b9363fce455b46983a081dc5acaadaf9397645c01466da_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-controller-rhel9@sha256%3A6696d83a6b93b43d56b9363fce455b46983a081dc5acaadaf9397645c01466da?arch=amd64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1.6.2-1767098308"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:ecfa61f5f848d642a5bff960e82a13be8938dcea890853878abd87e3f0dc0ccc_amd64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:ecfa61f5f848d642a5bff960e82a13be8938dcea890853878abd87e3f0dc0ccc_amd64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:ecfa61f5f848d642a5bff960e82a13be8938dcea890853878abd87e3f0dc0ccc_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-git-cloner-rhel9@sha256%3Aecfa61f5f848d642a5bff960e82a13be8938dcea890853878abd87e3f0dc0ccc?arch=amd64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1.6.2-1767098139"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:d3e1e7a8095107e284becf196b3e1c04a84f490a5ae59376c0584636c169b3c4_amd64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:d3e1e7a8095107e284becf196b3e1c04a84f490a5ae59376c0584636c169b3c4_amd64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:d3e1e7a8095107e284becf196b3e1c04a84f490a5ae59376c0584636c169b3c4_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-image-bundler-rhel9@sha256%3Ad3e1e7a8095107e284becf196b3e1c04a84f490a5ae59376c0584636c169b3c4?arch=amd64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1.6.2-1767098126"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:2a1f3268215e4b6d8e1ffdb5e9f3df45d24cd46893e07112799be3e3f0330b12_amd64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:2a1f3268215e4b6d8e1ffdb5e9f3df45d24cd46893e07112799be3e3f0330b12_amd64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:2a1f3268215e4b6d8e1ffdb5e9f3df45d24cd46893e07112799be3e3f0330b12_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-image-processing-rhel9@sha256%3A2a1f3268215e4b6d8e1ffdb5e9f3df45d24cd46893e07112799be3e3f0330b12?arch=amd64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1.6.2-1767098286"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:8eff50ab0188b7458ba261261809610c75d1dc08711803133e0b313299e9e790_amd64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:8eff50ab0188b7458ba261261809610c75d1dc08711803133e0b313299e9e790_amd64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:8eff50ab0188b7458ba261261809610c75d1dc08711803133e0b313299e9e790_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-rhel9-operator@sha256%3A8eff50ab0188b7458ba261261809610c75d1dc08711803133e0b313299e9e790?arch=amd64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1.6.2-1767101431"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:2111825788f8e8f63b780c20da94e9b7aa49b505f81e466ad3cd3dc5cec1f775_amd64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:2111825788f8e8f63b780c20da94e9b7aa49b505f81e466ad3cd3dc5cec1f775_amd64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:2111825788f8e8f63b780c20da94e9b7aa49b505f81e466ad3cd3dc5cec1f775_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-operator-bundle@sha256%3A2111825788f8e8f63b780c20da94e9b7aa49b505f81e466ad3cd3dc5cec1f775?arch=amd64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1.6.2-1767102876"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:17411ee0150422af55216174322e8dd97b9bf75d46c4bbae8b410f374ff81b36_amd64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:17411ee0150422af55216174322e8dd97b9bf75d46c4bbae8b410f374ff81b36_amd64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:17411ee0150422af55216174322e8dd97b9bf75d46c4bbae8b410f374ff81b36_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-shared-resource-rhel9@sha256%3A17411ee0150422af55216174322e8dd97b9bf75d46c4bbae8b410f374ff81b36?arch=amd64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1.6.2-1767088118"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:d0b708f897e947ccf9ae660ae05056d505e2b5540bc4923e8956f28e9a0dcd99_amd64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:d0b708f897e947ccf9ae660ae05056d505e2b5540bc4923e8956f28e9a0dcd99_amd64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:d0b708f897e947ccf9ae660ae05056d505e2b5540bc4923e8956f28e9a0dcd99_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-shared-resource-webhook-rhel9@sha256%3Ad0b708f897e947ccf9ae660ae05056d505e2b5540bc4923e8956f28e9a0dcd99?arch=amd64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1.6.2-1767088114"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:e81a090a71097aea050110ccb9274b620e8f940b3cf01e42acb7643ba9763299_amd64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:e81a090a71097aea050110ccb9274b620e8f940b3cf01e42acb7643ba9763299_amd64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:e81a090a71097aea050110ccb9274b620e8f940b3cf01e42acb7643ba9763299_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-waiters-rhel9@sha256%3Ae81a090a71097aea050110ccb9274b620e8f940b3cf01e42acb7643ba9763299?arch=amd64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1.6.2-1767098206"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:4cd9f6c9ea668bf0227197b9e551d237b38b413b80d56b8fa62a05e54540e44d_amd64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:4cd9f6c9ea668bf0227197b9e551d237b38b413b80d56b8fa62a05e54540e44d_amd64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:4cd9f6c9ea668bf0227197b9e551d237b38b413b80d56b8fa62a05e54540e44d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-webhook-rhel9@sha256%3A4cd9f6c9ea668bf0227197b9e551d237b38b413b80d56b8fa62a05e54540e44d?arch=amd64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1.6.2-1767098245"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:f561f21f8fb326b314852057c23e608423960f5ac80b867aec4d7356fb15bf4e_arm64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:f561f21f8fb326b314852057c23e608423960f5ac80b867aec4d7356fb15bf4e_arm64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:f561f21f8fb326b314852057c23e608423960f5ac80b867aec4d7356fb15bf4e_arm64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-controller-rhel9@sha256%3Af561f21f8fb326b314852057c23e608423960f5ac80b867aec4d7356fb15bf4e?arch=arm64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1.6.2-1767098308"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:22aff64e2120cc3588642b5a46538250f27c2fc8f1924074a5ba7afc84529272_arm64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:22aff64e2120cc3588642b5a46538250f27c2fc8f1924074a5ba7afc84529272_arm64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:22aff64e2120cc3588642b5a46538250f27c2fc8f1924074a5ba7afc84529272_arm64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-git-cloner-rhel9@sha256%3A22aff64e2120cc3588642b5a46538250f27c2fc8f1924074a5ba7afc84529272?arch=arm64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1.6.2-1767098139"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:0b6fd93c0fb1170ca6ddc2a2326b1a962572db6fdae0b40b972a95102554c33b_arm64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:0b6fd93c0fb1170ca6ddc2a2326b1a962572db6fdae0b40b972a95102554c33b_arm64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:0b6fd93c0fb1170ca6ddc2a2326b1a962572db6fdae0b40b972a95102554c33b_arm64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-image-bundler-rhel9@sha256%3A0b6fd93c0fb1170ca6ddc2a2326b1a962572db6fdae0b40b972a95102554c33b?arch=arm64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1.6.2-1767098126"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:20d89725eae18c07e7659461e525e9f38ca7e5d0e4add48d84ced30f4d9ad234_arm64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:20d89725eae18c07e7659461e525e9f38ca7e5d0e4add48d84ced30f4d9ad234_arm64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:20d89725eae18c07e7659461e525e9f38ca7e5d0e4add48d84ced30f4d9ad234_arm64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-image-processing-rhel9@sha256%3A20d89725eae18c07e7659461e525e9f38ca7e5d0e4add48d84ced30f4d9ad234?arch=arm64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1.6.2-1767098286"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:ed52b144251e90288e9a3e4dc4c47db309e9a889245eea984612650c66a31958_arm64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:ed52b144251e90288e9a3e4dc4c47db309e9a889245eea984612650c66a31958_arm64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:ed52b144251e90288e9a3e4dc4c47db309e9a889245eea984612650c66a31958_arm64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-rhel9-operator@sha256%3Aed52b144251e90288e9a3e4dc4c47db309e9a889245eea984612650c66a31958?arch=arm64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1.6.2-1767101431"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:577803f97f2f98000fb4d74f26240a9958b8c2c878d96f63abd7e3bd4bc45701_arm64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:577803f97f2f98000fb4d74f26240a9958b8c2c878d96f63abd7e3bd4bc45701_arm64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:577803f97f2f98000fb4d74f26240a9958b8c2c878d96f63abd7e3bd4bc45701_arm64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-shared-resource-rhel9@sha256%3A577803f97f2f98000fb4d74f26240a9958b8c2c878d96f63abd7e3bd4bc45701?arch=arm64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1.6.2-1767088118"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:cb7357204e774de5dc272c68dc3bd4d278920ffba34b2f8b3d34bc983ea7e540_arm64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:cb7357204e774de5dc272c68dc3bd4d278920ffba34b2f8b3d34bc983ea7e540_arm64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:cb7357204e774de5dc272c68dc3bd4d278920ffba34b2f8b3d34bc983ea7e540_arm64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-shared-resource-webhook-rhel9@sha256%3Acb7357204e774de5dc272c68dc3bd4d278920ffba34b2f8b3d34bc983ea7e540?arch=arm64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1.6.2-1767088114"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:3a54cb8f7241741caafd707e8a14775bf6287aac904b43833d7d8560a2fd0ec3_arm64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:3a54cb8f7241741caafd707e8a14775bf6287aac904b43833d7d8560a2fd0ec3_arm64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:3a54cb8f7241741caafd707e8a14775bf6287aac904b43833d7d8560a2fd0ec3_arm64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-waiters-rhel9@sha256%3A3a54cb8f7241741caafd707e8a14775bf6287aac904b43833d7d8560a2fd0ec3?arch=arm64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1.6.2-1767098206"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1526ad121ffa743a84e1241c260be0f64bb0a8bbc49d6614e17931c8598a03ea_arm64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1526ad121ffa743a84e1241c260be0f64bb0a8bbc49d6614e17931c8598a03ea_arm64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1526ad121ffa743a84e1241c260be0f64bb0a8bbc49d6614e17931c8598a03ea_arm64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-webhook-rhel9@sha256%3A1526ad121ffa743a84e1241c260be0f64bb0a8bbc49d6614e17931c8598a03ea?arch=arm64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1.6.2-1767098245"
}
}
}
],
"category": "architecture",
"name": "arm64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:40c73809934821fcb769689934a31e6c0257522d3023f55ce66f6044fa0b15f3_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:40c73809934821fcb769689934a31e6c0257522d3023f55ce66f6044fa0b15f3_ppc64le",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:40c73809934821fcb769689934a31e6c0257522d3023f55ce66f6044fa0b15f3_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-controller-rhel9@sha256%3A40c73809934821fcb769689934a31e6c0257522d3023f55ce66f6044fa0b15f3?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1.6.2-1767098308"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:f502af693362accb3d87b1a4a833037720ab14e56fcd07fe95043767da7488ba_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:f502af693362accb3d87b1a4a833037720ab14e56fcd07fe95043767da7488ba_ppc64le",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:f502af693362accb3d87b1a4a833037720ab14e56fcd07fe95043767da7488ba_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-git-cloner-rhel9@sha256%3Af502af693362accb3d87b1a4a833037720ab14e56fcd07fe95043767da7488ba?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1.6.2-1767098139"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:482e09d5729e06a96e530ee00d73bb9e57ae2caa77f61a0c1715ded823e3168b_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:482e09d5729e06a96e530ee00d73bb9e57ae2caa77f61a0c1715ded823e3168b_ppc64le",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:482e09d5729e06a96e530ee00d73bb9e57ae2caa77f61a0c1715ded823e3168b_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-image-bundler-rhel9@sha256%3A482e09d5729e06a96e530ee00d73bb9e57ae2caa77f61a0c1715ded823e3168b?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1.6.2-1767098126"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:ad4aa5aaa2ab78e903af242f712ca536cfcf21724ceae6429390a9ba06d4373e_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:ad4aa5aaa2ab78e903af242f712ca536cfcf21724ceae6429390a9ba06d4373e_ppc64le",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:ad4aa5aaa2ab78e903af242f712ca536cfcf21724ceae6429390a9ba06d4373e_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-image-processing-rhel9@sha256%3Aad4aa5aaa2ab78e903af242f712ca536cfcf21724ceae6429390a9ba06d4373e?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1.6.2-1767098286"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:a598bdac8981c831ac9b3dd5a8588f75675c45b7a3af55d9a70b4e54fb5ba0e3_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:a598bdac8981c831ac9b3dd5a8588f75675c45b7a3af55d9a70b4e54fb5ba0e3_ppc64le",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:a598bdac8981c831ac9b3dd5a8588f75675c45b7a3af55d9a70b4e54fb5ba0e3_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-rhel9-operator@sha256%3Aa598bdac8981c831ac9b3dd5a8588f75675c45b7a3af55d9a70b4e54fb5ba0e3?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1.6.2-1767101431"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:19443e50b74eededc9c6e1f1af4bc54266e394b0a2302fb43893e16790383db6_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:19443e50b74eededc9c6e1f1af4bc54266e394b0a2302fb43893e16790383db6_ppc64le",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:19443e50b74eededc9c6e1f1af4bc54266e394b0a2302fb43893e16790383db6_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-shared-resource-rhel9@sha256%3A19443e50b74eededc9c6e1f1af4bc54266e394b0a2302fb43893e16790383db6?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1.6.2-1767088118"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:eaa164bccdd1f4d448dc37f30368ddab836db1e6e468e10b6a6be2f2b1b005f3_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:eaa164bccdd1f4d448dc37f30368ddab836db1e6e468e10b6a6be2f2b1b005f3_ppc64le",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:eaa164bccdd1f4d448dc37f30368ddab836db1e6e468e10b6a6be2f2b1b005f3_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-shared-resource-webhook-rhel9@sha256%3Aeaa164bccdd1f4d448dc37f30368ddab836db1e6e468e10b6a6be2f2b1b005f3?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1.6.2-1767088114"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:f75638184953eaa8d4d3bed00bb837494149cd49d8727efc9199534935f31d35_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:f75638184953eaa8d4d3bed00bb837494149cd49d8727efc9199534935f31d35_ppc64le",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:f75638184953eaa8d4d3bed00bb837494149cd49d8727efc9199534935f31d35_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-waiters-rhel9@sha256%3Af75638184953eaa8d4d3bed00bb837494149cd49d8727efc9199534935f31d35?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1.6.2-1767098206"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:0f0732b821aef3e50d2e08478b4cc4b2fdfefe23b65089688a7b94df1be80db3_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:0f0732b821aef3e50d2e08478b4cc4b2fdfefe23b65089688a7b94df1be80db3_ppc64le",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:0f0732b821aef3e50d2e08478b4cc4b2fdfefe23b65089688a7b94df1be80db3_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-webhook-rhel9@sha256%3A0f0732b821aef3e50d2e08478b4cc4b2fdfefe23b65089688a7b94df1be80db3?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1.6.2-1767098245"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:18ea258015f78c86201d5b6eac3f9ceb23c112de48a8995ddf078af1d9110c9c_s390x",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:18ea258015f78c86201d5b6eac3f9ceb23c112de48a8995ddf078af1d9110c9c_s390x",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:18ea258015f78c86201d5b6eac3f9ceb23c112de48a8995ddf078af1d9110c9c_s390x",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-controller-rhel9@sha256%3A18ea258015f78c86201d5b6eac3f9ceb23c112de48a8995ddf078af1d9110c9c?arch=s390x\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1.6.2-1767098308"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:74fe47de3b6ceaa1e9f47dc876a4aca412bfed8cf88301f4d06e0b23876bc693_s390x",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:74fe47de3b6ceaa1e9f47dc876a4aca412bfed8cf88301f4d06e0b23876bc693_s390x",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:74fe47de3b6ceaa1e9f47dc876a4aca412bfed8cf88301f4d06e0b23876bc693_s390x",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-git-cloner-rhel9@sha256%3A74fe47de3b6ceaa1e9f47dc876a4aca412bfed8cf88301f4d06e0b23876bc693?arch=s390x\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1.6.2-1767098139"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:ee1057c578e4af1c8c6593a125e65624add7934415f473872c923cb268e0e5dc_s390x",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:ee1057c578e4af1c8c6593a125e65624add7934415f473872c923cb268e0e5dc_s390x",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:ee1057c578e4af1c8c6593a125e65624add7934415f473872c923cb268e0e5dc_s390x",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-image-bundler-rhel9@sha256%3Aee1057c578e4af1c8c6593a125e65624add7934415f473872c923cb268e0e5dc?arch=s390x\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1.6.2-1767098126"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:f926ce979871b71d3920d62d5ce274c06d1dd97304b3c09f80b9490af2058416_s390x",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:f926ce979871b71d3920d62d5ce274c06d1dd97304b3c09f80b9490af2058416_s390x",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:f926ce979871b71d3920d62d5ce274c06d1dd97304b3c09f80b9490af2058416_s390x",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-image-processing-rhel9@sha256%3Af926ce979871b71d3920d62d5ce274c06d1dd97304b3c09f80b9490af2058416?arch=s390x\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1.6.2-1767098286"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:90bba2f38d29f1549cf2ad9f3ee36e5ce7c2450690ff211b797e8cd8e68c88d0_s390x",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:90bba2f38d29f1549cf2ad9f3ee36e5ce7c2450690ff211b797e8cd8e68c88d0_s390x",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:90bba2f38d29f1549cf2ad9f3ee36e5ce7c2450690ff211b797e8cd8e68c88d0_s390x",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-rhel9-operator@sha256%3A90bba2f38d29f1549cf2ad9f3ee36e5ce7c2450690ff211b797e8cd8e68c88d0?arch=s390x\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1.6.2-1767101431"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:7a42304116f9de96f650c7e043e6fef1e1f9f3f1f7ab5e2a1f526f029ee09687_s390x",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:7a42304116f9de96f650c7e043e6fef1e1f9f3f1f7ab5e2a1f526f029ee09687_s390x",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:7a42304116f9de96f650c7e043e6fef1e1f9f3f1f7ab5e2a1f526f029ee09687_s390x",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-shared-resource-rhel9@sha256%3A7a42304116f9de96f650c7e043e6fef1e1f9f3f1f7ab5e2a1f526f029ee09687?arch=s390x\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1.6.2-1767088118"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:6f72f5426d0b89a62d1b2eed16f24fea26c10679e4bba84c0d09be62f2cc431a_s390x",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:6f72f5426d0b89a62d1b2eed16f24fea26c10679e4bba84c0d09be62f2cc431a_s390x",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:6f72f5426d0b89a62d1b2eed16f24fea26c10679e4bba84c0d09be62f2cc431a_s390x",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-shared-resource-webhook-rhel9@sha256%3A6f72f5426d0b89a62d1b2eed16f24fea26c10679e4bba84c0d09be62f2cc431a?arch=s390x\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1.6.2-1767088114"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:b61931ce733c5ee4d57dd5eb8b451f840e3e59b02c9eca77b45126251395bd05_s390x",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:b61931ce733c5ee4d57dd5eb8b451f840e3e59b02c9eca77b45126251395bd05_s390x",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:b61931ce733c5ee4d57dd5eb8b451f840e3e59b02c9eca77b45126251395bd05_s390x",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-waiters-rhel9@sha256%3Ab61931ce733c5ee4d57dd5eb8b451f840e3e59b02c9eca77b45126251395bd05?arch=s390x\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1.6.2-1767098206"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:f9eeff1b49c1e3814ebe2e3298bf52eca7b7ac487d5b8ddd31f0c6c6a65fc899_s390x",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:f9eeff1b49c1e3814ebe2e3298bf52eca7b7ac487d5b8ddd31f0c6c6a65fc899_s390x",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:f9eeff1b49c1e3814ebe2e3298bf52eca7b7ac487d5b8ddd31f0c6c6a65fc899_s390x",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-webhook-rhel9@sha256%3Af9eeff1b49c1e3814ebe2e3298bf52eca7b7ac487d5b8ddd31f0c6c6a65fc899?arch=s390x\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1.6.2-1767098245"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:18ea258015f78c86201d5b6eac3f9ceb23c112de48a8995ddf078af1d9110c9c_s390x as a component of Builds for Red Hat OpenShift 1.6.1",
"product_id": "Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:18ea258015f78c86201d5b6eac3f9ceb23c112de48a8995ddf078af1d9110c9c_s390x"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:18ea258015f78c86201d5b6eac3f9ceb23c112de48a8995ddf078af1d9110c9c_s390x",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:40c73809934821fcb769689934a31e6c0257522d3023f55ce66f6044fa0b15f3_ppc64le as a component of Builds for Red Hat OpenShift 1.6.1",
"product_id": "Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:40c73809934821fcb769689934a31e6c0257522d3023f55ce66f6044fa0b15f3_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:40c73809934821fcb769689934a31e6c0257522d3023f55ce66f6044fa0b15f3_ppc64le",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:6696d83a6b93b43d56b9363fce455b46983a081dc5acaadaf9397645c01466da_amd64 as a component of Builds for Red Hat OpenShift 1.6.1",
"product_id": "Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:6696d83a6b93b43d56b9363fce455b46983a081dc5acaadaf9397645c01466da_amd64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:6696d83a6b93b43d56b9363fce455b46983a081dc5acaadaf9397645c01466da_amd64",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:f561f21f8fb326b314852057c23e608423960f5ac80b867aec4d7356fb15bf4e_arm64 as a component of Builds for Red Hat OpenShift 1.6.1",
"product_id": "Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:f561f21f8fb326b314852057c23e608423960f5ac80b867aec4d7356fb15bf4e_arm64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:f561f21f8fb326b314852057c23e608423960f5ac80b867aec4d7356fb15bf4e_arm64",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:22aff64e2120cc3588642b5a46538250f27c2fc8f1924074a5ba7afc84529272_arm64 as a component of Builds for Red Hat OpenShift 1.6.1",
"product_id": "Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:22aff64e2120cc3588642b5a46538250f27c2fc8f1924074a5ba7afc84529272_arm64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:22aff64e2120cc3588642b5a46538250f27c2fc8f1924074a5ba7afc84529272_arm64",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:74fe47de3b6ceaa1e9f47dc876a4aca412bfed8cf88301f4d06e0b23876bc693_s390x as a component of Builds for Red Hat OpenShift 1.6.1",
"product_id": "Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:74fe47de3b6ceaa1e9f47dc876a4aca412bfed8cf88301f4d06e0b23876bc693_s390x"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:74fe47de3b6ceaa1e9f47dc876a4aca412bfed8cf88301f4d06e0b23876bc693_s390x",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:ecfa61f5f848d642a5bff960e82a13be8938dcea890853878abd87e3f0dc0ccc_amd64 as a component of Builds for Red Hat OpenShift 1.6.1",
"product_id": "Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:ecfa61f5f848d642a5bff960e82a13be8938dcea890853878abd87e3f0dc0ccc_amd64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:ecfa61f5f848d642a5bff960e82a13be8938dcea890853878abd87e3f0dc0ccc_amd64",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:f502af693362accb3d87b1a4a833037720ab14e56fcd07fe95043767da7488ba_ppc64le as a component of Builds for Red Hat OpenShift 1.6.1",
"product_id": "Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:f502af693362accb3d87b1a4a833037720ab14e56fcd07fe95043767da7488ba_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:f502af693362accb3d87b1a4a833037720ab14e56fcd07fe95043767da7488ba_ppc64le",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:0b6fd93c0fb1170ca6ddc2a2326b1a962572db6fdae0b40b972a95102554c33b_arm64 as a component of Builds for Red Hat OpenShift 1.6.1",
"product_id": "Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:0b6fd93c0fb1170ca6ddc2a2326b1a962572db6fdae0b40b972a95102554c33b_arm64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:0b6fd93c0fb1170ca6ddc2a2326b1a962572db6fdae0b40b972a95102554c33b_arm64",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:482e09d5729e06a96e530ee00d73bb9e57ae2caa77f61a0c1715ded823e3168b_ppc64le as a component of Builds for Red Hat OpenShift 1.6.1",
"product_id": "Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:482e09d5729e06a96e530ee00d73bb9e57ae2caa77f61a0c1715ded823e3168b_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:482e09d5729e06a96e530ee00d73bb9e57ae2caa77f61a0c1715ded823e3168b_ppc64le",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:d3e1e7a8095107e284becf196b3e1c04a84f490a5ae59376c0584636c169b3c4_amd64 as a component of Builds for Red Hat OpenShift 1.6.1",
"product_id": "Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:d3e1e7a8095107e284becf196b3e1c04a84f490a5ae59376c0584636c169b3c4_amd64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:d3e1e7a8095107e284becf196b3e1c04a84f490a5ae59376c0584636c169b3c4_amd64",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:ee1057c578e4af1c8c6593a125e65624add7934415f473872c923cb268e0e5dc_s390x as a component of Builds for Red Hat OpenShift 1.6.1",
"product_id": "Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:ee1057c578e4af1c8c6593a125e65624add7934415f473872c923cb268e0e5dc_s390x"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:ee1057c578e4af1c8c6593a125e65624add7934415f473872c923cb268e0e5dc_s390x",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:20d89725eae18c07e7659461e525e9f38ca7e5d0e4add48d84ced30f4d9ad234_arm64 as a component of Builds for Red Hat OpenShift 1.6.1",
"product_id": "Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:20d89725eae18c07e7659461e525e9f38ca7e5d0e4add48d84ced30f4d9ad234_arm64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:20d89725eae18c07e7659461e525e9f38ca7e5d0e4add48d84ced30f4d9ad234_arm64",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:2a1f3268215e4b6d8e1ffdb5e9f3df45d24cd46893e07112799be3e3f0330b12_amd64 as a component of Builds for Red Hat OpenShift 1.6.1",
"product_id": "Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:2a1f3268215e4b6d8e1ffdb5e9f3df45d24cd46893e07112799be3e3f0330b12_amd64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:2a1f3268215e4b6d8e1ffdb5e9f3df45d24cd46893e07112799be3e3f0330b12_amd64",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:ad4aa5aaa2ab78e903af242f712ca536cfcf21724ceae6429390a9ba06d4373e_ppc64le as a component of Builds for Red Hat OpenShift 1.6.1",
"product_id": "Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:ad4aa5aaa2ab78e903af242f712ca536cfcf21724ceae6429390a9ba06d4373e_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:ad4aa5aaa2ab78e903af242f712ca536cfcf21724ceae6429390a9ba06d4373e_ppc64le",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:f926ce979871b71d3920d62d5ce274c06d1dd97304b3c09f80b9490af2058416_s390x as a component of Builds for Red Hat OpenShift 1.6.1",
"product_id": "Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:f926ce979871b71d3920d62d5ce274c06d1dd97304b3c09f80b9490af2058416_s390x"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:f926ce979871b71d3920d62d5ce274c06d1dd97304b3c09f80b9490af2058416_s390x",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:2111825788f8e8f63b780c20da94e9b7aa49b505f81e466ad3cd3dc5cec1f775_amd64 as a component of Builds for Red Hat OpenShift 1.6.1",
"product_id": "Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:2111825788f8e8f63b780c20da94e9b7aa49b505f81e466ad3cd3dc5cec1f775_amd64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:2111825788f8e8f63b780c20da94e9b7aa49b505f81e466ad3cd3dc5cec1f775_amd64",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:8eff50ab0188b7458ba261261809610c75d1dc08711803133e0b313299e9e790_amd64 as a component of Builds for Red Hat OpenShift 1.6.1",
"product_id": "Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:8eff50ab0188b7458ba261261809610c75d1dc08711803133e0b313299e9e790_amd64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:8eff50ab0188b7458ba261261809610c75d1dc08711803133e0b313299e9e790_amd64",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:90bba2f38d29f1549cf2ad9f3ee36e5ce7c2450690ff211b797e8cd8e68c88d0_s390x as a component of Builds for Red Hat OpenShift 1.6.1",
"product_id": "Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:90bba2f38d29f1549cf2ad9f3ee36e5ce7c2450690ff211b797e8cd8e68c88d0_s390x"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:90bba2f38d29f1549cf2ad9f3ee36e5ce7c2450690ff211b797e8cd8e68c88d0_s390x",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:a598bdac8981c831ac9b3dd5a8588f75675c45b7a3af55d9a70b4e54fb5ba0e3_ppc64le as a component of Builds for Red Hat OpenShift 1.6.1",
"product_id": "Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:a598bdac8981c831ac9b3dd5a8588f75675c45b7a3af55d9a70b4e54fb5ba0e3_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:a598bdac8981c831ac9b3dd5a8588f75675c45b7a3af55d9a70b4e54fb5ba0e3_ppc64le",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:ed52b144251e90288e9a3e4dc4c47db309e9a889245eea984612650c66a31958_arm64 as a component of Builds for Red Hat OpenShift 1.6.1",
"product_id": "Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:ed52b144251e90288e9a3e4dc4c47db309e9a889245eea984612650c66a31958_arm64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:ed52b144251e90288e9a3e4dc4c47db309e9a889245eea984612650c66a31958_arm64",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:17411ee0150422af55216174322e8dd97b9bf75d46c4bbae8b410f374ff81b36_amd64 as a component of Builds for Red Hat OpenShift 1.6.1",
"product_id": "Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:17411ee0150422af55216174322e8dd97b9bf75d46c4bbae8b410f374ff81b36_amd64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:17411ee0150422af55216174322e8dd97b9bf75d46c4bbae8b410f374ff81b36_amd64",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:19443e50b74eededc9c6e1f1af4bc54266e394b0a2302fb43893e16790383db6_ppc64le as a component of Builds for Red Hat OpenShift 1.6.1",
"product_id": "Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:19443e50b74eededc9c6e1f1af4bc54266e394b0a2302fb43893e16790383db6_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:19443e50b74eededc9c6e1f1af4bc54266e394b0a2302fb43893e16790383db6_ppc64le",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:577803f97f2f98000fb4d74f26240a9958b8c2c878d96f63abd7e3bd4bc45701_arm64 as a component of Builds for Red Hat OpenShift 1.6.1",
"product_id": "Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:577803f97f2f98000fb4d74f26240a9958b8c2c878d96f63abd7e3bd4bc45701_arm64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:577803f97f2f98000fb4d74f26240a9958b8c2c878d96f63abd7e3bd4bc45701_arm64",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:7a42304116f9de96f650c7e043e6fef1e1f9f3f1f7ab5e2a1f526f029ee09687_s390x as a component of Builds for Red Hat OpenShift 1.6.1",
"product_id": "Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:7a42304116f9de96f650c7e043e6fef1e1f9f3f1f7ab5e2a1f526f029ee09687_s390x"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:7a42304116f9de96f650c7e043e6fef1e1f9f3f1f7ab5e2a1f526f029ee09687_s390x",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:6f72f5426d0b89a62d1b2eed16f24fea26c10679e4bba84c0d09be62f2cc431a_s390x as a component of Builds for Red Hat OpenShift 1.6.1",
"product_id": "Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:6f72f5426d0b89a62d1b2eed16f24fea26c10679e4bba84c0d09be62f2cc431a_s390x"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:6f72f5426d0b89a62d1b2eed16f24fea26c10679e4bba84c0d09be62f2cc431a_s390x",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:cb7357204e774de5dc272c68dc3bd4d278920ffba34b2f8b3d34bc983ea7e540_arm64 as a component of Builds for Red Hat OpenShift 1.6.1",
"product_id": "Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:cb7357204e774de5dc272c68dc3bd4d278920ffba34b2f8b3d34bc983ea7e540_arm64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:cb7357204e774de5dc272c68dc3bd4d278920ffba34b2f8b3d34bc983ea7e540_arm64",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:d0b708f897e947ccf9ae660ae05056d505e2b5540bc4923e8956f28e9a0dcd99_amd64 as a component of Builds for Red Hat OpenShift 1.6.1",
"product_id": "Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:d0b708f897e947ccf9ae660ae05056d505e2b5540bc4923e8956f28e9a0dcd99_amd64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:d0b708f897e947ccf9ae660ae05056d505e2b5540bc4923e8956f28e9a0dcd99_amd64",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:eaa164bccdd1f4d448dc37f30368ddab836db1e6e468e10b6a6be2f2b1b005f3_ppc64le as a component of Builds for Red Hat OpenShift 1.6.1",
"product_id": "Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:eaa164bccdd1f4d448dc37f30368ddab836db1e6e468e10b6a6be2f2b1b005f3_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:eaa164bccdd1f4d448dc37f30368ddab836db1e6e468e10b6a6be2f2b1b005f3_ppc64le",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:3a54cb8f7241741caafd707e8a14775bf6287aac904b43833d7d8560a2fd0ec3_arm64 as a component of Builds for Red Hat OpenShift 1.6.1",
"product_id": "Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:3a54cb8f7241741caafd707e8a14775bf6287aac904b43833d7d8560a2fd0ec3_arm64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:3a54cb8f7241741caafd707e8a14775bf6287aac904b43833d7d8560a2fd0ec3_arm64",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:b61931ce733c5ee4d57dd5eb8b451f840e3e59b02c9eca77b45126251395bd05_s390x as a component of Builds for Red Hat OpenShift 1.6.1",
"product_id": "Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:b61931ce733c5ee4d57dd5eb8b451f840e3e59b02c9eca77b45126251395bd05_s390x"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:b61931ce733c5ee4d57dd5eb8b451f840e3e59b02c9eca77b45126251395bd05_s390x",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:e81a090a71097aea050110ccb9274b620e8f940b3cf01e42acb7643ba9763299_amd64 as a component of Builds for Red Hat OpenShift 1.6.1",
"product_id": "Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:e81a090a71097aea050110ccb9274b620e8f940b3cf01e42acb7643ba9763299_amd64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:e81a090a71097aea050110ccb9274b620e8f940b3cf01e42acb7643ba9763299_amd64",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:f75638184953eaa8d4d3bed00bb837494149cd49d8727efc9199534935f31d35_ppc64le as a component of Builds for Red Hat OpenShift 1.6.1",
"product_id": "Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:f75638184953eaa8d4d3bed00bb837494149cd49d8727efc9199534935f31d35_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:f75638184953eaa8d4d3bed00bb837494149cd49d8727efc9199534935f31d35_ppc64le",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:0f0732b821aef3e50d2e08478b4cc4b2fdfefe23b65089688a7b94df1be80db3_ppc64le as a component of Builds for Red Hat OpenShift 1.6.1",
"product_id": "Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:0f0732b821aef3e50d2e08478b4cc4b2fdfefe23b65089688a7b94df1be80db3_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:0f0732b821aef3e50d2e08478b4cc4b2fdfefe23b65089688a7b94df1be80db3_ppc64le",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1526ad121ffa743a84e1241c260be0f64bb0a8bbc49d6614e17931c8598a03ea_arm64 as a component of Builds for Red Hat OpenShift 1.6.1",
"product_id": "Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1526ad121ffa743a84e1241c260be0f64bb0a8bbc49d6614e17931c8598a03ea_arm64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1526ad121ffa743a84e1241c260be0f64bb0a8bbc49d6614e17931c8598a03ea_arm64",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:4cd9f6c9ea668bf0227197b9e551d237b38b413b80d56b8fa62a05e54540e44d_amd64 as a component of Builds for Red Hat OpenShift 1.6.1",
"product_id": "Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:4cd9f6c9ea668bf0227197b9e551d237b38b413b80d56b8fa62a05e54540e44d_amd64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:4cd9f6c9ea668bf0227197b9e551d237b38b413b80d56b8fa62a05e54540e44d_amd64",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:f9eeff1b49c1e3814ebe2e3298bf52eca7b7ac487d5b8ddd31f0c6c6a65fc899_s390x as a component of Builds for Red Hat OpenShift 1.6.1",
"product_id": "Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:f9eeff1b49c1e3814ebe2e3298bf52eca7b7ac487d5b8ddd31f0c6c6a65fc899_s390x"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:f9eeff1b49c1e3814ebe2e3298bf52eca7b7ac487d5b8ddd31f0c6c6a65fc899_s390x",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.6.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-52881",
"cwe": {
"id": "CWE-59",
"name": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)"
},
"discovery_date": "2025-10-17T14:19:18.652000+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:18ea258015f78c86201d5b6eac3f9ceb23c112de48a8995ddf078af1d9110c9c_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:40c73809934821fcb769689934a31e6c0257522d3023f55ce66f6044fa0b15f3_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:6696d83a6b93b43d56b9363fce455b46983a081dc5acaadaf9397645c01466da_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:f561f21f8fb326b314852057c23e608423960f5ac80b867aec4d7356fb15bf4e_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:22aff64e2120cc3588642b5a46538250f27c2fc8f1924074a5ba7afc84529272_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:74fe47de3b6ceaa1e9f47dc876a4aca412bfed8cf88301f4d06e0b23876bc693_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:ecfa61f5f848d642a5bff960e82a13be8938dcea890853878abd87e3f0dc0ccc_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:f502af693362accb3d87b1a4a833037720ab14e56fcd07fe95043767da7488ba_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:0b6fd93c0fb1170ca6ddc2a2326b1a962572db6fdae0b40b972a95102554c33b_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:482e09d5729e06a96e530ee00d73bb9e57ae2caa77f61a0c1715ded823e3168b_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:d3e1e7a8095107e284becf196b3e1c04a84f490a5ae59376c0584636c169b3c4_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:ee1057c578e4af1c8c6593a125e65624add7934415f473872c923cb268e0e5dc_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:20d89725eae18c07e7659461e525e9f38ca7e5d0e4add48d84ced30f4d9ad234_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:2a1f3268215e4b6d8e1ffdb5e9f3df45d24cd46893e07112799be3e3f0330b12_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:ad4aa5aaa2ab78e903af242f712ca536cfcf21724ceae6429390a9ba06d4373e_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:f926ce979871b71d3920d62d5ce274c06d1dd97304b3c09f80b9490af2058416_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:2111825788f8e8f63b780c20da94e9b7aa49b505f81e466ad3cd3dc5cec1f775_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:8eff50ab0188b7458ba261261809610c75d1dc08711803133e0b313299e9e790_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:90bba2f38d29f1549cf2ad9f3ee36e5ce7c2450690ff211b797e8cd8e68c88d0_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:a598bdac8981c831ac9b3dd5a8588f75675c45b7a3af55d9a70b4e54fb5ba0e3_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:ed52b144251e90288e9a3e4dc4c47db309e9a889245eea984612650c66a31958_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:3a54cb8f7241741caafd707e8a14775bf6287aac904b43833d7d8560a2fd0ec3_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:b61931ce733c5ee4d57dd5eb8b451f840e3e59b02c9eca77b45126251395bd05_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:e81a090a71097aea050110ccb9274b620e8f940b3cf01e42acb7643ba9763299_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:f75638184953eaa8d4d3bed00bb837494149cd49d8727efc9199534935f31d35_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:0f0732b821aef3e50d2e08478b4cc4b2fdfefe23b65089688a7b94df1be80db3_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1526ad121ffa743a84e1241c260be0f64bb0a8bbc49d6614e17931c8598a03ea_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:4cd9f6c9ea668bf0227197b9e551d237b38b413b80d56b8fa62a05e54540e44d_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:f9eeff1b49c1e3814ebe2e3298bf52eca7b7ac487d5b8ddd31f0c6c6a65fc899_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2404715"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in runc. This attack is a more sophisticated variant of CVE-2019-16884, which was a flaw that allowed an attacker to trick runc into writing the LSM process labels for a container process into a dummy tmpfs file and thus not apply the correct LSM labels to the container process. The mitigation applied for CVE-2019-16884 was fairly limited and effectively only caused runc to verify that when we write LSM labels that those labels are actual procfs files.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "runc: opencontainers/selinux: container escape and denial of service due to arbitrary write gadgets and procfs write redirects",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat considers this as an Important flaw since the impact is limited to local attack with minimal privileges in order to jeopardize the environment.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:17411ee0150422af55216174322e8dd97b9bf75d46c4bbae8b410f374ff81b36_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:19443e50b74eededc9c6e1f1af4bc54266e394b0a2302fb43893e16790383db6_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:577803f97f2f98000fb4d74f26240a9958b8c2c878d96f63abd7e3bd4bc45701_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:7a42304116f9de96f650c7e043e6fef1e1f9f3f1f7ab5e2a1f526f029ee09687_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:6f72f5426d0b89a62d1b2eed16f24fea26c10679e4bba84c0d09be62f2cc431a_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:cb7357204e774de5dc272c68dc3bd4d278920ffba34b2f8b3d34bc983ea7e540_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:d0b708f897e947ccf9ae660ae05056d505e2b5540bc4923e8956f28e9a0dcd99_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:eaa164bccdd1f4d448dc37f30368ddab836db1e6e468e10b6a6be2f2b1b005f3_ppc64le"
],
"known_not_affected": [
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:18ea258015f78c86201d5b6eac3f9ceb23c112de48a8995ddf078af1d9110c9c_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:40c73809934821fcb769689934a31e6c0257522d3023f55ce66f6044fa0b15f3_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:6696d83a6b93b43d56b9363fce455b46983a081dc5acaadaf9397645c01466da_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:f561f21f8fb326b314852057c23e608423960f5ac80b867aec4d7356fb15bf4e_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:22aff64e2120cc3588642b5a46538250f27c2fc8f1924074a5ba7afc84529272_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:74fe47de3b6ceaa1e9f47dc876a4aca412bfed8cf88301f4d06e0b23876bc693_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:ecfa61f5f848d642a5bff960e82a13be8938dcea890853878abd87e3f0dc0ccc_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:f502af693362accb3d87b1a4a833037720ab14e56fcd07fe95043767da7488ba_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:0b6fd93c0fb1170ca6ddc2a2326b1a962572db6fdae0b40b972a95102554c33b_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:482e09d5729e06a96e530ee00d73bb9e57ae2caa77f61a0c1715ded823e3168b_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:d3e1e7a8095107e284becf196b3e1c04a84f490a5ae59376c0584636c169b3c4_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:ee1057c578e4af1c8c6593a125e65624add7934415f473872c923cb268e0e5dc_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:20d89725eae18c07e7659461e525e9f38ca7e5d0e4add48d84ced30f4d9ad234_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:2a1f3268215e4b6d8e1ffdb5e9f3df45d24cd46893e07112799be3e3f0330b12_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:ad4aa5aaa2ab78e903af242f712ca536cfcf21724ceae6429390a9ba06d4373e_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:f926ce979871b71d3920d62d5ce274c06d1dd97304b3c09f80b9490af2058416_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:2111825788f8e8f63b780c20da94e9b7aa49b505f81e466ad3cd3dc5cec1f775_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:8eff50ab0188b7458ba261261809610c75d1dc08711803133e0b313299e9e790_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:90bba2f38d29f1549cf2ad9f3ee36e5ce7c2450690ff211b797e8cd8e68c88d0_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:a598bdac8981c831ac9b3dd5a8588f75675c45b7a3af55d9a70b4e54fb5ba0e3_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:ed52b144251e90288e9a3e4dc4c47db309e9a889245eea984612650c66a31958_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:3a54cb8f7241741caafd707e8a14775bf6287aac904b43833d7d8560a2fd0ec3_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:b61931ce733c5ee4d57dd5eb8b451f840e3e59b02c9eca77b45126251395bd05_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:e81a090a71097aea050110ccb9274b620e8f940b3cf01e42acb7643ba9763299_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:f75638184953eaa8d4d3bed00bb837494149cd49d8727efc9199534935f31d35_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:0f0732b821aef3e50d2e08478b4cc4b2fdfefe23b65089688a7b94df1be80db3_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1526ad121ffa743a84e1241c260be0f64bb0a8bbc49d6614e17931c8598a03ea_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:4cd9f6c9ea668bf0227197b9e551d237b38b413b80d56b8fa62a05e54540e44d_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:f9eeff1b49c1e3814ebe2e3298bf52eca7b7ac487d5b8ddd31f0c6c6a65fc899_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-52881"
},
{
"category": "external",
"summary": "RHBZ#2404715",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2404715"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-52881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52881"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-52881",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52881"
},
{
"category": "external",
"summary": "https://github.com/opencontainers/selinux/pull/237",
"url": "https://github.com/opencontainers/selinux/pull/237"
}
],
"release_date": "2025-11-05T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-05T08:04:03+00:00",
"details": "It is recommended that existing users of Red Hat OpenShift Builds 1.6.0 upgrades to to 1.6.2",
"product_ids": [
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:17411ee0150422af55216174322e8dd97b9bf75d46c4bbae8b410f374ff81b36_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:19443e50b74eededc9c6e1f1af4bc54266e394b0a2302fb43893e16790383db6_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:577803f97f2f98000fb4d74f26240a9958b8c2c878d96f63abd7e3bd4bc45701_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:7a42304116f9de96f650c7e043e6fef1e1f9f3f1f7ab5e2a1f526f029ee09687_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:6f72f5426d0b89a62d1b2eed16f24fea26c10679e4bba84c0d09be62f2cc431a_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:cb7357204e774de5dc272c68dc3bd4d278920ffba34b2f8b3d34bc983ea7e540_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:d0b708f897e947ccf9ae660ae05056d505e2b5540bc4923e8956f28e9a0dcd99_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:eaa164bccdd1f4d448dc37f30368ddab836db1e6e468e10b6a6be2f2b1b005f3_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:0050"
},
{
"category": "workaround",
"details": "Potential mitigations for this issue include:\n\n* Using rootless containers, as doing so will block most of the inadvertent writes (runc would run with reduced privileges, making attempts to write to procfs files ineffective).\n* Based on our analysis, neither AppArmor or SELinux can protect against the full version of the redirected write attack. The container runtime is generally privileged enough to write to arbitrary procfs files, which is more than sufficient to cause a container breakout.",
"product_ids": [
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:18ea258015f78c86201d5b6eac3f9ceb23c112de48a8995ddf078af1d9110c9c_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:40c73809934821fcb769689934a31e6c0257522d3023f55ce66f6044fa0b15f3_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:6696d83a6b93b43d56b9363fce455b46983a081dc5acaadaf9397645c01466da_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:f561f21f8fb326b314852057c23e608423960f5ac80b867aec4d7356fb15bf4e_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:22aff64e2120cc3588642b5a46538250f27c2fc8f1924074a5ba7afc84529272_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:74fe47de3b6ceaa1e9f47dc876a4aca412bfed8cf88301f4d06e0b23876bc693_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:ecfa61f5f848d642a5bff960e82a13be8938dcea890853878abd87e3f0dc0ccc_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:f502af693362accb3d87b1a4a833037720ab14e56fcd07fe95043767da7488ba_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:0b6fd93c0fb1170ca6ddc2a2326b1a962572db6fdae0b40b972a95102554c33b_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:482e09d5729e06a96e530ee00d73bb9e57ae2caa77f61a0c1715ded823e3168b_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:d3e1e7a8095107e284becf196b3e1c04a84f490a5ae59376c0584636c169b3c4_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:ee1057c578e4af1c8c6593a125e65624add7934415f473872c923cb268e0e5dc_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:20d89725eae18c07e7659461e525e9f38ca7e5d0e4add48d84ced30f4d9ad234_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:2a1f3268215e4b6d8e1ffdb5e9f3df45d24cd46893e07112799be3e3f0330b12_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:ad4aa5aaa2ab78e903af242f712ca536cfcf21724ceae6429390a9ba06d4373e_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:f926ce979871b71d3920d62d5ce274c06d1dd97304b3c09f80b9490af2058416_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:2111825788f8e8f63b780c20da94e9b7aa49b505f81e466ad3cd3dc5cec1f775_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:8eff50ab0188b7458ba261261809610c75d1dc08711803133e0b313299e9e790_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:90bba2f38d29f1549cf2ad9f3ee36e5ce7c2450690ff211b797e8cd8e68c88d0_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:a598bdac8981c831ac9b3dd5a8588f75675c45b7a3af55d9a70b4e54fb5ba0e3_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:ed52b144251e90288e9a3e4dc4c47db309e9a889245eea984612650c66a31958_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:17411ee0150422af55216174322e8dd97b9bf75d46c4bbae8b410f374ff81b36_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:19443e50b74eededc9c6e1f1af4bc54266e394b0a2302fb43893e16790383db6_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:577803f97f2f98000fb4d74f26240a9958b8c2c878d96f63abd7e3bd4bc45701_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:7a42304116f9de96f650c7e043e6fef1e1f9f3f1f7ab5e2a1f526f029ee09687_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:6f72f5426d0b89a62d1b2eed16f24fea26c10679e4bba84c0d09be62f2cc431a_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:cb7357204e774de5dc272c68dc3bd4d278920ffba34b2f8b3d34bc983ea7e540_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:d0b708f897e947ccf9ae660ae05056d505e2b5540bc4923e8956f28e9a0dcd99_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:eaa164bccdd1f4d448dc37f30368ddab836db1e6e468e10b6a6be2f2b1b005f3_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:3a54cb8f7241741caafd707e8a14775bf6287aac904b43833d7d8560a2fd0ec3_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:b61931ce733c5ee4d57dd5eb8b451f840e3e59b02c9eca77b45126251395bd05_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:e81a090a71097aea050110ccb9274b620e8f940b3cf01e42acb7643ba9763299_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:f75638184953eaa8d4d3bed00bb837494149cd49d8727efc9199534935f31d35_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:0f0732b821aef3e50d2e08478b4cc4b2fdfefe23b65089688a7b94df1be80db3_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1526ad121ffa743a84e1241c260be0f64bb0a8bbc49d6614e17931c8598a03ea_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:4cd9f6c9ea668bf0227197b9e551d237b38b413b80d56b8fa62a05e54540e44d_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:f9eeff1b49c1e3814ebe2e3298bf52eca7b7ac487d5b8ddd31f0c6c6a65fc899_s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:18ea258015f78c86201d5b6eac3f9ceb23c112de48a8995ddf078af1d9110c9c_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:40c73809934821fcb769689934a31e6c0257522d3023f55ce66f6044fa0b15f3_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:6696d83a6b93b43d56b9363fce455b46983a081dc5acaadaf9397645c01466da_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:f561f21f8fb326b314852057c23e608423960f5ac80b867aec4d7356fb15bf4e_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:22aff64e2120cc3588642b5a46538250f27c2fc8f1924074a5ba7afc84529272_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:74fe47de3b6ceaa1e9f47dc876a4aca412bfed8cf88301f4d06e0b23876bc693_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:ecfa61f5f848d642a5bff960e82a13be8938dcea890853878abd87e3f0dc0ccc_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:f502af693362accb3d87b1a4a833037720ab14e56fcd07fe95043767da7488ba_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:0b6fd93c0fb1170ca6ddc2a2326b1a962572db6fdae0b40b972a95102554c33b_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:482e09d5729e06a96e530ee00d73bb9e57ae2caa77f61a0c1715ded823e3168b_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:d3e1e7a8095107e284becf196b3e1c04a84f490a5ae59376c0584636c169b3c4_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:ee1057c578e4af1c8c6593a125e65624add7934415f473872c923cb268e0e5dc_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:20d89725eae18c07e7659461e525e9f38ca7e5d0e4add48d84ced30f4d9ad234_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:2a1f3268215e4b6d8e1ffdb5e9f3df45d24cd46893e07112799be3e3f0330b12_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:ad4aa5aaa2ab78e903af242f712ca536cfcf21724ceae6429390a9ba06d4373e_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:f926ce979871b71d3920d62d5ce274c06d1dd97304b3c09f80b9490af2058416_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:2111825788f8e8f63b780c20da94e9b7aa49b505f81e466ad3cd3dc5cec1f775_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:8eff50ab0188b7458ba261261809610c75d1dc08711803133e0b313299e9e790_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:90bba2f38d29f1549cf2ad9f3ee36e5ce7c2450690ff211b797e8cd8e68c88d0_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:a598bdac8981c831ac9b3dd5a8588f75675c45b7a3af55d9a70b4e54fb5ba0e3_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:ed52b144251e90288e9a3e4dc4c47db309e9a889245eea984612650c66a31958_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:17411ee0150422af55216174322e8dd97b9bf75d46c4bbae8b410f374ff81b36_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:19443e50b74eededc9c6e1f1af4bc54266e394b0a2302fb43893e16790383db6_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:577803f97f2f98000fb4d74f26240a9958b8c2c878d96f63abd7e3bd4bc45701_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:7a42304116f9de96f650c7e043e6fef1e1f9f3f1f7ab5e2a1f526f029ee09687_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:6f72f5426d0b89a62d1b2eed16f24fea26c10679e4bba84c0d09be62f2cc431a_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:cb7357204e774de5dc272c68dc3bd4d278920ffba34b2f8b3d34bc983ea7e540_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:d0b708f897e947ccf9ae660ae05056d505e2b5540bc4923e8956f28e9a0dcd99_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:eaa164bccdd1f4d448dc37f30368ddab836db1e6e468e10b6a6be2f2b1b005f3_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:3a54cb8f7241741caafd707e8a14775bf6287aac904b43833d7d8560a2fd0ec3_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:b61931ce733c5ee4d57dd5eb8b451f840e3e59b02c9eca77b45126251395bd05_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:e81a090a71097aea050110ccb9274b620e8f940b3cf01e42acb7643ba9763299_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:f75638184953eaa8d4d3bed00bb837494149cd49d8727efc9199534935f31d35_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:0f0732b821aef3e50d2e08478b4cc4b2fdfefe23b65089688a7b94df1be80db3_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1526ad121ffa743a84e1241c260be0f64bb0a8bbc49d6614e17931c8598a03ea_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:4cd9f6c9ea668bf0227197b9e551d237b38b413b80d56b8fa62a05e54540e44d_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:f9eeff1b49c1e3814ebe2e3298bf52eca7b7ac487d5b8ddd31f0c6c6a65fc899_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "runc: opencontainers/selinux: container escape and denial of service due to arbitrary write gadgets and procfs write redirects"
},
{
"cve": "CVE-2025-66418",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2025-12-05T17:01:20.277857+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:18ea258015f78c86201d5b6eac3f9ceb23c112de48a8995ddf078af1d9110c9c_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:40c73809934821fcb769689934a31e6c0257522d3023f55ce66f6044fa0b15f3_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:6696d83a6b93b43d56b9363fce455b46983a081dc5acaadaf9397645c01466da_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:f561f21f8fb326b314852057c23e608423960f5ac80b867aec4d7356fb15bf4e_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:22aff64e2120cc3588642b5a46538250f27c2fc8f1924074a5ba7afc84529272_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:74fe47de3b6ceaa1e9f47dc876a4aca412bfed8cf88301f4d06e0b23876bc693_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:ecfa61f5f848d642a5bff960e82a13be8938dcea890853878abd87e3f0dc0ccc_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:f502af693362accb3d87b1a4a833037720ab14e56fcd07fe95043767da7488ba_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:0b6fd93c0fb1170ca6ddc2a2326b1a962572db6fdae0b40b972a95102554c33b_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:482e09d5729e06a96e530ee00d73bb9e57ae2caa77f61a0c1715ded823e3168b_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:d3e1e7a8095107e284becf196b3e1c04a84f490a5ae59376c0584636c169b3c4_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:ee1057c578e4af1c8c6593a125e65624add7934415f473872c923cb268e0e5dc_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:20d89725eae18c07e7659461e525e9f38ca7e5d0e4add48d84ced30f4d9ad234_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:2a1f3268215e4b6d8e1ffdb5e9f3df45d24cd46893e07112799be3e3f0330b12_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:ad4aa5aaa2ab78e903af242f712ca536cfcf21724ceae6429390a9ba06d4373e_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:f926ce979871b71d3920d62d5ce274c06d1dd97304b3c09f80b9490af2058416_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:2111825788f8e8f63b780c20da94e9b7aa49b505f81e466ad3cd3dc5cec1f775_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:8eff50ab0188b7458ba261261809610c75d1dc08711803133e0b313299e9e790_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:90bba2f38d29f1549cf2ad9f3ee36e5ce7c2450690ff211b797e8cd8e68c88d0_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:a598bdac8981c831ac9b3dd5a8588f75675c45b7a3af55d9a70b4e54fb5ba0e3_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:ed52b144251e90288e9a3e4dc4c47db309e9a889245eea984612650c66a31958_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:3a54cb8f7241741caafd707e8a14775bf6287aac904b43833d7d8560a2fd0ec3_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:b61931ce733c5ee4d57dd5eb8b451f840e3e59b02c9eca77b45126251395bd05_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:e81a090a71097aea050110ccb9274b620e8f940b3cf01e42acb7643ba9763299_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:f75638184953eaa8d4d3bed00bb837494149cd49d8727efc9199534935f31d35_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:0f0732b821aef3e50d2e08478b4cc4b2fdfefe23b65089688a7b94df1be80db3_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1526ad121ffa743a84e1241c260be0f64bb0a8bbc49d6614e17931c8598a03ea_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:4cd9f6c9ea668bf0227197b9e551d237b38b413b80d56b8fa62a05e54540e44d_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:f9eeff1b49c1e3814ebe2e3298bf52eca7b7ac487d5b8ddd31f0c6c6a65fc899_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2419455"
}
],
"notes": [
{
"category": "description",
"text": "urllib3 is a user-friendly HTTP client library for Python. Starting in version 1.24 and prior to 2.6.0, the number of links in the decompression chain was unbounded allowing a malicious server to insert a virtually unlimited number of compression steps leading to high CPU usage and massive memory allocation for the decompressed data. This vulnerability is fixed in 2.6.0.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "urllib3: urllib3: Unbounded decompression chain leads to resource exhaustion",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:17411ee0150422af55216174322e8dd97b9bf75d46c4bbae8b410f374ff81b36_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:19443e50b74eededc9c6e1f1af4bc54266e394b0a2302fb43893e16790383db6_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:577803f97f2f98000fb4d74f26240a9958b8c2c878d96f63abd7e3bd4bc45701_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:7a42304116f9de96f650c7e043e6fef1e1f9f3f1f7ab5e2a1f526f029ee09687_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:6f72f5426d0b89a62d1b2eed16f24fea26c10679e4bba84c0d09be62f2cc431a_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:cb7357204e774de5dc272c68dc3bd4d278920ffba34b2f8b3d34bc983ea7e540_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:d0b708f897e947ccf9ae660ae05056d505e2b5540bc4923e8956f28e9a0dcd99_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:eaa164bccdd1f4d448dc37f30368ddab836db1e6e468e10b6a6be2f2b1b005f3_ppc64le"
],
"known_not_affected": [
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:18ea258015f78c86201d5b6eac3f9ceb23c112de48a8995ddf078af1d9110c9c_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:40c73809934821fcb769689934a31e6c0257522d3023f55ce66f6044fa0b15f3_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:6696d83a6b93b43d56b9363fce455b46983a081dc5acaadaf9397645c01466da_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:f561f21f8fb326b314852057c23e608423960f5ac80b867aec4d7356fb15bf4e_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:22aff64e2120cc3588642b5a46538250f27c2fc8f1924074a5ba7afc84529272_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:74fe47de3b6ceaa1e9f47dc876a4aca412bfed8cf88301f4d06e0b23876bc693_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:ecfa61f5f848d642a5bff960e82a13be8938dcea890853878abd87e3f0dc0ccc_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:f502af693362accb3d87b1a4a833037720ab14e56fcd07fe95043767da7488ba_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:0b6fd93c0fb1170ca6ddc2a2326b1a962572db6fdae0b40b972a95102554c33b_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:482e09d5729e06a96e530ee00d73bb9e57ae2caa77f61a0c1715ded823e3168b_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:d3e1e7a8095107e284becf196b3e1c04a84f490a5ae59376c0584636c169b3c4_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:ee1057c578e4af1c8c6593a125e65624add7934415f473872c923cb268e0e5dc_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:20d89725eae18c07e7659461e525e9f38ca7e5d0e4add48d84ced30f4d9ad234_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:2a1f3268215e4b6d8e1ffdb5e9f3df45d24cd46893e07112799be3e3f0330b12_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:ad4aa5aaa2ab78e903af242f712ca536cfcf21724ceae6429390a9ba06d4373e_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:f926ce979871b71d3920d62d5ce274c06d1dd97304b3c09f80b9490af2058416_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:2111825788f8e8f63b780c20da94e9b7aa49b505f81e466ad3cd3dc5cec1f775_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:8eff50ab0188b7458ba261261809610c75d1dc08711803133e0b313299e9e790_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:90bba2f38d29f1549cf2ad9f3ee36e5ce7c2450690ff211b797e8cd8e68c88d0_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:a598bdac8981c831ac9b3dd5a8588f75675c45b7a3af55d9a70b4e54fb5ba0e3_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:ed52b144251e90288e9a3e4dc4c47db309e9a889245eea984612650c66a31958_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:3a54cb8f7241741caafd707e8a14775bf6287aac904b43833d7d8560a2fd0ec3_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:b61931ce733c5ee4d57dd5eb8b451f840e3e59b02c9eca77b45126251395bd05_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:e81a090a71097aea050110ccb9274b620e8f940b3cf01e42acb7643ba9763299_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:f75638184953eaa8d4d3bed00bb837494149cd49d8727efc9199534935f31d35_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:0f0732b821aef3e50d2e08478b4cc4b2fdfefe23b65089688a7b94df1be80db3_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1526ad121ffa743a84e1241c260be0f64bb0a8bbc49d6614e17931c8598a03ea_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:4cd9f6c9ea668bf0227197b9e551d237b38b413b80d56b8fa62a05e54540e44d_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:f9eeff1b49c1e3814ebe2e3298bf52eca7b7ac487d5b8ddd31f0c6c6a65fc899_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-66418"
},
{
"category": "external",
"summary": "RHBZ#2419455",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419455"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-66418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66418"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-66418",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-66418"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/commit/24d7b67eac89f94e11003424bcf0d8f7b72222a8",
"url": "https://github.com/urllib3/urllib3/commit/24d7b67eac89f94e11003424bcf0d8f7b72222a8"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/security/advisories/GHSA-gm62-xv2j-4w53",
"url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-gm62-xv2j-4w53"
}
],
"release_date": "2025-12-05T16:02:15.271000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-05T08:04:03+00:00",
"details": "It is recommended that existing users of Red Hat OpenShift Builds 1.6.0 upgrades to to 1.6.2",
"product_ids": [
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:17411ee0150422af55216174322e8dd97b9bf75d46c4bbae8b410f374ff81b36_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:19443e50b74eededc9c6e1f1af4bc54266e394b0a2302fb43893e16790383db6_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:577803f97f2f98000fb4d74f26240a9958b8c2c878d96f63abd7e3bd4bc45701_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:7a42304116f9de96f650c7e043e6fef1e1f9f3f1f7ab5e2a1f526f029ee09687_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:6f72f5426d0b89a62d1b2eed16f24fea26c10679e4bba84c0d09be62f2cc431a_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:cb7357204e774de5dc272c68dc3bd4d278920ffba34b2f8b3d34bc983ea7e540_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:d0b708f897e947ccf9ae660ae05056d505e2b5540bc4923e8956f28e9a0dcd99_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:eaa164bccdd1f4d448dc37f30368ddab836db1e6e468e10b6a6be2f2b1b005f3_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:0050"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:18ea258015f78c86201d5b6eac3f9ceb23c112de48a8995ddf078af1d9110c9c_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:40c73809934821fcb769689934a31e6c0257522d3023f55ce66f6044fa0b15f3_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:6696d83a6b93b43d56b9363fce455b46983a081dc5acaadaf9397645c01466da_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:f561f21f8fb326b314852057c23e608423960f5ac80b867aec4d7356fb15bf4e_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:22aff64e2120cc3588642b5a46538250f27c2fc8f1924074a5ba7afc84529272_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:74fe47de3b6ceaa1e9f47dc876a4aca412bfed8cf88301f4d06e0b23876bc693_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:ecfa61f5f848d642a5bff960e82a13be8938dcea890853878abd87e3f0dc0ccc_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:f502af693362accb3d87b1a4a833037720ab14e56fcd07fe95043767da7488ba_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:0b6fd93c0fb1170ca6ddc2a2326b1a962572db6fdae0b40b972a95102554c33b_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:482e09d5729e06a96e530ee00d73bb9e57ae2caa77f61a0c1715ded823e3168b_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:d3e1e7a8095107e284becf196b3e1c04a84f490a5ae59376c0584636c169b3c4_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:ee1057c578e4af1c8c6593a125e65624add7934415f473872c923cb268e0e5dc_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:20d89725eae18c07e7659461e525e9f38ca7e5d0e4add48d84ced30f4d9ad234_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:2a1f3268215e4b6d8e1ffdb5e9f3df45d24cd46893e07112799be3e3f0330b12_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:ad4aa5aaa2ab78e903af242f712ca536cfcf21724ceae6429390a9ba06d4373e_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:f926ce979871b71d3920d62d5ce274c06d1dd97304b3c09f80b9490af2058416_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:2111825788f8e8f63b780c20da94e9b7aa49b505f81e466ad3cd3dc5cec1f775_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:8eff50ab0188b7458ba261261809610c75d1dc08711803133e0b313299e9e790_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:90bba2f38d29f1549cf2ad9f3ee36e5ce7c2450690ff211b797e8cd8e68c88d0_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:a598bdac8981c831ac9b3dd5a8588f75675c45b7a3af55d9a70b4e54fb5ba0e3_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:ed52b144251e90288e9a3e4dc4c47db309e9a889245eea984612650c66a31958_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:17411ee0150422af55216174322e8dd97b9bf75d46c4bbae8b410f374ff81b36_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:19443e50b74eededc9c6e1f1af4bc54266e394b0a2302fb43893e16790383db6_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:577803f97f2f98000fb4d74f26240a9958b8c2c878d96f63abd7e3bd4bc45701_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:7a42304116f9de96f650c7e043e6fef1e1f9f3f1f7ab5e2a1f526f029ee09687_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:6f72f5426d0b89a62d1b2eed16f24fea26c10679e4bba84c0d09be62f2cc431a_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:cb7357204e774de5dc272c68dc3bd4d278920ffba34b2f8b3d34bc983ea7e540_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:d0b708f897e947ccf9ae660ae05056d505e2b5540bc4923e8956f28e9a0dcd99_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:eaa164bccdd1f4d448dc37f30368ddab836db1e6e468e10b6a6be2f2b1b005f3_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:3a54cb8f7241741caafd707e8a14775bf6287aac904b43833d7d8560a2fd0ec3_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:b61931ce733c5ee4d57dd5eb8b451f840e3e59b02c9eca77b45126251395bd05_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:e81a090a71097aea050110ccb9274b620e8f940b3cf01e42acb7643ba9763299_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:f75638184953eaa8d4d3bed00bb837494149cd49d8727efc9199534935f31d35_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:0f0732b821aef3e50d2e08478b4cc4b2fdfefe23b65089688a7b94df1be80db3_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1526ad121ffa743a84e1241c260be0f64bb0a8bbc49d6614e17931c8598a03ea_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:4cd9f6c9ea668bf0227197b9e551d237b38b413b80d56b8fa62a05e54540e44d_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:f9eeff1b49c1e3814ebe2e3298bf52eca7b7ac487d5b8ddd31f0c6c6a65fc899_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "urllib3: urllib3: Unbounded decompression chain leads to resource exhaustion"
}
]
}
RHSA-2026:0414
Vulnerability from csaf_redhat - Published: 2026-01-08 22:34 - Updated: 2026-01-14 20:31Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "A Subscription Management tool for finding and reporting Red Hat product usage",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat Discovery, also known as Discovery, is an inspection and reporting tool that finds,\nidentifies, and reports environment data, or facts, such as the number of physical and virtual\nsystems on a network, their operating systems, and relevant configuration data stored within\nthem. Discovery also identifies and reports more detailed facts for some versions of key\nRed Hat packages and products that it finds in the network.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:0414",
"url": "https://access.redhat.com/errata/RHSA-2026:0414"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2024-5642",
"url": "https://access.redhat.com/security/cve/CVE-2024-5642"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-12816",
"url": "https://access.redhat.com/security/cve/CVE-2025-12816"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-15284",
"url": "https://access.redhat.com/security/cve/CVE-2025-15284"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-45582",
"url": "https://access.redhat.com/security/cve/CVE-2025-45582"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-4598",
"url": "https://access.redhat.com/security/cve/CVE-2025-4598"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-59375",
"url": "https://access.redhat.com/security/cve/CVE-2025-59375"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-59682",
"url": "https://access.redhat.com/security/cve/CVE-2025-59682"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-6069",
"url": "https://access.redhat.com/security/cve/CVE-2025-6069"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-6075",
"url": "https://access.redhat.com/security/cve/CVE-2025-6075"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61984",
"url": "https://access.redhat.com/security/cve/CVE-2025-61984"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61985",
"url": "https://access.redhat.com/security/cve/CVE-2025-61985"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-64460",
"url": "https://access.redhat.com/security/cve/CVE-2025-64460"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-64720",
"url": "https://access.redhat.com/security/cve/CVE-2025-64720"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-64756",
"url": "https://access.redhat.com/security/cve/CVE-2025-64756"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-65018",
"url": "https://access.redhat.com/security/cve/CVE-2025-65018"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-66031",
"url": "https://access.redhat.com/security/cve/CVE-2025-66031"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-66293",
"url": "https://access.redhat.com/security/cve/CVE-2025-66293"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-66418",
"url": "https://access.redhat.com/security/cve/CVE-2025-66418"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-8291",
"url": "https://access.redhat.com/security/cve/CVE-2025-8291"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-9714",
"url": "https://access.redhat.com/security/cve/CVE-2025-9714"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/subscription_central/1-latest/#Discovery",
"url": "https://docs.redhat.com/en/documentation/subscription_central/1-latest/#Discovery"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_0414.json"
}
],
"title": "Red Hat Security Advisory: A Subscription Management tool for finding and reporting Red Hat product usage",
"tracking": {
"current_release_date": "2026-01-14T20:31:46+00:00",
"generator": {
"date": "2026-01-14T20:31:46+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.15"
}
},
"id": "RHSA-2026:0414",
"initial_release_date": "2026-01-08T22:34:17+00:00",
"revision_history": [
{
"date": "2026-01-08T22:34:17+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-01-08T22:34:21+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-01-14T20:31:46+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Discovery 2",
"product": {
"name": "Red Hat Discovery 2",
"product_id": "Red Hat Discovery 2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:discovery:2::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat Discovery"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"product": {
"name": "registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"product_id": "registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"product_identification_helper": {
"purl": "pkg:oci/discovery-server-rhel9@sha256%3Ad4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf?arch=amd64\u0026repository_url=registry.redhat.io/discovery\u0026tag=1767888970"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"product": {
"name": "registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"product_id": "registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"product_identification_helper": {
"purl": "pkg:oci/discovery-ui-rhel9@sha256%3A899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee?arch=amd64\u0026repository_url=registry.redhat.io/discovery\u0026tag=1767904573"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"product": {
"name": "registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"product_id": "registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"product_identification_helper": {
"purl": "pkg:oci/discovery-server-rhel9@sha256%3A75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543?arch=arm64\u0026repository_url=registry.redhat.io/discovery\u0026tag=1767888970"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64",
"product": {
"name": "registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64",
"product_id": "registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64",
"product_identification_helper": {
"purl": "pkg:oci/discovery-ui-rhel9@sha256%3A8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e?arch=arm64\u0026repository_url=registry.redhat.io/discovery\u0026tag=1767904573"
}
}
}
],
"category": "architecture",
"name": "arm64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64 as a component of Red Hat Discovery 2",
"product_id": "Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64"
},
"product_reference": "registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"relates_to_product_reference": "Red Hat Discovery 2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64 as a component of Red Hat Discovery 2",
"product_id": "Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64"
},
"product_reference": "registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"relates_to_product_reference": "Red Hat Discovery 2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64 as a component of Red Hat Discovery 2",
"product_id": "Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64"
},
"product_reference": "registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"relates_to_product_reference": "Red Hat Discovery 2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64 as a component of Red Hat Discovery 2",
"product_id": "Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
},
"product_reference": "registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64",
"relates_to_product_reference": "Red Hat Discovery 2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-5642",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2024-06-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2294682"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in Python/CPython that does not disallow configuring an empty list (\"[]\") for SSLContext.set_npn_protocols(), which is an invalid value for the underlying OpenSSL API. This issue results in a buffer over-read when NPN is used. See CVE -2024-5535 for OpenSSL for more information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "python: Invalid value for OpenSSL API may cause Buffer over-read when NPN is used",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated with a Low severity due to NPN not being widely used and specifying an empty list is likely uncommon in practice. Typically, a protocol name would be configured.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-5642"
},
{
"category": "external",
"summary": "RHBZ#2294682",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2294682"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-5642",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5642"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-5642",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-5642"
},
{
"category": "external",
"summary": "https://mail.python.org/archives/list/security-announce@python.org/thread/PLP2JI3PJY33YG6P5BZYSSNU66HASXBQ/",
"url": "https://mail.python.org/archives/list/security-announce@python.org/thread/PLP2JI3PJY33YG6P5BZYSSNU66HASXBQ/"
}
],
"release_date": "2024-06-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-08T22:34:17+00:00",
"details": "The containers required to run Discovery can be installed through discovery-installer\nRPM. See the official documentation for more details.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:0414"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 2.7,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "python: Invalid value for OpenSSL API may cause Buffer over-read when NPN is used"
},
{
"cve": "CVE-2025-4598",
"cwe": {
"id": "CWE-364",
"name": "Signal Handler Race Condition"
},
"discovery_date": "2025-05-29T19:04:54.578000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2369242"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in systemd-coredump. This flaw allows an attacker to force a SUID process to crash and replace it with a non-SUID binary to access the original\u0027s privileged process coredump, allowing the attacker to read sensitive data, such as /etc/shadow content, loaded by the original process.\n\nA SUID binary or process has a special type of permission, which allows the process to run with the file owner\u0027s permissions, regardless of the user executing the binary. This allows the process to access more restricted data than unprivileged users or processes would be able to. An attacker can leverage this flaw by forcing a SUID process to crash and force the Linux kernel to recycle the process PID before systemd-coredump can analyze the /proc/pid/auxv file. If the attacker wins the race condition, they gain access to the original\u0027s SUID process coredump file. They can read sensitive content loaded into memory by the original binary, affecting data confidentiality.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "systemd-coredump: race condition that allows a local attacker to crash a SUID program and gain read access to the resulting core dump",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw was rated as having a severity of Moderate due to the complexity to exploit this flaw. The attacker needs to setup a way to win the race condition and have an unprivileged local account to successfully exploit this vulnerability.\n\nBy default Red Hat Enterprise Linux 8 doesn\u0027t allow systemd-coredump to create dumps of SUID programs as the /proc/sys/fs/suid_dumpable is set to 0, disabling by default this capability.\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-364: Signal Handler Race Condition vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nRed Hat enforces least functionality by enabling only essential features, services, and ports to reduce the system\u2019s attack surface. Static code analysis, peer reviews, and strong input validation detect unsafe input that could influence execution timing or path resolution. Real-time threat detection, including IPS/IDS, antimalware, and continuous monitoring, supports rapid identification of exploitation attempts. Process isolation and Kubernetes orchestration minimize the risk of concurrent execution conflicts and contain potential impacts. Executable search paths are limited to trusted, explicitly defined directories, reducing the risk of executing malicious files. Additionally, signal handling is implemented using secure development practices that mitigate asynchronous execution risks, and workloads run in environments that abstract direct signal management.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-4598"
},
{
"category": "external",
"summary": "RHBZ#2369242",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2369242"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-4598",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4598"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-4598",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-4598"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2025/05/29/3",
"url": "https://www.openwall.com/lists/oss-security/2025/05/29/3"
}
],
"release_date": "2025-05-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-08T22:34:17+00:00",
"details": "The containers required to run Discovery can be installed through discovery-installer\nRPM. See the official documentation for more details.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:0414"
},
{
"category": "workaround",
"details": "This issue can be mitigated by disabling the capability of the system to generate a coredump for SUID binaries. The perform that, the following command can be ran as `root` user:\n\n~~~\necho 0 \u003e /proc/sys/fs/suid_dumpable\n~~~\n\nWhile this mitigates this vulnerability while it\u0027s not possible to update the systemd package, it disables the capability of analyzing crashes for such binaries.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "systemd-coredump: race condition that allows a local attacker to crash a SUID program and gain read access to the resulting core dump"
},
{
"cve": "CVE-2025-6069",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"discovery_date": "2025-06-17T14:00:45.339399+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2373234"
}
],
"notes": [
{
"category": "description",
"text": "A denial-of-service (DoS) vulnerability has been discovered in Python\u0027s html.parser.HTMLParser class. When processing specially malformed HTML input, the parsing runtime can become quadratic with respect to the input size. This significantly increased processing time can lead to excessive resource consumption, ultimately causing a denial-of-service condition in applications that rely on this parser.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "cpython: Python HTMLParser quadratic complexity",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successful exploitation of a CWE-1333: Inefficient Regular Expression Complexity and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nBaseline configurations enforce secure coding practices that restrict the use of inefficient or vulnerable regular expression patterns known to cause excessive backtracking or resource consumption. Input validation routines sanitize and constrain user input before it is evaluated by regular expressions, reducing the risk of triggering regex-related performance issues. Real-time system monitoring detects abnormal CPU usage or request latency indicative of inefficient regex execution, enabling timely investigation and response.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-6069"
},
{
"category": "external",
"summary": "RHBZ#2373234",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373234"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-6069",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6069"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/commit/4455cbabf991e202185a25a631af206f60bbc949",
"url": "https://github.com/python/cpython/commit/4455cbabf991e202185a25a631af206f60bbc949"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/commit/6eb6c5dbfb528bd07d77b60fd71fd05d81d45c41",
"url": "https://github.com/python/cpython/commit/6eb6c5dbfb528bd07d77b60fd71fd05d81d45c41"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/commit/d851f8e258c7328814943e923a7df81bca15df4b",
"url": "https://github.com/python/cpython/commit/d851f8e258c7328814943e923a7df81bca15df4b"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/issues/135462",
"url": "https://github.com/python/cpython/issues/135462"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/pull/135464",
"url": "https://github.com/python/cpython/pull/135464"
}
],
"release_date": "2025-06-17T13:39:46.058000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-08T22:34:17+00:00",
"details": "The containers required to run Discovery can be installed through discovery-installer\nRPM. See the official documentation for more details.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:0414"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "cpython: Python HTMLParser quadratic complexity"
},
{
"cve": "CVE-2025-6075",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2025-10-31T17:01:47.052517+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2408891"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability in Python\u2019s os.path.expandvars() function that can cause performance degradation. When processing specially crafted, user-controlled input with nested environment variable patterns, the function exhibits quadratic time complexity, potentially leading to excessive CPU usage and denial of service (DoS) conditions. No code execution or data exposure occurs, so the impact is limited to performance slowdown.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "python: Quadratic complexity in os.path.expandvars() with user-controlled template",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Low rather than Moderate because it only causes a performance inefficiency without affecting code execution, data integrity, or confidentiality. The flaw lies in the algorithmic complexity of os.path.expandvars(), which can become quadratic when processing crafted input containing repetitive or nested environment variable references. Exploitation requires the attacker to control the input string passed to this function, which is uncommon in secure applications. Moreover, the impact is limited to increased CPU utilization and potential slowdown, not system compromise or data manipulation. Since the issue does not introduce memory corruption, privilege escalation, or information disclosure risks, its overall impact scope and exploitability are minimal, justifying a Low severity rating.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-6075"
},
{
"category": "external",
"summary": "RHBZ#2408891",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2408891"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-6075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6075"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-6075",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6075"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/issues/136065",
"url": "https://github.com/python/cpython/issues/136065"
},
{
"category": "external",
"summary": "https://mail.python.org/archives/list/security-announce@python.org/thread/IUP5QJ6D4KK6ULHOMPC7DPNKRYQTQNLA/",
"url": "https://mail.python.org/archives/list/security-announce@python.org/thread/IUP5QJ6D4KK6ULHOMPC7DPNKRYQTQNLA/"
}
],
"release_date": "2025-10-31T16:41:34.983000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-08T22:34:17+00:00",
"details": "The containers required to run Discovery can be installed through discovery-installer\nRPM. See the official documentation for more details.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:0414"
},
{
"category": "workaround",
"details": "No mitigation is currently available that meets Red Hat Product Security\u2019s standards for usability, deployment, applicability, or stability.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 4.0,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "python: Quadratic complexity in os.path.expandvars() with user-controlled template"
},
{
"cve": "CVE-2025-8291",
"cwe": {
"id": "CWE-130",
"name": "Improper Handling of Length Parameter Inconsistency"
},
"discovery_date": "2025-10-07T19:01:23.599055+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2402342"
}
],
"notes": [
{
"category": "description",
"text": "The \u0027zipfile\u0027 module would not check the validity of the ZIP64 End of\nCentral Directory (EOCD) Locator record offset value would not be used to\nlocate the ZIP64 EOCD record, instead the ZIP64 EOCD record would be\nassumed to be the previous record in the ZIP archive. This could be abused\nto create ZIP archives that are handled differently by the \u0027zipfile\u0027 module\ncompared to other ZIP implementations.\n\n\nRemediation maintains this behavior, but checks that the offset specified\nin the ZIP64 EOCD Locator record matches the expected value.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "cpython: python: Python zipfile End of Central Directory (EOCD) Locator record offset not checked",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successful exploitation of a CWE-130: Improper Handling of Length Parameter Inconsistency and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nInput validation ensures length parameters align with actual buffer or data structure sizes, preventing truncation, overflow, and memory corruption. Secure development practices, such as static code analysis and peer reviews, detect improper length handling early and enforce consistency between declared and actual sizes. At runtime, process isolation contains memory anomalies within the originating context, preventing system-wide impact. Real-time monitoring detects crashes, segmentation faults, or buffer misuse, enabling prompt investigation and remediation.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-8291"
},
{
"category": "external",
"summary": "RHBZ#2402342",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402342"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-8291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8291"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-8291",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8291"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/commit/162997bb70e067668c039700141770687bc8f267",
"url": "https://github.com/python/cpython/commit/162997bb70e067668c039700141770687bc8f267"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/commit/333d4a6f4967d3ace91492a39ededbcf3faa76a6",
"url": "https://github.com/python/cpython/commit/333d4a6f4967d3ace91492a39ededbcf3faa76a6"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/issues/139700",
"url": "https://github.com/python/cpython/issues/139700"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/pull/139702",
"url": "https://github.com/python/cpython/pull/139702"
},
{
"category": "external",
"summary": "https://mail.python.org/archives/list/security-announce@python.org/thread/QECOPWMTH4VPPJAXAH2BGTA4XADOP62G/",
"url": "https://mail.python.org/archives/list/security-announce@python.org/thread/QECOPWMTH4VPPJAXAH2BGTA4XADOP62G/"
}
],
"release_date": "2025-10-07T18:10:05.908000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-08T22:34:17+00:00",
"details": "The containers required to run Discovery can be installed through discovery-installer\nRPM. See the official documentation for more details.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:0414"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "cpython: python: Python zipfile End of Central Directory (EOCD) Locator record offset not checked"
},
{
"cve": "CVE-2025-9714",
"cwe": {
"id": "CWE-606",
"name": "Unchecked Input for Loop Condition"
},
"discovery_date": "2025-09-02T13:03:56.452000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2392605"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in libxstl/libxml2. The \u0027exsltDynMapFunction\u0027 function in libexslt/dynamic.c does not contain a recursion depth check, which may cause an infinite loop via a specially crafted XSLT document while handling \u0027dyn:map()\u0027, leading to stack exhaustion and a local denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxslt: libxml2: Inifinite recursion at exsltDynMapFunction function in libexslt/dynamic.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "No evidence was found for arbitrary memory corruption through this flaw, limiting its impact to Availability only, and reducing its severity to Moderate.\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-606: Unchecked Input for Loop Condition vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nInput validation controls are in place, which ensure that any input controlling loop behavior is validated against strict criteria like type, length, and range before being processed. This prevents malicious or abnormal inputs from causing excessive or infinite iterations, thereby avoiding logic errors or system overloads. Memory protection controls such as Data Execution Prevention (DEP) and Address Space Layout Randomization (ASLR) protect the system\u2019s memory from overuse or corruption if an unchecked input were to cause a loop to execute excessively. It ensures that memory is safely allocated and accessed, reducing the risks of buffer overflows, resource exhaustion, or crashes. Lastly, the implementation of security engineering principles dictates the use of secure coding practices, such as input validation, loop iteration limits, and error handling, are integrated during system design and development.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-9714"
},
{
"category": "external",
"summary": "RHBZ#2392605",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2392605"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-9714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9714"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-9714",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-9714"
},
{
"category": "external",
"summary": "https://gitlab.gnome.org/GNOME/libxml2/-/commit/677a42645ef22b5a50741bad5facf9d8a8bc6d21",
"url": "https://gitlab.gnome.org/GNOME/libxml2/-/commit/677a42645ef22b5a50741bad5facf9d8a8bc6d21"
},
{
"category": "external",
"summary": "https://gitlab.gnome.org/GNOME/libxslt/-/issues/148",
"url": "https://gitlab.gnome.org/GNOME/libxslt/-/issues/148"
}
],
"release_date": "2025-09-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-08T22:34:17+00:00",
"details": "The containers required to run Discovery can be installed through discovery-installer\nRPM. See the official documentation for more details.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:0414"
},
{
"category": "workaround",
"details": "The impact of this flaw may be reduced by setting strict resource limits to the stack size of processes at the operational system level. This can be achieved either through the \u0027ulimit\u0027 shell built-in or the \u0027limits.conf\u0027 file.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "libxslt: libxml2: Inifinite recursion at exsltDynMapFunction function in libexslt/dynamic.c"
},
{
"cve": "CVE-2025-12816",
"cwe": {
"id": "CWE-179",
"name": "Incorrect Behavior Order: Early Validation"
},
"discovery_date": "2025-11-25T20:01:05.875196+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2417097"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in node-forge. This vulnerability allows unauthenticated attackers to bypass downstream cryptographic verifications and security decisions via crafting ASN.1 (Abstract Syntax Notation One) structures to desynchronize schema validations, yielding a semantic divergence.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "node-forge: node-forge: Interpretation conflict vulnerability allows bypassing cryptographic verifications",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat products due to an interpretation conflict in the node-forge library. An unauthenticated attacker could exploit this flaw by crafting malicious ASN.1 structures, leading to a bypass of cryptographic verifications and security decisions in affected applications. This impacts various Red Hat products that utilize node-forge for cryptographic operations.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
],
"known_not_affected": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-12816"
},
{
"category": "external",
"summary": "RHBZ#2417097",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2417097"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-12816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12816"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-12816",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-12816"
},
{
"category": "external",
"summary": "https://github.com/digitalbazaar/forge",
"url": "https://github.com/digitalbazaar/forge"
},
{
"category": "external",
"summary": "https://github.com/digitalbazaar/forge/pull/1124",
"url": "https://github.com/digitalbazaar/forge/pull/1124"
},
{
"category": "external",
"summary": "https://github.com/digitalbazaar/forge/security/advisories/GHSA-5gfm-wpxj-wjgq",
"url": "https://github.com/digitalbazaar/forge/security/advisories/GHSA-5gfm-wpxj-wjgq"
},
{
"category": "external",
"summary": "https://kb.cert.org/vuls/id/521113",
"url": "https://kb.cert.org/vuls/id/521113"
},
{
"category": "external",
"summary": "https://www.npmjs.com/package/node-forge",
"url": "https://www.npmjs.com/package/node-forge"
}
],
"release_date": "2025-11-25T19:15:50.243000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-08T22:34:17+00:00",
"details": "The containers required to run Discovery can be installed through discovery-installer\nRPM. See the official documentation for more details.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:0414"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "node-forge: node-forge: Interpretation conflict vulnerability allows bypassing cryptographic verifications"
},
{
"cve": "CVE-2025-15284",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2025-12-29T23:00:58.541337+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2425946"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in qs, a module used for parsing query strings. A remote attacker can exploit an improper input validation vulnerability by sending specially crafted HTTP requests that use bracket notation (e.g., `a[]=value`). This bypasses the `arrayLimit` option, which is designed to limit the size of parsed arrays and prevent resource exhaustion. Successful exploitation can lead to memory exhaustion, causing a Denial of Service (DoS) where the application crashes or becomes unresponsive, making the service unavailable to users.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "qs: qs: Denial of Service via improper input validation in array parsing",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat products that utilize the `qs` module for parsing query strings, particularly when processing user-controlled input with bracket notation. The `arrayLimit` option, intended to prevent resource exhaustion, is bypassed when bracket notation (`a[]=value`) is used, allowing a remote attacker to cause a denial of service through memory exhaustion. This can lead to application crashes or unresponsiveness, making the service unavailable.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
],
"known_not_affected": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-15284"
},
{
"category": "external",
"summary": "RHBZ#2425946",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2425946"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-15284",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15284"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-15284",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-15284"
},
{
"category": "external",
"summary": "https://github.com/ljharb/qs/commit/3086902ecf7f088d0d1803887643ac6c03d415b9",
"url": "https://github.com/ljharb/qs/commit/3086902ecf7f088d0d1803887643ac6c03d415b9"
},
{
"category": "external",
"summary": "https://github.com/ljharb/qs/security/advisories/GHSA-6rw7-vpxm-498p",
"url": "https://github.com/ljharb/qs/security/advisories/GHSA-6rw7-vpxm-498p"
}
],
"release_date": "2025-12-29T22:56:45.240000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-08T22:34:17+00:00",
"details": "The containers required to run Discovery can be installed through discovery-installer\nRPM. See the official documentation for more details.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:0414"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "qs: qs: Denial of Service via improper input validation in array parsing"
},
{
"cve": "CVE-2025-45582",
"cwe": {
"id": "CWE-24",
"name": "Path Traversal: \u0027../filedir\u0027"
},
"discovery_date": "2025-07-11T17:00:47.340822+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2379592"
}
],
"notes": [
{
"category": "description",
"text": "A relative path traversal flaw was found in the gnu tar utility. When archives with relative paths are extracted without the \u2018--keep-old-files\u2019 (\u2018-k\u2019), the extraction process may overwrite existing files that the current user has access to. The server may be impacted if these files are critical to the operation of some service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tar: Tar path traversal",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successful exploitation of a CWE-24: Path Traversal: \u0027../filedir\u0027 and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nBaseline configurations enforce strict privilege levels for code execution, allowing only authorized processes to access or modify files within approved directories. Input validation sanitizes and verifies user-supplied file paths against defined patterns, blocking traversal sequences that could enable unauthorized access outside designated locations. Configuration settings further restrict directory and file system access, ensuring applications operate within approved resources and execution boundaries.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-45582"
},
{
"category": "external",
"summary": "RHBZ#2379592",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2379592"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-45582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45582"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-45582",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-45582"
},
{
"category": "external",
"summary": "https://github.com/i900008/vulndb/blob/main/Gnu_tar_vuln.md",
"url": "https://github.com/i900008/vulndb/blob/main/Gnu_tar_vuln.md"
},
{
"category": "external",
"summary": "https://www.gnu.org/software/tar/",
"url": "https://www.gnu.org/software/tar/"
},
{
"category": "external",
"summary": "https://www.gnu.org/software/tar/manual/html_node/Integrity.html#Integrity",
"url": "https://www.gnu.org/software/tar/manual/html_node/Integrity.html#Integrity"
}
],
"release_date": "2025-07-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-08T22:34:17+00:00",
"details": "The containers required to run Discovery can be installed through discovery-installer\nRPM. See the official documentation for more details.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:0414"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "tar: Tar path traversal"
},
{
"cve": "CVE-2025-59375",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2025-09-15T03:00:59.775098+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2395108"
}
],
"notes": [
{
"category": "description",
"text": "A memory amplification vulnerability in libexpat allows attackers to trigger excessive dynamic memory allocations by submitting specially crafted XML input. A small input (~250 KiB) can cause the parser to allocate hundreds of megabytes, leading to denial-of-service (DoS) through memory exhaustion.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "expat: libexpat in Expat allows attackers to trigger large dynamic memory allocations via a small document that is submitted for parsing",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is Important rather than Critical because, while it allows for significant resource exhaustion leading to denial-of-service (DoS), it does not enable arbitrary code execution, data leakage, or privilege escalation. The vulnerability stems from an uncontrolled memory amplification behavior in libexpat\u2019s parser, where a relatively small XML payload can cause disproportionately large heap allocations. However, the flaw is limited in scope to service disruption and requires the attacker to submit a crafted XML document\u2014something that can be mitigated with proper input validation and memory usage limits. Therefore, while the exploitability is high, the impact is confined to availability, not confidentiality or integrity, making it a high-severity but not critical flaw.\n\nIn Firefox and Thunderbird, where libexpat is a transitive userspace dependency, exploitation usually just crashes the application (app-level DoS), so it is classify as Moderate instead of Important.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-59375"
},
{
"category": "external",
"summary": "RHBZ#2395108",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395108"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-59375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59375"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-59375",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-59375"
},
{
"category": "external",
"summary": "https://github.com/libexpat/libexpat/blob/676a4c531ec768732fac215da9730b5f50fbd2bf/expat/Changes#L45-L74",
"url": "https://github.com/libexpat/libexpat/blob/676a4c531ec768732fac215da9730b5f50fbd2bf/expat/Changes#L45-L74"
},
{
"category": "external",
"summary": "https://github.com/libexpat/libexpat/issues/1018",
"url": "https://github.com/libexpat/libexpat/issues/1018"
},
{
"category": "external",
"summary": "https://github.com/libexpat/libexpat/pull/1034",
"url": "https://github.com/libexpat/libexpat/pull/1034"
},
{
"category": "external",
"summary": "https://issues.oss-fuzz.com/issues/439133977",
"url": "https://issues.oss-fuzz.com/issues/439133977"
}
],
"release_date": "2025-09-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-08T22:34:17+00:00",
"details": "The containers required to run Discovery can be installed through discovery-installer\nRPM. See the official documentation for more details.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:0414"
},
{
"category": "workaround",
"details": "To mitigate the issue, limit XML input size and complexity before parsing, and avoid accepting compressed or deeply nested XML. Use OS-level resource controls (like ulimit or setrlimit()) to cap memory usage, or run the parser in a sandboxed or isolated process with strict memory and CPU limits. This helps prevent denial-of-service by containing excessive resource consumption.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "expat: libexpat in Expat allows attackers to trigger large dynamic memory allocations via a small document that is submitted for parsing"
},
{
"cve": "CVE-2025-59682",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2025-09-30T13:18:31.746000+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2400450"
}
],
"notes": [
{
"category": "description",
"text": "An issue was discovered in Django 4.2 before 4.2.25, 5.1 before 5.1.13, and 5.2 before 5.2.7. The django.utils.archive.extract() function, used by the \"startapp --template\" and \"startproject --template\" commands, allows partial directory traversal via an archive with file paths sharing a common prefix with the target directory.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "django: Potential partial directory-traversal via archive.extract()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64"
],
"known_not_affected": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-59682"
},
{
"category": "external",
"summary": "RHBZ#2400450",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2400450"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-59682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59682"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-59682",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-59682"
}
],
"release_date": "2025-10-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-08T22:34:17+00:00",
"details": "The containers required to run Discovery can be installed through discovery-installer\nRPM. See the official documentation for more details.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:0414"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "django: Potential partial directory-traversal via archive.extract()"
},
{
"cve": "CVE-2025-61984",
"cwe": {
"id": "CWE-159",
"name": "Improper Handling of Invalid Use of Special Elements"
},
"discovery_date": "2025-10-06T19:01:13.449665+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2401960"
}
],
"notes": [
{
"category": "description",
"text": "ssh in OpenSSH before 10.1 allows control characters in usernames that originate from certain possibly untrusted sources, potentially leading to code execution when a ProxyCommand is used. The untrusted sources are the command line and %-sequence expansion of a configuration file. (A configuration file that provides a complete literal username is not categorized as an untrusted source.)",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssh: OpenSSH: Control characters in usernames can lead to code execution via ProxyCommand",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The impact is MODERATE because it is a critical component used across many Red Hat products.\nThe issue occurs only when a ProxyCommand is configured and the SSH client handles a username containing control characters from an untrusted source, such as script-generated input or expanded configuration values.\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successful exploitation of a CWE-159: Improper Handling of Invalid Use of Special Elements\n\nStrict input validation sanitizes user-supplied data to ensure special elements, such as control characters, escape sequences, or delimiters, are only allowed when explicitly required, preventing malformed inputs from disrupting control flow, parsing, or protocol logic. Secure development practices, including static code analysis and peer reviews, catch improper handling of special elements early in the lifecycle, reducing the risk of logic flaws and injection vectors. Additionally, robust error handling and process isolation contain the impact of malformed inputs to the originating context, avoiding system-wide disruption or data exposure. Real-time monitoring detects anomalous behavior stemming from improper input handling, enabling prompt investigation and response.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64"
],
"known_not_affected": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61984"
},
{
"category": "external",
"summary": "RHBZ#2401960",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2401960"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61984",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61984"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61984",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61984"
},
{
"category": "external",
"summary": "https://marc.info/?l=openssh-unix-dev\u0026m=175974522032149\u0026w=2",
"url": "https://marc.info/?l=openssh-unix-dev\u0026m=175974522032149\u0026w=2"
},
{
"category": "external",
"summary": "https://www.openssh.com/releasenotes.html#10.1p1",
"url": "https://www.openssh.com/releasenotes.html#10.1p1"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2025/10/06/1",
"url": "https://www.openwall.com/lists/oss-security/2025/10/06/1"
}
],
"release_date": "2025-10-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-08T22:34:17+00:00",
"details": "The containers required to run Discovery can be installed through discovery-installer\nRPM. See the official documentation for more details.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:0414"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "openssh: OpenSSH: Control characters in usernames can lead to code execution via ProxyCommand"
},
{
"cve": "CVE-2025-61985",
"cwe": {
"id": "CWE-158",
"name": "Improper Neutralization of Null Byte or NUL Character"
},
"discovery_date": "2025-10-06T19:01:16.841946+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2401962"
}
],
"notes": [
{
"category": "description",
"text": "ssh in OpenSSH before 10.1 allows the \u0027\\0\u0027 character in an ssh:// URI, potentially leading to code execution when a ProxyCommand is used.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssh: OpenSSH: Null character in ssh:// URI can lead to code execution via ProxyCommand",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The impact is MODERATE because it is a critical component used across many Red Hat products.\nExploiting this vulnerability would require a specific configuration where ProxyCommand is enabled and the SSH client processes an untrusted ssh:// URI containing null bytes. Under these conditions, the command parser may misinterpret the URI and execute unintended shell commands.\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successful exploitation of a CWE-158: Improper Neutralization of Null Byte or NUL Character, and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nInput validation routines rigorously sanitize user-supplied data, ensuring special elements, such as control characters, escape sequences, or delimiters, are securely handled or rejected when not explicitly required. This prevents malformed input from disrupting control flow, altering parsing logic, or introducing injection risks. Secure development practices, including static code analysis and peer reviews, detect and remediate improper handling of special elements early in the development lifecycle. Runtime safeguards such as process isolation confine the impact of unexpected input to its execution context, preventing broader system instability or data exposure. Real-time monitoring further supports timely detection and response to anomalies or parsing errors related to special element misuse.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64"
],
"known_not_affected": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61985"
},
{
"category": "external",
"summary": "RHBZ#2401962",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2401962"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61985"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61985",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61985"
},
{
"category": "external",
"summary": "https://marc.info/?l=openssh-unix-dev\u0026m=175974522032149\u0026w=2",
"url": "https://marc.info/?l=openssh-unix-dev\u0026m=175974522032149\u0026w=2"
},
{
"category": "external",
"summary": "https://www.openssh.com/releasenotes.html#10.1p1",
"url": "https://www.openssh.com/releasenotes.html#10.1p1"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2025/10/06/1",
"url": "https://www.openwall.com/lists/oss-security/2025/10/06/1"
}
],
"release_date": "2025-10-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-08T22:34:17+00:00",
"details": "The containers required to run Discovery can be installed through discovery-installer\nRPM. See the official documentation for more details.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:0414"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "openssh: OpenSSH: Null character in ssh:// URI can lead to code execution via ProxyCommand"
},
{
"cve": "CVE-2025-64460",
"cwe": {
"id": "CWE-407",
"name": "Inefficient Algorithmic Complexity"
},
"discovery_date": "2025-12-02T16:01:05.300335+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418366"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Django. This vulnerability allows a remote attacker to cause a potential denial-of-service (DoS) attack triggering Central Processing Unit (CPU) and memory exhaustion via specially crafted Extensible Markup Language (XML) input processed by the XML Deserializer.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Django: Django: Algorithmic complexity in XML Deserializer leads to denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat products that process XML input using Django\u0027s XML Deserializer, including Red Hat Ansible Automation Platform, Red Hat OpenStack Platform, and OpenShift Service Mesh. A remote attacker can exploit this flaw by providing specially crafted XML, leading to a denial-of-service due to CPU and memory exhaustion.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64"
],
"known_not_affected": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-64460"
},
{
"category": "external",
"summary": "RHBZ#2418366",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418366"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-64460",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64460"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-64460",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-64460"
},
{
"category": "external",
"summary": "https://docs.djangoproject.com/en/dev/releases/security/",
"url": "https://docs.djangoproject.com/en/dev/releases/security/"
},
{
"category": "external",
"summary": "https://groups.google.com/g/django-announce",
"url": "https://groups.google.com/g/django-announce"
},
{
"category": "external",
"summary": "https://www.djangoproject.com/weblog/2025/dec/02/security-releases/",
"url": "https://www.djangoproject.com/weblog/2025/dec/02/security-releases/"
}
],
"release_date": "2025-12-02T15:15:34.451000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-08T22:34:17+00:00",
"details": "The containers required to run Discovery can be installed through discovery-installer\nRPM. See the official documentation for more details.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:0414"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Django: Django: Algorithmic complexity in XML Deserializer leads to denial of service"
},
{
"cve": "CVE-2025-64720",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2025-11-25T00:00:54.081073+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2416904"
}
],
"notes": [
{
"category": "description",
"text": "LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From version 1.6.0 to before 1.6.51, an out-of-bounds read vulnerability exists in png_image_read_composite when processing palette images with PNG_FLAG_OPTIMIZE_ALPHA enabled. The palette compositing code in png_init_read_transformations incorrectly applies background compositing during premultiplication, violating the invariant component \u2264 alpha \u00d7 257 required by the simplified PNG API. This issue has been patched in version 1.6.51.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libpng: LIBPNG buffer overflow",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat products. An out-of-bounds read in libpng can occur when processing specially crafted palette images with `PNG_FLAG_OPTIMIZE_ALPHA` enabled. Successful exploitation requires a user to process a malicious PNG file, leading to potential application crash or information disclosure.\n\njava-*-openjdk-headless packages do not contain libsplashscreen.so, hence are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
],
"known_not_affected": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-64720"
},
{
"category": "external",
"summary": "RHBZ#2416904",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416904"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-64720",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64720"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-64720",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-64720"
},
{
"category": "external",
"summary": "https://github.com/pnggroup/libpng/commit/08da33b4c88cfcd36e5a706558a8d7e0e4773643",
"url": "https://github.com/pnggroup/libpng/commit/08da33b4c88cfcd36e5a706558a8d7e0e4773643"
},
{
"category": "external",
"summary": "https://github.com/pnggroup/libpng/issues/686",
"url": "https://github.com/pnggroup/libpng/issues/686"
},
{
"category": "external",
"summary": "https://github.com/pnggroup/libpng/pull/751",
"url": "https://github.com/pnggroup/libpng/pull/751"
},
{
"category": "external",
"summary": "https://github.com/pnggroup/libpng/security/advisories/GHSA-hfc7-ph9c-wcww",
"url": "https://github.com/pnggroup/libpng/security/advisories/GHSA-hfc7-ph9c-wcww"
}
],
"release_date": "2025-11-24T23:45:38.315000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-08T22:34:17+00:00",
"details": "The containers required to run Discovery can be installed through discovery-installer\nRPM. See the official documentation for more details.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:0414"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "libpng: LIBPNG buffer overflow"
},
{
"cve": "CVE-2025-64756",
"cwe": {
"id": "CWE-78",
"name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
},
"discovery_date": "2025-11-17T18:01:28.077927+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2415451"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in glob. This vulnerability allows arbitrary command execution via processing files with malicious names when the glob command-line interface (CLI) is used with the -c/--cmd option, enabling shell metacharacters to trigger command injection.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "glob: glob: Command Injection Vulnerability via Malicious Filenames",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw in glob allows arbitrary command execution when the `glob` command-line interface is used with the `-c/--cmd` option to process files with malicious names. The vulnerability is triggered by shell metacharacters in filenames, leading to command injection. The glob CLI tool utilizes the -c option to execute shell commands over the files which matched the searched pattern by using the shell:true parameter when creating the subprocess which will further execute the command informed via \u0027-c\u0027 option, this parameter allows the shell meta characters to be used and processed when executing the command. Given that information glob misses to sanitize the file name to eliminate such characters and expressions from the filename, leading to code execution as when performing the shell expansion such characters will be interpreted as shell commands.\n\nTo exploit this vulnerability the targeted system should run the glob CLI over a file with a maliciously crafted filename, additionally the attacker needs to have enough permission to create such file or trick the user to download and process the required file with the glob CLI.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
],
"known_not_affected": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-64756"
},
{
"category": "external",
"summary": "RHBZ#2415451",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2415451"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-64756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64756"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-64756",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-64756"
},
{
"category": "external",
"summary": "https://github.com/isaacs/node-glob/commit/47473c046b91c67269df7a66eab782a6c2716146",
"url": "https://github.com/isaacs/node-glob/commit/47473c046b91c67269df7a66eab782a6c2716146"
},
{
"category": "external",
"summary": "https://github.com/isaacs/node-glob/security/advisories/GHSA-5j98-mcp5-4vw2",
"url": "https://github.com/isaacs/node-glob/security/advisories/GHSA-5j98-mcp5-4vw2"
}
],
"release_date": "2025-11-17T17:29:08.029000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-08T22:34:17+00:00",
"details": "The containers required to run Discovery can be installed through discovery-installer\nRPM. See the official documentation for more details.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:0414"
},
{
"category": "workaround",
"details": "To mitigate this issue, avoid using the `glob` command-line interface with the `-c` or `--cmd` option when processing filenames from untrusted sources. If programmatic use of `glob` is necessary, ensure that filenames are thoroughly sanitized before being passed to commands executed with shell interpretation enabled.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "glob: glob: Command Injection Vulnerability via Malicious Filenames"
},
{
"cve": "CVE-2025-65018",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2025-11-25T00:01:05.570152+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2416907"
}
],
"notes": [
{
"category": "description",
"text": "LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From version 1.6.0 to before 1.6.51, there is a heap buffer overflow vulnerability in the libpng simplified API function png_image_finish_read when processing 16-bit interlaced PNGs with 8-bit output format. Attacker-crafted interlaced PNG files cause heap writes beyond allocated buffer bounds. This issue has been patched in version 1.6.51.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libpng: LIBPNG heap buffer overflow",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat products. A heap buffer overflow exists in the libpng library\u0027s png_image_finish_read function when processing specially crafted 16-bit interlaced PNG images with an 8-bit output format. Successful exploitation requires a user or an automated system to process a malicious PNG file, which could lead to application crashes or arbitrary code execution.\n\njava-*-openjdk-headless packages do not contain libsplashscreen.so, hence are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
],
"known_not_affected": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-65018"
},
{
"category": "external",
"summary": "RHBZ#2416907",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416907"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-65018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-65018"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-65018",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-65018"
},
{
"category": "external",
"summary": "https://github.com/pnggroup/libpng/commit/16b5e3823918840aae65c0a6da57c78a5a496a4d",
"url": "https://github.com/pnggroup/libpng/commit/16b5e3823918840aae65c0a6da57c78a5a496a4d"
},
{
"category": "external",
"summary": "https://github.com/pnggroup/libpng/commit/218612ddd6b17944e21eda56caf8b4bf7779d1ea",
"url": "https://github.com/pnggroup/libpng/commit/218612ddd6b17944e21eda56caf8b4bf7779d1ea"
},
{
"category": "external",
"summary": "https://github.com/pnggroup/libpng/issues/755",
"url": "https://github.com/pnggroup/libpng/issues/755"
},
{
"category": "external",
"summary": "https://github.com/pnggroup/libpng/pull/757",
"url": "https://github.com/pnggroup/libpng/pull/757"
},
{
"category": "external",
"summary": "https://github.com/pnggroup/libpng/security/advisories/GHSA-7wv6-48j4-hj3g",
"url": "https://github.com/pnggroup/libpng/security/advisories/GHSA-7wv6-48j4-hj3g"
}
],
"release_date": "2025-11-24T23:50:18.294000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-08T22:34:17+00:00",
"details": "The containers required to run Discovery can be installed through discovery-installer\nRPM. See the official documentation for more details.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:0414"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "libpng: LIBPNG heap buffer overflow"
},
{
"cve": "CVE-2025-66031",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"discovery_date": "2025-11-26T23:01:36.363253+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2417397"
}
],
"notes": [
{
"category": "description",
"text": "Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Uncontrolled Recursion vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft deep ASN.1 structures that trigger unbounded recursive parsing. This leads to a Denial-of-Service (DoS) via stack exhaustion when parsing untrusted DER inputs. This issue has been patched in version 1.3.2.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "node-forge: node-forge ASN.1 Unbounded Recursion",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
],
"known_not_affected": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-66031"
},
{
"category": "external",
"summary": "RHBZ#2417397",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2417397"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-66031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66031"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-66031",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-66031"
},
{
"category": "external",
"summary": "https://github.com/digitalbazaar/forge/commit/260425c6167a38aae038697132483b5517b26451",
"url": "https://github.com/digitalbazaar/forge/commit/260425c6167a38aae038697132483b5517b26451"
},
{
"category": "external",
"summary": "https://github.com/digitalbazaar/forge/security/advisories/GHSA-554w-wpv2-vw27",
"url": "https://github.com/digitalbazaar/forge/security/advisories/GHSA-554w-wpv2-vw27"
}
],
"release_date": "2025-11-26T22:23:26.013000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-08T22:34:17+00:00",
"details": "The containers required to run Discovery can be installed through discovery-installer\nRPM. See the official documentation for more details.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:0414"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "node-forge: node-forge ASN.1 Unbounded Recursion"
},
{
"cve": "CVE-2025-66293",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2025-12-03T21:00:59.956903+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418711"
}
],
"notes": [
{
"category": "description",
"text": "LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. Prior to 1.6.52, an out-of-bounds read vulnerability in libpng\u0027s simplified API allows reading up to 1012 bytes beyond the png_sRGB_base[512] array when processing valid palette PNG images with partial transparency and gamma correction. The PNG files that trigger this vulnerability are valid per the PNG specification; the bug is in libpng\u0027s internal state management. Upgrade to libpng 1.6.52 or later.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libpng: LIBPNG out-of-bounds read in png_image_read_composite",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat products as it affects libpng, a widely used library for processing PNG images. An out-of-bounds read can occur in libpng\u0027s simplified API when handling specially crafted PNG images with partial transparency and gamma correction. This could lead to information disclosure or application crashes in software that processes untrusted PNG files using affected versions of libpng.\n\njava-*-openjdk-headless packages do not contain libsplashscreen.so, hence are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
],
"known_not_affected": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-66293"
},
{
"category": "external",
"summary": "RHBZ#2418711",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418711"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-66293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66293"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-66293",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-66293"
},
{
"category": "external",
"summary": "https://github.com/pnggroup/libpng/commit/788a624d7387a758ffd5c7ab010f1870dea753a1",
"url": "https://github.com/pnggroup/libpng/commit/788a624d7387a758ffd5c7ab010f1870dea753a1"
},
{
"category": "external",
"summary": "https://github.com/pnggroup/libpng/commit/a05a48b756de63e3234ea6b3b938b8f5f862484a",
"url": "https://github.com/pnggroup/libpng/commit/a05a48b756de63e3234ea6b3b938b8f5f862484a"
},
{
"category": "external",
"summary": "https://github.com/pnggroup/libpng/issues/764",
"url": "https://github.com/pnggroup/libpng/issues/764"
},
{
"category": "external",
"summary": "https://github.com/pnggroup/libpng/security/advisories/GHSA-9mpm-9pxh-mg4f",
"url": "https://github.com/pnggroup/libpng/security/advisories/GHSA-9mpm-9pxh-mg4f"
}
],
"release_date": "2025-12-03T20:33:57.086000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-08T22:34:17+00:00",
"details": "The containers required to run Discovery can be installed through discovery-installer\nRPM. See the official documentation for more details.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:0414"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "libpng: LIBPNG out-of-bounds read in png_image_read_composite"
},
{
"cve": "CVE-2025-66418",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2025-12-05T17:01:20.277857+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2419455"
}
],
"notes": [
{
"category": "description",
"text": "urllib3 is a user-friendly HTTP client library for Python. Starting in version 1.24 and prior to 2.6.0, the number of links in the decompression chain was unbounded allowing a malicious server to insert a virtually unlimited number of compression steps leading to high CPU usage and massive memory allocation for the decompressed data. This vulnerability is fixed in 2.6.0.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "urllib3: urllib3: Unbounded decompression chain leads to resource exhaustion",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-66418"
},
{
"category": "external",
"summary": "RHBZ#2419455",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419455"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-66418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66418"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-66418",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-66418"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/commit/24d7b67eac89f94e11003424bcf0d8f7b72222a8",
"url": "https://github.com/urllib3/urllib3/commit/24d7b67eac89f94e11003424bcf0d8f7b72222a8"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/security/advisories/GHSA-gm62-xv2j-4w53",
"url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-gm62-xv2j-4w53"
}
],
"release_date": "2025-12-05T16:02:15.271000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-08T22:34:17+00:00",
"details": "The containers required to run Discovery can be installed through discovery-installer\nRPM. See the official documentation for more details.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:0414"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "urllib3: urllib3: Unbounded decompression chain leads to resource exhaustion"
}
]
}
MSRC_CVE-2025-66418
Vulnerability from csaf_microsoft - Published: 2025-12-02 00:00 - Updated: 2025-12-23 01:38Notes
{
"document": {
"category": "csaf_vex",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2025-66418 urllib3 allows an unbounded number of links in the decompression chain - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2025/msrc_cve-2025-66418.json"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "urllib3 allows an unbounded number of links in the decompression chain",
"tracking": {
"current_release_date": "2025-12-23T01:38:10.000Z",
"generator": {
"date": "2025-12-23T08:38:23.410Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2025-66418",
"initial_release_date": "2025-12-02T00:00:00.000Z",
"revision_history": [
{
"date": "2025-12-10T01:02:55.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
},
{
"date": "2025-12-11T01:01:31.000Z",
"legacy_version": "2",
"number": "2",
"summary": "Information published."
},
{
"date": "2025-12-16T01:36:37.000Z",
"legacy_version": "3",
"number": "3",
"summary": "Information published."
},
{
"date": "2025-12-17T14:37:25.000Z",
"legacy_version": "4",
"number": "4",
"summary": "Information published."
},
{
"date": "2025-12-23T01:38:10.000Z",
"legacy_version": "5",
"number": "5",
"summary": "Information published."
}
],
"status": "final",
"version": "5"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "2.0",
"product": {
"name": "CBL Mariner 2.0",
"product_id": "17086"
}
},
{
"category": "product_version",
"name": "3.0",
"product": {
"name": "Azure Linux 3.0",
"product_id": "17084"
}
}
],
"category": "product_name",
"name": "Azure Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003ccbl2 python-urllib3 1.26.19-2",
"product": {
"name": "\u003ccbl2 python-urllib3 1.26.19-2",
"product_id": "2"
}
},
{
"category": "product_version",
"name": "cbl2 python-urllib3 1.26.19-2",
"product": {
"name": "cbl2 python-urllib3 1.26.19-2",
"product_id": "20389"
}
},
{
"category": "product_version_range",
"name": "\u003cazl3 python-urllib3 2.0.7-2",
"product": {
"name": "\u003cazl3 python-urllib3 2.0.7-2",
"product_id": "3"
}
},
{
"category": "product_version",
"name": "azl3 python-urllib3 2.0.7-2",
"product": {
"name": "azl3 python-urllib3 2.0.7-2",
"product_id": "19620"
}
}
],
"category": "product_name",
"name": "python-urllib3"
},
{
"category": "product_name",
"name": "cbl2 python-virtualenv 20.26.6-2",
"product": {
"name": "cbl2 python-virtualenv 20.26.6-2",
"product_id": "1"
}
},
{
"category": "product_name",
"name": "azl3 tensorflow 2.16.1-9",
"product": {
"name": "azl3 tensorflow 2.16.1-9",
"product_id": "4"
}
}
],
"category": "vendor",
"name": "Microsoft"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccbl2 python-urllib3 1.26.19-2 as a component of CBL Mariner 2.0",
"product_id": "17086-2"
},
"product_reference": "2",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 python-urllib3 1.26.19-2 as a component of CBL Mariner 2.0",
"product_id": "20389-17086"
},
"product_reference": "20389",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 python-virtualenv 20.26.6-2 as a component of CBL Mariner 2.0",
"product_id": "17086-1"
},
"product_reference": "1",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 tensorflow 2.16.1-9 as a component of Azure Linux 3.0",
"product_id": "17084-4"
},
"product_reference": "4",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 python-urllib3 2.0.7-2 as a component of Azure Linux 3.0",
"product_id": "17084-3"
},
"product_reference": "3",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 python-urllib3 2.0.7-2 as a component of Azure Linux 3.0",
"product_id": "19620-17084"
},
"product_reference": "19620",
"relates_to_product_reference": "17084"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-66418",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"flags": [
{
"label": "component_not_present",
"product_ids": [
"17084-4"
]
},
{
"label": "vulnerable_code_not_in_execute_path",
"product_ids": [
"17086-1"
]
}
],
"notes": [
{
"category": "general",
"text": "GitHub_M",
"title": "Assigning CNA"
}
],
"product_status": {
"fixed": [
"20389-17086",
"19620-17084"
],
"known_affected": [
"17086-2",
"17084-3"
],
"known_not_affected": [
"17086-1",
"17084-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-66418 urllib3 allows an unbounded number of links in the decompression chain - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2025/msrc_cve-2025-66418.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"date": "2025-12-10T01:02:55.000Z",
"details": "1.26.19-3:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17086-2"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2025-12-10T01:02:55.000Z",
"details": "2.0.7-3:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17084-3"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
}
],
"title": "urllib3 allows an unbounded number of links in the decompression chain"
}
]
}
GHSA-GM62-XV2J-4W53
Vulnerability from github – Published: 2025-12-05 18:15 – Updated: 2025-12-05 18:32Impact
urllib3 supports chained HTTP encoding algorithms for response content according to RFC 9110 (e.g., Content-Encoding: gzip, zstd).
However, the number of links in the decompression chain was unbounded allowing a malicious server to insert a virtually unlimited number of compression steps leading to high CPU usage and massive memory allocation for the decompressed data.
Affected usages
Applications and libraries using urllib3 version 2.5.0 and earlier for HTTP requests to untrusted sources unless they disable content decoding explicitly.
Remediation
Upgrade to at least urllib3 v2.6.0 in which the library limits the number of links to 5.
If upgrading is not immediately possible, use preload_content=False and ensure that resp.headers["content-encoding"] contains a safe number of encodings before reading the response content.
{
"affected": [
{
"package": {
"ecosystem": "PyPI",
"name": "urllib3"
},
"ranges": [
{
"events": [
{
"introduced": "1.24"
},
{
"fixed": "2.6.0"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2025-66418"
],
"database_specific": {
"cwe_ids": [
"CWE-770"
],
"github_reviewed": true,
"github_reviewed_at": "2025-12-05T18:15:19Z",
"nvd_published_at": "2025-12-05T16:15:51Z",
"severity": "HIGH"
},
"details": "## Impact\n\nurllib3 supports chained HTTP encoding algorithms for response content according to RFC 9110 (e.g., `Content-Encoding: gzip, zstd`).\n\nHowever, the number of links in the decompression chain was unbounded allowing a malicious server to insert a virtually unlimited number of compression steps leading to high CPU usage and massive memory allocation for the decompressed data.\n\n\n## Affected usages\n\nApplications and libraries using urllib3 version 2.5.0 and earlier for HTTP requests to untrusted sources unless they disable content decoding explicitly.\n\n\n## Remediation\n\nUpgrade to at least urllib3 v2.6.0 in which the library limits the number of links to 5.\n\nIf upgrading is not immediately possible, use [`preload_content=False`](https://urllib3.readthedocs.io/en/2.5.0/advanced-usage.html#streaming-and-i-o) and ensure that `resp.headers[\"content-encoding\"]` contains a safe number of encodings before reading the response content.",
"id": "GHSA-gm62-xv2j-4w53",
"modified": "2025-12-05T18:32:59Z",
"published": "2025-12-05T18:15:19Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-gm62-xv2j-4w53"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-66418"
},
{
"type": "WEB",
"url": "https://github.com/urllib3/urllib3/commit/24d7b67eac89f94e11003424bcf0d8f7b72222a8"
},
{
"type": "PACKAGE",
"url": "https://github.com/urllib3/urllib3"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H",
"type": "CVSS_V4"
}
],
"summary": "urllib3 allows an unbounded number of links in the decompression chain"
}
OPENSUSE-SU-2026:10026-1
Vulnerability from csaf_opensuse - Published: 2026-01-09 00:00 - Updated: 2026-01-09 00:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "python311-urllib3-2.6.2-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the python311-urllib3-2.6.2-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2026-10026",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2026_10026-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-66418 page",
"url": "https://www.suse.com/security/cve/CVE-2025-66418/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-66471 page",
"url": "https://www.suse.com/security/cve/CVE-2025-66471/"
}
],
"title": "python311-urllib3-2.6.2-1.1 on GA media",
"tracking": {
"current_release_date": "2026-01-09T00:00:00Z",
"generator": {
"date": "2026-01-09T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2026:10026-1",
"initial_release_date": "2026-01-09T00:00:00Z",
"revision_history": [
{
"date": "2026-01-09T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "python311-urllib3-2.6.2-1.1.aarch64",
"product": {
"name": "python311-urllib3-2.6.2-1.1.aarch64",
"product_id": "python311-urllib3-2.6.2-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "python312-urllib3-2.6.2-1.1.aarch64",
"product": {
"name": "python312-urllib3-2.6.2-1.1.aarch64",
"product_id": "python312-urllib3-2.6.2-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "python313-urllib3-2.6.2-1.1.aarch64",
"product": {
"name": "python313-urllib3-2.6.2-1.1.aarch64",
"product_id": "python313-urllib3-2.6.2-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "python311-urllib3-2.6.2-1.1.ppc64le",
"product": {
"name": "python311-urllib3-2.6.2-1.1.ppc64le",
"product_id": "python311-urllib3-2.6.2-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python312-urllib3-2.6.2-1.1.ppc64le",
"product": {
"name": "python312-urllib3-2.6.2-1.1.ppc64le",
"product_id": "python312-urllib3-2.6.2-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python313-urllib3-2.6.2-1.1.ppc64le",
"product": {
"name": "python313-urllib3-2.6.2-1.1.ppc64le",
"product_id": "python313-urllib3-2.6.2-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "python311-urllib3-2.6.2-1.1.s390x",
"product": {
"name": "python311-urllib3-2.6.2-1.1.s390x",
"product_id": "python311-urllib3-2.6.2-1.1.s390x"
}
},
{
"category": "product_version",
"name": "python312-urllib3-2.6.2-1.1.s390x",
"product": {
"name": "python312-urllib3-2.6.2-1.1.s390x",
"product_id": "python312-urllib3-2.6.2-1.1.s390x"
}
},
{
"category": "product_version",
"name": "python313-urllib3-2.6.2-1.1.s390x",
"product": {
"name": "python313-urllib3-2.6.2-1.1.s390x",
"product_id": "python313-urllib3-2.6.2-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "python311-urllib3-2.6.2-1.1.x86_64",
"product": {
"name": "python311-urllib3-2.6.2-1.1.x86_64",
"product_id": "python311-urllib3-2.6.2-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "python312-urllib3-2.6.2-1.1.x86_64",
"product": {
"name": "python312-urllib3-2.6.2-1.1.x86_64",
"product_id": "python312-urllib3-2.6.2-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "python313-urllib3-2.6.2-1.1.x86_64",
"product": {
"name": "python313-urllib3-2.6.2-1.1.x86_64",
"product_id": "python313-urllib3-2.6.2-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-urllib3-2.6.2-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python311-urllib3-2.6.2-1.1.aarch64"
},
"product_reference": "python311-urllib3-2.6.2-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-urllib3-2.6.2-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python311-urllib3-2.6.2-1.1.ppc64le"
},
"product_reference": "python311-urllib3-2.6.2-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-urllib3-2.6.2-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python311-urllib3-2.6.2-1.1.s390x"
},
"product_reference": "python311-urllib3-2.6.2-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-urllib3-2.6.2-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python311-urllib3-2.6.2-1.1.x86_64"
},
"product_reference": "python311-urllib3-2.6.2-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-urllib3-2.6.2-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python312-urllib3-2.6.2-1.1.aarch64"
},
"product_reference": "python312-urllib3-2.6.2-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-urllib3-2.6.2-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python312-urllib3-2.6.2-1.1.ppc64le"
},
"product_reference": "python312-urllib3-2.6.2-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-urllib3-2.6.2-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python312-urllib3-2.6.2-1.1.s390x"
},
"product_reference": "python312-urllib3-2.6.2-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-urllib3-2.6.2-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python312-urllib3-2.6.2-1.1.x86_64"
},
"product_reference": "python312-urllib3-2.6.2-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python313-urllib3-2.6.2-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python313-urllib3-2.6.2-1.1.aarch64"
},
"product_reference": "python313-urllib3-2.6.2-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python313-urllib3-2.6.2-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python313-urllib3-2.6.2-1.1.ppc64le"
},
"product_reference": "python313-urllib3-2.6.2-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python313-urllib3-2.6.2-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python313-urllib3-2.6.2-1.1.s390x"
},
"product_reference": "python313-urllib3-2.6.2-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python313-urllib3-2.6.2-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python313-urllib3-2.6.2-1.1.x86_64"
},
"product_reference": "python313-urllib3-2.6.2-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-66418",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-66418"
}
],
"notes": [
{
"category": "general",
"text": "urllib3 is a user-friendly HTTP client library for Python. Starting in version 1.24 and prior to 2.6.0, the number of links in the decompression chain was unbounded allowing a malicious server to insert a virtually unlimited number of compression steps leading to high CPU usage and massive memory allocation for the decompressed data. This vulnerability is fixed in 2.6.0.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python311-urllib3-2.6.2-1.1.aarch64",
"openSUSE Tumbleweed:python311-urllib3-2.6.2-1.1.ppc64le",
"openSUSE Tumbleweed:python311-urllib3-2.6.2-1.1.s390x",
"openSUSE Tumbleweed:python311-urllib3-2.6.2-1.1.x86_64",
"openSUSE Tumbleweed:python312-urllib3-2.6.2-1.1.aarch64",
"openSUSE Tumbleweed:python312-urllib3-2.6.2-1.1.ppc64le",
"openSUSE Tumbleweed:python312-urllib3-2.6.2-1.1.s390x",
"openSUSE Tumbleweed:python312-urllib3-2.6.2-1.1.x86_64",
"openSUSE Tumbleweed:python313-urllib3-2.6.2-1.1.aarch64",
"openSUSE Tumbleweed:python313-urllib3-2.6.2-1.1.ppc64le",
"openSUSE Tumbleweed:python313-urllib3-2.6.2-1.1.s390x",
"openSUSE Tumbleweed:python313-urllib3-2.6.2-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-66418",
"url": "https://www.suse.com/security/cve/CVE-2025-66418"
},
{
"category": "external",
"summary": "SUSE Bug 1254866 for CVE-2025-66418",
"url": "https://bugzilla.suse.com/1254866"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python311-urllib3-2.6.2-1.1.aarch64",
"openSUSE Tumbleweed:python311-urllib3-2.6.2-1.1.ppc64le",
"openSUSE Tumbleweed:python311-urllib3-2.6.2-1.1.s390x",
"openSUSE Tumbleweed:python311-urllib3-2.6.2-1.1.x86_64",
"openSUSE Tumbleweed:python312-urllib3-2.6.2-1.1.aarch64",
"openSUSE Tumbleweed:python312-urllib3-2.6.2-1.1.ppc64le",
"openSUSE Tumbleweed:python312-urllib3-2.6.2-1.1.s390x",
"openSUSE Tumbleweed:python312-urllib3-2.6.2-1.1.x86_64",
"openSUSE Tumbleweed:python313-urllib3-2.6.2-1.1.aarch64",
"openSUSE Tumbleweed:python313-urllib3-2.6.2-1.1.ppc64le",
"openSUSE Tumbleweed:python313-urllib3-2.6.2-1.1.s390x",
"openSUSE Tumbleweed:python313-urllib3-2.6.2-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python311-urllib3-2.6.2-1.1.aarch64",
"openSUSE Tumbleweed:python311-urllib3-2.6.2-1.1.ppc64le",
"openSUSE Tumbleweed:python311-urllib3-2.6.2-1.1.s390x",
"openSUSE Tumbleweed:python311-urllib3-2.6.2-1.1.x86_64",
"openSUSE Tumbleweed:python312-urllib3-2.6.2-1.1.aarch64",
"openSUSE Tumbleweed:python312-urllib3-2.6.2-1.1.ppc64le",
"openSUSE Tumbleweed:python312-urllib3-2.6.2-1.1.s390x",
"openSUSE Tumbleweed:python312-urllib3-2.6.2-1.1.x86_64",
"openSUSE Tumbleweed:python313-urllib3-2.6.2-1.1.aarch64",
"openSUSE Tumbleweed:python313-urllib3-2.6.2-1.1.ppc64le",
"openSUSE Tumbleweed:python313-urllib3-2.6.2-1.1.s390x",
"openSUSE Tumbleweed:python313-urllib3-2.6.2-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-09T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-66418"
},
{
"cve": "CVE-2025-66471",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-66471"
}
],
"notes": [
{
"category": "general",
"text": "urllib3 is a user-friendly HTTP client library for Python. Starting in version 1.0 and prior to 2.6.0, the Streaming API improperly handles highly compressed data. urllib3\u0027s streaming API is designed for the efficient handling of large HTTP responses by reading the content in chunks, rather than loading the entire response body into memory at once. When streaming a compressed response, urllib3 can perform decoding or decompression based on the HTTP Content-Encoding header (e.g., gzip, deflate, br, or zstd). The library must read compressed data from the network and decompress it until the requested chunk size is met. Any resulting decompressed data that exceeds the requested amount is held in an internal buffer for the next read operation. The decompression logic could cause urllib3 to fully decode a small amount of highly compressed data in a single operation. This can result in excessive resource consumption (high CPU usage and massive memory allocation for the decompressed data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python311-urllib3-2.6.2-1.1.aarch64",
"openSUSE Tumbleweed:python311-urllib3-2.6.2-1.1.ppc64le",
"openSUSE Tumbleweed:python311-urllib3-2.6.2-1.1.s390x",
"openSUSE Tumbleweed:python311-urllib3-2.6.2-1.1.x86_64",
"openSUSE Tumbleweed:python312-urllib3-2.6.2-1.1.aarch64",
"openSUSE Tumbleweed:python312-urllib3-2.6.2-1.1.ppc64le",
"openSUSE Tumbleweed:python312-urllib3-2.6.2-1.1.s390x",
"openSUSE Tumbleweed:python312-urllib3-2.6.2-1.1.x86_64",
"openSUSE Tumbleweed:python313-urllib3-2.6.2-1.1.aarch64",
"openSUSE Tumbleweed:python313-urllib3-2.6.2-1.1.ppc64le",
"openSUSE Tumbleweed:python313-urllib3-2.6.2-1.1.s390x",
"openSUSE Tumbleweed:python313-urllib3-2.6.2-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-66471",
"url": "https://www.suse.com/security/cve/CVE-2025-66471"
},
{
"category": "external",
"summary": "SUSE Bug 1254867 for CVE-2025-66471",
"url": "https://bugzilla.suse.com/1254867"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python311-urllib3-2.6.2-1.1.aarch64",
"openSUSE Tumbleweed:python311-urllib3-2.6.2-1.1.ppc64le",
"openSUSE Tumbleweed:python311-urllib3-2.6.2-1.1.s390x",
"openSUSE Tumbleweed:python311-urllib3-2.6.2-1.1.x86_64",
"openSUSE Tumbleweed:python312-urllib3-2.6.2-1.1.aarch64",
"openSUSE Tumbleweed:python312-urllib3-2.6.2-1.1.ppc64le",
"openSUSE Tumbleweed:python312-urllib3-2.6.2-1.1.s390x",
"openSUSE Tumbleweed:python312-urllib3-2.6.2-1.1.x86_64",
"openSUSE Tumbleweed:python313-urllib3-2.6.2-1.1.aarch64",
"openSUSE Tumbleweed:python313-urllib3-2.6.2-1.1.ppc64le",
"openSUSE Tumbleweed:python313-urllib3-2.6.2-1.1.s390x",
"openSUSE Tumbleweed:python313-urllib3-2.6.2-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python311-urllib3-2.6.2-1.1.aarch64",
"openSUSE Tumbleweed:python311-urllib3-2.6.2-1.1.ppc64le",
"openSUSE Tumbleweed:python311-urllib3-2.6.2-1.1.s390x",
"openSUSE Tumbleweed:python311-urllib3-2.6.2-1.1.x86_64",
"openSUSE Tumbleweed:python312-urllib3-2.6.2-1.1.aarch64",
"openSUSE Tumbleweed:python312-urllib3-2.6.2-1.1.ppc64le",
"openSUSE Tumbleweed:python312-urllib3-2.6.2-1.1.s390x",
"openSUSE Tumbleweed:python312-urllib3-2.6.2-1.1.x86_64",
"openSUSE Tumbleweed:python313-urllib3-2.6.2-1.1.aarch64",
"openSUSE Tumbleweed:python313-urllib3-2.6.2-1.1.ppc64le",
"openSUSE Tumbleweed:python313-urllib3-2.6.2-1.1.s390x",
"openSUSE Tumbleweed:python313-urllib3-2.6.2-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-09T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-66471"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.