RHSA-2026:10140
Vulnerability from csaf_redhat - Published: 2026-04-23 13:34 - Updated: 2026-04-23 20:25A flaw was found in Python. The `webbrowser.open()` API, used to launch web browsers, does not properly sanitize input. This allows a remote attacker to craft a malicious URL containing leading dashes. When such a URL is opened, certain web browsers may interpret these dashes as command-line options, which could lead to unexpected behavior, information disclosure, or potentially arbitrary code execution, impacting the integrity of the system.
A flaw was found in the Python webbrowser.open() API. If a specially crafted URL containing "%action" is processed, an attacker could bypass a previous mitigation for CVE-2026-4519. This bypass allows for command injection into the underlying shell, potentially leading to arbitrary code execution.
A flaw was found in Python's decompression modules, including `lzma.LZMADecompressor`, `bz2.BZ2Decompressor`, and `gzip.GzipFile`. This vulnerability, a use-after-free, can occur if a program attempts to re-use a decompression object after a memory allocation error, especially when the system is experiencing high memory usage. Exploitation of this flaw could potentially allow an attacker to execute arbitrary code or access sensitive data. The vulnerability is only present if the program re-uses decompressor instances across multiple decompression calls even after a `MemoryError` is raised during decompression. Using the helper functions to one-shot decompress data such as `lzma.decompress()`, `bz2.decompress()`, `gzip.decompress()`, and `zlib.decompress()` are not affected as a new decompressor instance is used per call. If the decompressor instance is not re-used after an error condition, this usage is similarly not vulnerable.
The Go standard library function net/url.Parse insufficiently validated the host/authority component and accepted some invalid URLs by effectively treating garbage before an IP-literal as ignorable. The function should have rejected this as invalid.
A flaw was found in vLLM, an inference and serving engine for large language models (LLMs). Two model implementation files hardcode `trust_remote_code=True` when loading sub-components. This bypasses the user's explicit `--trust-remote-code=False` security opt-out, allowing a remote attacker to achieve remote code execution through malicious model repositories.
A missing verification step has been discovered in PyJWT. PyJWT does not validate the crit (Critical) Header Parameter defined in RFC 7515 §4.1.11. When a JWS token contains a crit array listing extensions that PyJWT does not understand, the library accepts the token instead of rejecting it. This violates the MUST requirement in the RFC.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat Enterprise Linux AI 3.3.1 is now available.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat\u00ae Enterprise Linux\u00ae AI is a foundation model platform to seamlessly develop, test,\nand run Granite family large language models (LLMs) for enterprise applications.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:10140",
"url": "https://access.redhat.com/errata/RHSA-2026:10140"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-25679",
"url": "https://access.redhat.com/security/cve/CVE-2026-25679"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-27893",
"url": "https://access.redhat.com/security/cve/CVE-2026-27893"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-32597",
"url": "https://access.redhat.com/security/cve/CVE-2026-32597"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-4519",
"url": "https://access.redhat.com/security/cve/CVE-2026-4519"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-4786",
"url": "https://access.redhat.com/security/cve/CVE-2026-4786"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-6100",
"url": "https://access.redhat.com/security/cve/CVE-2026-6100"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "external",
"summary": "https://www.redhat.com/en/technologies/linux-platforms/enterprise-linux/ai",
"url": "https://www.redhat.com/en/technologies/linux-platforms/enterprise-linux/ai"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_10140.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Enterprise Linux AI 3.3.1",
"tracking": {
"current_release_date": "2026-04-23T20:25:04+00:00",
"generator": {
"date": "2026-04-23T20:25:04+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.5"
}
},
"id": "RHSA-2026:10140",
"initial_release_date": "2026-04-23T13:34:50+00:00",
"revision_history": [
{
"date": "2026-04-23T13:34:50+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-04-23T13:35:12+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-23T20:25:04+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AI 3.3",
"product": {
"name": "Red Hat Enterprise Linux AI 3.3",
"product_id": "Red Hat Enterprise Linux AI 3.3",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux_ai:3.3::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux AI"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rhelai3/bootc-cuda-rhel9@sha256:080632b93a8171a88c7a17ddb8dc5f1cc7801da604aae599eac28861b5b38821_amd64",
"product": {
"name": "registry.redhat.io/rhelai3/bootc-cuda-rhel9@sha256:080632b93a8171a88c7a17ddb8dc5f1cc7801da604aae599eac28861b5b38821_amd64",
"product_id": "registry.redhat.io/rhelai3/bootc-cuda-rhel9@sha256:080632b93a8171a88c7a17ddb8dc5f1cc7801da604aae599eac28861b5b38821_amd64",
"product_identification_helper": {
"purl": "pkg:oci/bootc-cuda-rhel9@sha256%3A080632b93a8171a88c7a17ddb8dc5f1cc7801da604aae599eac28861b5b38821?arch=amd64\u0026repository_url=registry.redhat.io/rhelai3\u0026tag=1776773390"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhelai3/bootc-aws-cuda-rhel9@sha256:c4e99fdf145fa920e4d91f291010fe0826306112c55f8470c67b060b6235e58f_amd64",
"product": {
"name": "registry.redhat.io/rhelai3/bootc-aws-cuda-rhel9@sha256:c4e99fdf145fa920e4d91f291010fe0826306112c55f8470c67b060b6235e58f_amd64",
"product_id": "registry.redhat.io/rhelai3/bootc-aws-cuda-rhel9@sha256:c4e99fdf145fa920e4d91f291010fe0826306112c55f8470c67b060b6235e58f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/bootc-aws-cuda-rhel9@sha256%3Ac4e99fdf145fa920e4d91f291010fe0826306112c55f8470c67b060b6235e58f?arch=amd64\u0026repository_url=registry.redhat.io/rhelai3\u0026tag=1776871984"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhelai3/bootc-azure-cuda-rhel9@sha256:bffbcba6080e3e3034581301575ce3211a8351ff560029426c6723ea06229430_amd64",
"product": {
"name": "registry.redhat.io/rhelai3/bootc-azure-cuda-rhel9@sha256:bffbcba6080e3e3034581301575ce3211a8351ff560029426c6723ea06229430_amd64",
"product_id": "registry.redhat.io/rhelai3/bootc-azure-cuda-rhel9@sha256:bffbcba6080e3e3034581301575ce3211a8351ff560029426c6723ea06229430_amd64",
"product_identification_helper": {
"purl": "pkg:oci/bootc-azure-cuda-rhel9@sha256%3Abffbcba6080e3e3034581301575ce3211a8351ff560029426c6723ea06229430?arch=amd64\u0026repository_url=registry.redhat.io/rhelai3\u0026tag=1776871985"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhelai3/bootc-gcp-cuda-rhel9@sha256:b0f5035af6217c92086ae77c07f36742f31b2b36f5a24a70f801cd9ff181a264_amd64",
"product": {
"name": "registry.redhat.io/rhelai3/bootc-gcp-cuda-rhel9@sha256:b0f5035af6217c92086ae77c07f36742f31b2b36f5a24a70f801cd9ff181a264_amd64",
"product_id": "registry.redhat.io/rhelai3/bootc-gcp-cuda-rhel9@sha256:b0f5035af6217c92086ae77c07f36742f31b2b36f5a24a70f801cd9ff181a264_amd64",
"product_identification_helper": {
"purl": "pkg:oci/bootc-gcp-cuda-rhel9@sha256%3Ab0f5035af6217c92086ae77c07f36742f31b2b36f5a24a70f801cd9ff181a264?arch=amd64\u0026repository_url=registry.redhat.io/rhelai3\u0026tag=1776871987"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhelai3/bootc-rocm-rhel9@sha256:59b3ca83b219cadb030d5b4805e505ad6bfa19e1a0f2130f646b2ba7e0b8394c_amd64",
"product": {
"name": "registry.redhat.io/rhelai3/bootc-rocm-rhel9@sha256:59b3ca83b219cadb030d5b4805e505ad6bfa19e1a0f2130f646b2ba7e0b8394c_amd64",
"product_id": "registry.redhat.io/rhelai3/bootc-rocm-rhel9@sha256:59b3ca83b219cadb030d5b4805e505ad6bfa19e1a0f2130f646b2ba7e0b8394c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/bootc-rocm-rhel9@sha256%3A59b3ca83b219cadb030d5b4805e505ad6bfa19e1a0f2130f646b2ba7e0b8394c?arch=amd64\u0026repository_url=registry.redhat.io/rhelai3\u0026tag=1776773505"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhelai3/bootc-azure-rocm-rhel9@sha256:e288f64fd5bfeb9f94ae40c346cf6a77ae09cb639440494d36db9be9962035d6_amd64",
"product": {
"name": "registry.redhat.io/rhelai3/bootc-azure-rocm-rhel9@sha256:e288f64fd5bfeb9f94ae40c346cf6a77ae09cb639440494d36db9be9962035d6_amd64",
"product_id": "registry.redhat.io/rhelai3/bootc-azure-rocm-rhel9@sha256:e288f64fd5bfeb9f94ae40c346cf6a77ae09cb639440494d36db9be9962035d6_amd64",
"product_identification_helper": {
"purl": "pkg:oci/bootc-azure-rocm-rhel9@sha256%3Ae288f64fd5bfeb9f94ae40c346cf6a77ae09cb639440494d36db9be9962035d6?arch=amd64\u0026repository_url=registry.redhat.io/rhelai3\u0026tag=1776872005"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rhelai3/bootc-cuda-rhel9@sha256:a6e60bde307c0d6fb5fa8c115d13169287ec851ef2f3c440da3df7a9089a8f63_arm64",
"product": {
"name": "registry.redhat.io/rhelai3/bootc-cuda-rhel9@sha256:a6e60bde307c0d6fb5fa8c115d13169287ec851ef2f3c440da3df7a9089a8f63_arm64",
"product_id": "registry.redhat.io/rhelai3/bootc-cuda-rhel9@sha256:a6e60bde307c0d6fb5fa8c115d13169287ec851ef2f3c440da3df7a9089a8f63_arm64",
"product_identification_helper": {
"purl": "pkg:oci/bootc-cuda-rhel9@sha256%3Aa6e60bde307c0d6fb5fa8c115d13169287ec851ef2f3c440da3df7a9089a8f63?arch=arm64\u0026repository_url=registry.redhat.io/rhelai3\u0026tag=1776773390"
}
}
}
],
"category": "architecture",
"name": "arm64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhelai3/bootc-aws-cuda-rhel9@sha256:c4e99fdf145fa920e4d91f291010fe0826306112c55f8470c67b060b6235e58f_amd64 as a component of Red Hat Enterprise Linux AI 3.3",
"product_id": "Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-aws-cuda-rhel9@sha256:c4e99fdf145fa920e4d91f291010fe0826306112c55f8470c67b060b6235e58f_amd64"
},
"product_reference": "registry.redhat.io/rhelai3/bootc-aws-cuda-rhel9@sha256:c4e99fdf145fa920e4d91f291010fe0826306112c55f8470c67b060b6235e58f_amd64",
"relates_to_product_reference": "Red Hat Enterprise Linux AI 3.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhelai3/bootc-azure-cuda-rhel9@sha256:bffbcba6080e3e3034581301575ce3211a8351ff560029426c6723ea06229430_amd64 as a component of Red Hat Enterprise Linux AI 3.3",
"product_id": "Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-azure-cuda-rhel9@sha256:bffbcba6080e3e3034581301575ce3211a8351ff560029426c6723ea06229430_amd64"
},
"product_reference": "registry.redhat.io/rhelai3/bootc-azure-cuda-rhel9@sha256:bffbcba6080e3e3034581301575ce3211a8351ff560029426c6723ea06229430_amd64",
"relates_to_product_reference": "Red Hat Enterprise Linux AI 3.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhelai3/bootc-azure-rocm-rhel9@sha256:e288f64fd5bfeb9f94ae40c346cf6a77ae09cb639440494d36db9be9962035d6_amd64 as a component of Red Hat Enterprise Linux AI 3.3",
"product_id": "Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-azure-rocm-rhel9@sha256:e288f64fd5bfeb9f94ae40c346cf6a77ae09cb639440494d36db9be9962035d6_amd64"
},
"product_reference": "registry.redhat.io/rhelai3/bootc-azure-rocm-rhel9@sha256:e288f64fd5bfeb9f94ae40c346cf6a77ae09cb639440494d36db9be9962035d6_amd64",
"relates_to_product_reference": "Red Hat Enterprise Linux AI 3.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhelai3/bootc-cuda-rhel9@sha256:080632b93a8171a88c7a17ddb8dc5f1cc7801da604aae599eac28861b5b38821_amd64 as a component of Red Hat Enterprise Linux AI 3.3",
"product_id": "Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-cuda-rhel9@sha256:080632b93a8171a88c7a17ddb8dc5f1cc7801da604aae599eac28861b5b38821_amd64"
},
"product_reference": "registry.redhat.io/rhelai3/bootc-cuda-rhel9@sha256:080632b93a8171a88c7a17ddb8dc5f1cc7801da604aae599eac28861b5b38821_amd64",
"relates_to_product_reference": "Red Hat Enterprise Linux AI 3.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhelai3/bootc-cuda-rhel9@sha256:a6e60bde307c0d6fb5fa8c115d13169287ec851ef2f3c440da3df7a9089a8f63_arm64 as a component of Red Hat Enterprise Linux AI 3.3",
"product_id": "Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-cuda-rhel9@sha256:a6e60bde307c0d6fb5fa8c115d13169287ec851ef2f3c440da3df7a9089a8f63_arm64"
},
"product_reference": "registry.redhat.io/rhelai3/bootc-cuda-rhel9@sha256:a6e60bde307c0d6fb5fa8c115d13169287ec851ef2f3c440da3df7a9089a8f63_arm64",
"relates_to_product_reference": "Red Hat Enterprise Linux AI 3.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhelai3/bootc-gcp-cuda-rhel9@sha256:b0f5035af6217c92086ae77c07f36742f31b2b36f5a24a70f801cd9ff181a264_amd64 as a component of Red Hat Enterprise Linux AI 3.3",
"product_id": "Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-gcp-cuda-rhel9@sha256:b0f5035af6217c92086ae77c07f36742f31b2b36f5a24a70f801cd9ff181a264_amd64"
},
"product_reference": "registry.redhat.io/rhelai3/bootc-gcp-cuda-rhel9@sha256:b0f5035af6217c92086ae77c07f36742f31b2b36f5a24a70f801cd9ff181a264_amd64",
"relates_to_product_reference": "Red Hat Enterprise Linux AI 3.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhelai3/bootc-rocm-rhel9@sha256:59b3ca83b219cadb030d5b4805e505ad6bfa19e1a0f2130f646b2ba7e0b8394c_amd64 as a component of Red Hat Enterprise Linux AI 3.3",
"product_id": "Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-rocm-rhel9@sha256:59b3ca83b219cadb030d5b4805e505ad6bfa19e1a0f2130f646b2ba7e0b8394c_amd64"
},
"product_reference": "registry.redhat.io/rhelai3/bootc-rocm-rhel9@sha256:59b3ca83b219cadb030d5b4805e505ad6bfa19e1a0f2130f646b2ba7e0b8394c_amd64",
"relates_to_product_reference": "Red Hat Enterprise Linux AI 3.3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-4519",
"cwe": {
"id": "CWE-88",
"name": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)"
},
"discovery_date": "2026-03-20T16:02:13.494105+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2449649"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Python. The `webbrowser.open()` API, used to launch web browsers, does not properly sanitize input. This allows a remote attacker to craft a malicious URL containing leading dashes. When such a URL is opened, certain web browsers may interpret these dashes as command-line options, which could lead to unexpected behavior, information disclosure, or potentially arbitrary code execution, impacting the integrity of the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "python: Python: Command-line option injection in webbrowser.open() via crafted URLs",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-aws-cuda-rhel9@sha256:c4e99fdf145fa920e4d91f291010fe0826306112c55f8470c67b060b6235e58f_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-azure-cuda-rhel9@sha256:bffbcba6080e3e3034581301575ce3211a8351ff560029426c6723ea06229430_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-azure-rocm-rhel9@sha256:e288f64fd5bfeb9f94ae40c346cf6a77ae09cb639440494d36db9be9962035d6_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-cuda-rhel9@sha256:080632b93a8171a88c7a17ddb8dc5f1cc7801da604aae599eac28861b5b38821_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-cuda-rhel9@sha256:a6e60bde307c0d6fb5fa8c115d13169287ec851ef2f3c440da3df7a9089a8f63_arm64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-gcp-cuda-rhel9@sha256:b0f5035af6217c92086ae77c07f36742f31b2b36f5a24a70f801cd9ff181a264_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-rocm-rhel9@sha256:59b3ca83b219cadb030d5b4805e505ad6bfa19e1a0f2130f646b2ba7e0b8394c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-4519"
},
{
"category": "external",
"summary": "RHBZ#2449649",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2449649"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-4519",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-4519"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-4519",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4519"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/issues/143930",
"url": "https://github.com/python/cpython/issues/143930"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/pull/143931",
"url": "https://github.com/python/cpython/pull/143931"
},
{
"category": "external",
"summary": "https://mail.python.org/archives/list/security-announce@python.org/thread/AY5NDSS433JK56Q7Q5IS7B37QFZVVOUS/",
"url": "https://mail.python.org/archives/list/security-announce@python.org/thread/AY5NDSS433JK56Q7Q5IS7B37QFZVVOUS/"
}
],
"release_date": "2026-03-20T15:08:32.576000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-23T13:34:50+00:00",
"details": "Before applying this update, ensure all previously released errata relevant to your system have been applied.",
"product_ids": [
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-aws-cuda-rhel9@sha256:c4e99fdf145fa920e4d91f291010fe0826306112c55f8470c67b060b6235e58f_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-azure-cuda-rhel9@sha256:bffbcba6080e3e3034581301575ce3211a8351ff560029426c6723ea06229430_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-azure-rocm-rhel9@sha256:e288f64fd5bfeb9f94ae40c346cf6a77ae09cb639440494d36db9be9962035d6_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-cuda-rhel9@sha256:080632b93a8171a88c7a17ddb8dc5f1cc7801da604aae599eac28861b5b38821_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-cuda-rhel9@sha256:a6e60bde307c0d6fb5fa8c115d13169287ec851ef2f3c440da3df7a9089a8f63_arm64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-gcp-cuda-rhel9@sha256:b0f5035af6217c92086ae77c07f36742f31b2b36f5a24a70f801cd9ff181a264_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-rocm-rhel9@sha256:59b3ca83b219cadb030d5b4805e505ad6bfa19e1a0f2130f646b2ba7e0b8394c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:10140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-aws-cuda-rhel9@sha256:c4e99fdf145fa920e4d91f291010fe0826306112c55f8470c67b060b6235e58f_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-azure-cuda-rhel9@sha256:bffbcba6080e3e3034581301575ce3211a8351ff560029426c6723ea06229430_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-azure-rocm-rhel9@sha256:e288f64fd5bfeb9f94ae40c346cf6a77ae09cb639440494d36db9be9962035d6_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-cuda-rhel9@sha256:080632b93a8171a88c7a17ddb8dc5f1cc7801da604aae599eac28861b5b38821_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-cuda-rhel9@sha256:a6e60bde307c0d6fb5fa8c115d13169287ec851ef2f3c440da3df7a9089a8f63_arm64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-gcp-cuda-rhel9@sha256:b0f5035af6217c92086ae77c07f36742f31b2b36f5a24a70f801cd9ff181a264_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-rocm-rhel9@sha256:59b3ca83b219cadb030d5b4805e505ad6bfa19e1a0f2130f646b2ba7e0b8394c_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-aws-cuda-rhel9@sha256:c4e99fdf145fa920e4d91f291010fe0826306112c55f8470c67b060b6235e58f_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-azure-cuda-rhel9@sha256:bffbcba6080e3e3034581301575ce3211a8351ff560029426c6723ea06229430_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-azure-rocm-rhel9@sha256:e288f64fd5bfeb9f94ae40c346cf6a77ae09cb639440494d36db9be9962035d6_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-cuda-rhel9@sha256:080632b93a8171a88c7a17ddb8dc5f1cc7801da604aae599eac28861b5b38821_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-cuda-rhel9@sha256:a6e60bde307c0d6fb5fa8c115d13169287ec851ef2f3c440da3df7a9089a8f63_arm64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-gcp-cuda-rhel9@sha256:b0f5035af6217c92086ae77c07f36742f31b2b36f5a24a70f801cd9ff181a264_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-rocm-rhel9@sha256:59b3ca83b219cadb030d5b4805e505ad6bfa19e1a0f2130f646b2ba7e0b8394c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "python: Python: Command-line option injection in webbrowser.open() via crafted URLs"
},
{
"cve": "CVE-2026-4786",
"cwe": {
"id": "CWE-88",
"name": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)"
},
"discovery_date": "2026-04-13T22:01:38.006388+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2458049"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Python webbrowser.open() API. If a specially crafted URL containing \"%action\" is processed, an attacker could bypass a previous mitigation for CVE-2026-4519. This bypass allows for command injection into the underlying shell, potentially leading to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "python: cpython: Python: Arbitrary code execution via command injection in webbrowser.open() API",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw in the Python `webbrowser.open()` API allows for command injection and arbitrary code execution when processing specially crafted URLs containing \"%action\". This bypasses a previous mitigation for CVE-2026-4519.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-aws-cuda-rhel9@sha256:c4e99fdf145fa920e4d91f291010fe0826306112c55f8470c67b060b6235e58f_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-azure-cuda-rhel9@sha256:bffbcba6080e3e3034581301575ce3211a8351ff560029426c6723ea06229430_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-azure-rocm-rhel9@sha256:e288f64fd5bfeb9f94ae40c346cf6a77ae09cb639440494d36db9be9962035d6_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-cuda-rhel9@sha256:080632b93a8171a88c7a17ddb8dc5f1cc7801da604aae599eac28861b5b38821_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-cuda-rhel9@sha256:a6e60bde307c0d6fb5fa8c115d13169287ec851ef2f3c440da3df7a9089a8f63_arm64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-gcp-cuda-rhel9@sha256:b0f5035af6217c92086ae77c07f36742f31b2b36f5a24a70f801cd9ff181a264_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-rocm-rhel9@sha256:59b3ca83b219cadb030d5b4805e505ad6bfa19e1a0f2130f646b2ba7e0b8394c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-4786"
},
{
"category": "external",
"summary": "RHBZ#2458049",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2458049"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-4786",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-4786"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-4786",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4786"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/issues/148169",
"url": "https://github.com/python/cpython/issues/148169"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/pull/148170",
"url": "https://github.com/python/cpython/pull/148170"
},
{
"category": "external",
"summary": "https://mail.python.org/archives/list/security-announce@python.org/thread/JQDUNJVB4AQNTJECSUKOBDU3XCJIPSE5/",
"url": "https://mail.python.org/archives/list/security-announce@python.org/thread/JQDUNJVB4AQNTJECSUKOBDU3XCJIPSE5/"
}
],
"release_date": "2026-04-13T21:52:19.036000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-23T13:34:50+00:00",
"details": "Before applying this update, ensure all previously released errata relevant to your system have been applied.",
"product_ids": [
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-aws-cuda-rhel9@sha256:c4e99fdf145fa920e4d91f291010fe0826306112c55f8470c67b060b6235e58f_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-azure-cuda-rhel9@sha256:bffbcba6080e3e3034581301575ce3211a8351ff560029426c6723ea06229430_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-azure-rocm-rhel9@sha256:e288f64fd5bfeb9f94ae40c346cf6a77ae09cb639440494d36db9be9962035d6_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-cuda-rhel9@sha256:080632b93a8171a88c7a17ddb8dc5f1cc7801da604aae599eac28861b5b38821_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-cuda-rhel9@sha256:a6e60bde307c0d6fb5fa8c115d13169287ec851ef2f3c440da3df7a9089a8f63_arm64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-gcp-cuda-rhel9@sha256:b0f5035af6217c92086ae77c07f36742f31b2b36f5a24a70f801cd9ff181a264_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-rocm-rhel9@sha256:59b3ca83b219cadb030d5b4805e505ad6bfa19e1a0f2130f646b2ba7e0b8394c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:10140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-aws-cuda-rhel9@sha256:c4e99fdf145fa920e4d91f291010fe0826306112c55f8470c67b060b6235e58f_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-azure-cuda-rhel9@sha256:bffbcba6080e3e3034581301575ce3211a8351ff560029426c6723ea06229430_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-azure-rocm-rhel9@sha256:e288f64fd5bfeb9f94ae40c346cf6a77ae09cb639440494d36db9be9962035d6_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-cuda-rhel9@sha256:080632b93a8171a88c7a17ddb8dc5f1cc7801da604aae599eac28861b5b38821_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-cuda-rhel9@sha256:a6e60bde307c0d6fb5fa8c115d13169287ec851ef2f3c440da3df7a9089a8f63_arm64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-gcp-cuda-rhel9@sha256:b0f5035af6217c92086ae77c07f36742f31b2b36f5a24a70f801cd9ff181a264_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-rocm-rhel9@sha256:59b3ca83b219cadb030d5b4805e505ad6bfa19e1a0f2130f646b2ba7e0b8394c_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-aws-cuda-rhel9@sha256:c4e99fdf145fa920e4d91f291010fe0826306112c55f8470c67b060b6235e58f_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-azure-cuda-rhel9@sha256:bffbcba6080e3e3034581301575ce3211a8351ff560029426c6723ea06229430_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-azure-rocm-rhel9@sha256:e288f64fd5bfeb9f94ae40c346cf6a77ae09cb639440494d36db9be9962035d6_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-cuda-rhel9@sha256:080632b93a8171a88c7a17ddb8dc5f1cc7801da604aae599eac28861b5b38821_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-cuda-rhel9@sha256:a6e60bde307c0d6fb5fa8c115d13169287ec851ef2f3c440da3df7a9089a8f63_arm64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-gcp-cuda-rhel9@sha256:b0f5035af6217c92086ae77c07f36742f31b2b36f5a24a70f801cd9ff181a264_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-rocm-rhel9@sha256:59b3ca83b219cadb030d5b4805e505ad6bfa19e1a0f2130f646b2ba7e0b8394c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "python: cpython: Python: Arbitrary code execution via command injection in webbrowser.open() API"
},
{
"cve": "CVE-2026-6100",
"cwe": {
"id": "CWE-825",
"name": "Expired Pointer Dereference"
},
"discovery_date": "2026-04-13T18:01:31.970255+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2457932"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Python\u0027s decompression modules, including `lzma.LZMADecompressor`, `bz2.BZ2Decompressor`, and `gzip.GzipFile`. This vulnerability, a use-after-free, can occur if a program attempts to re-use a decompression object after a memory allocation error, especially when the system is experiencing high memory usage. Exploitation of this flaw could potentially allow an attacker to execute arbitrary code or access sensitive data. The vulnerability is only present if the program re-uses decompressor instances across multiple decompression calls even after a `MemoryError` is raised during decompression. Using the helper functions to one-shot decompress data such as `lzma.decompress()`, `bz2.decompress()`, `gzip.decompress()`, and `zlib.decompress()` are not affected as a new decompressor instance is used per call. If the decompressor instance is not re-used after an error condition, this usage is similarly not vulnerable.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "python: Python: Arbitrary code execution or information disclosure via use-after-free in decompression modules",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The severity of this flaw is somewhat mitigated on Red Hat platforms. By default processes are not executed with root user privilege and are limited in their scope which in turn limits the impact of this flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-aws-cuda-rhel9@sha256:c4e99fdf145fa920e4d91f291010fe0826306112c55f8470c67b060b6235e58f_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-azure-cuda-rhel9@sha256:bffbcba6080e3e3034581301575ce3211a8351ff560029426c6723ea06229430_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-azure-rocm-rhel9@sha256:e288f64fd5bfeb9f94ae40c346cf6a77ae09cb639440494d36db9be9962035d6_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-cuda-rhel9@sha256:080632b93a8171a88c7a17ddb8dc5f1cc7801da604aae599eac28861b5b38821_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-cuda-rhel9@sha256:a6e60bde307c0d6fb5fa8c115d13169287ec851ef2f3c440da3df7a9089a8f63_arm64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-gcp-cuda-rhel9@sha256:b0f5035af6217c92086ae77c07f36742f31b2b36f5a24a70f801cd9ff181a264_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-rocm-rhel9@sha256:59b3ca83b219cadb030d5b4805e505ad6bfa19e1a0f2130f646b2ba7e0b8394c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-6100"
},
{
"category": "external",
"summary": "RHBZ#2457932",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2457932"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-6100",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-6100"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-6100",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-6100"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/commit/6a5f79c8d7bbf22b083b240910c7a8781a59437d",
"url": "https://github.com/python/cpython/commit/6a5f79c8d7bbf22b083b240910c7a8781a59437d"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/commit/8fc66aef6d7b3ae58f43f5c66f9366cc8cbbfcd2",
"url": "https://github.com/python/cpython/commit/8fc66aef6d7b3ae58f43f5c66f9366cc8cbbfcd2"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/commit/c3cf71c3366fe49acb776a639405c0eea6169c20",
"url": "https://github.com/python/cpython/commit/c3cf71c3366fe49acb776a639405c0eea6169c20"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/issues/148395",
"url": "https://github.com/python/cpython/issues/148395"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/pull/148396",
"url": "https://github.com/python/cpython/pull/148396"
},
{
"category": "external",
"summary": "https://mail.python.org/archives/list/security-announce@python.org/thread/HTWB2Z6KT5QQX4RYEZAFININDHNOSIF3/",
"url": "https://mail.python.org/archives/list/security-announce@python.org/thread/HTWB2Z6KT5QQX4RYEZAFININDHNOSIF3/"
}
],
"release_date": "2026-04-13T17:15:47.606000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-23T13:34:50+00:00",
"details": "Before applying this update, ensure all previously released errata relevant to your system have been applied.",
"product_ids": [
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-aws-cuda-rhel9@sha256:c4e99fdf145fa920e4d91f291010fe0826306112c55f8470c67b060b6235e58f_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-azure-cuda-rhel9@sha256:bffbcba6080e3e3034581301575ce3211a8351ff560029426c6723ea06229430_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-azure-rocm-rhel9@sha256:e288f64fd5bfeb9f94ae40c346cf6a77ae09cb639440494d36db9be9962035d6_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-cuda-rhel9@sha256:080632b93a8171a88c7a17ddb8dc5f1cc7801da604aae599eac28861b5b38821_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-cuda-rhel9@sha256:a6e60bde307c0d6fb5fa8c115d13169287ec851ef2f3c440da3df7a9089a8f63_arm64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-gcp-cuda-rhel9@sha256:b0f5035af6217c92086ae77c07f36742f31b2b36f5a24a70f801cd9ff181a264_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-rocm-rhel9@sha256:59b3ca83b219cadb030d5b4805e505ad6bfa19e1a0f2130f646b2ba7e0b8394c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:10140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-aws-cuda-rhel9@sha256:c4e99fdf145fa920e4d91f291010fe0826306112c55f8470c67b060b6235e58f_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-azure-cuda-rhel9@sha256:bffbcba6080e3e3034581301575ce3211a8351ff560029426c6723ea06229430_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-azure-rocm-rhel9@sha256:e288f64fd5bfeb9f94ae40c346cf6a77ae09cb639440494d36db9be9962035d6_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-cuda-rhel9@sha256:080632b93a8171a88c7a17ddb8dc5f1cc7801da604aae599eac28861b5b38821_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-cuda-rhel9@sha256:a6e60bde307c0d6fb5fa8c115d13169287ec851ef2f3c440da3df7a9089a8f63_arm64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-gcp-cuda-rhel9@sha256:b0f5035af6217c92086ae77c07f36742f31b2b36f5a24a70f801cd9ff181a264_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-rocm-rhel9@sha256:59b3ca83b219cadb030d5b4805e505ad6bfa19e1a0f2130f646b2ba7e0b8394c_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-aws-cuda-rhel9@sha256:c4e99fdf145fa920e4d91f291010fe0826306112c55f8470c67b060b6235e58f_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-azure-cuda-rhel9@sha256:bffbcba6080e3e3034581301575ce3211a8351ff560029426c6723ea06229430_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-azure-rocm-rhel9@sha256:e288f64fd5bfeb9f94ae40c346cf6a77ae09cb639440494d36db9be9962035d6_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-cuda-rhel9@sha256:080632b93a8171a88c7a17ddb8dc5f1cc7801da604aae599eac28861b5b38821_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-cuda-rhel9@sha256:a6e60bde307c0d6fb5fa8c115d13169287ec851ef2f3c440da3df7a9089a8f63_arm64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-gcp-cuda-rhel9@sha256:b0f5035af6217c92086ae77c07f36742f31b2b36f5a24a70f801cd9ff181a264_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-rocm-rhel9@sha256:59b3ca83b219cadb030d5b4805e505ad6bfa19e1a0f2130f646b2ba7e0b8394c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "python: Python: Arbitrary code execution or information disclosure via use-after-free in decompression modules"
},
{
"cve": "CVE-2026-25679",
"cwe": {
"id": "CWE-1286",
"name": "Improper Validation of Syntactic Correctness of Input"
},
"discovery_date": "2026-03-06T22:02:11.567841+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2445356"
}
],
"notes": [
{
"category": "description",
"text": "The Go standard library function net/url.Parse insufficiently validated the host/authority component and accepted some invalid URLs by effectively treating garbage before an IP-literal as ignorable. The function should have rejected this as invalid.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "net/url: Incorrect parsing of IPv6 host literals in net/url",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-aws-cuda-rhel9@sha256:c4e99fdf145fa920e4d91f291010fe0826306112c55f8470c67b060b6235e58f_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-azure-cuda-rhel9@sha256:bffbcba6080e3e3034581301575ce3211a8351ff560029426c6723ea06229430_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-azure-rocm-rhel9@sha256:e288f64fd5bfeb9f94ae40c346cf6a77ae09cb639440494d36db9be9962035d6_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-cuda-rhel9@sha256:080632b93a8171a88c7a17ddb8dc5f1cc7801da604aae599eac28861b5b38821_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-cuda-rhel9@sha256:a6e60bde307c0d6fb5fa8c115d13169287ec851ef2f3c440da3df7a9089a8f63_arm64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-gcp-cuda-rhel9@sha256:b0f5035af6217c92086ae77c07f36742f31b2b36f5a24a70f801cd9ff181a264_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-rocm-rhel9@sha256:59b3ca83b219cadb030d5b4805e505ad6bfa19e1a0f2130f646b2ba7e0b8394c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-25679"
},
{
"category": "external",
"summary": "RHBZ#2445356",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2445356"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-25679",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25679"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-25679",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25679"
},
{
"category": "external",
"summary": "https://go.dev/cl/752180",
"url": "https://go.dev/cl/752180"
},
{
"category": "external",
"summary": "https://go.dev/issue/77578",
"url": "https://go.dev/issue/77578"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk",
"url": "https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4601",
"url": "https://pkg.go.dev/vuln/GO-2026-4601"
}
],
"release_date": "2026-03-06T21:28:14.211000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-23T13:34:50+00:00",
"details": "Before applying this update, ensure all previously released errata relevant to your system have been applied.",
"product_ids": [
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-aws-cuda-rhel9@sha256:c4e99fdf145fa920e4d91f291010fe0826306112c55f8470c67b060b6235e58f_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-azure-cuda-rhel9@sha256:bffbcba6080e3e3034581301575ce3211a8351ff560029426c6723ea06229430_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-azure-rocm-rhel9@sha256:e288f64fd5bfeb9f94ae40c346cf6a77ae09cb639440494d36db9be9962035d6_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-cuda-rhel9@sha256:080632b93a8171a88c7a17ddb8dc5f1cc7801da604aae599eac28861b5b38821_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-cuda-rhel9@sha256:a6e60bde307c0d6fb5fa8c115d13169287ec851ef2f3c440da3df7a9089a8f63_arm64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-gcp-cuda-rhel9@sha256:b0f5035af6217c92086ae77c07f36742f31b2b36f5a24a70f801cd9ff181a264_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-rocm-rhel9@sha256:59b3ca83b219cadb030d5b4805e505ad6bfa19e1a0f2130f646b2ba7e0b8394c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:10140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-aws-cuda-rhel9@sha256:c4e99fdf145fa920e4d91f291010fe0826306112c55f8470c67b060b6235e58f_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-azure-cuda-rhel9@sha256:bffbcba6080e3e3034581301575ce3211a8351ff560029426c6723ea06229430_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-azure-rocm-rhel9@sha256:e288f64fd5bfeb9f94ae40c346cf6a77ae09cb639440494d36db9be9962035d6_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-cuda-rhel9@sha256:080632b93a8171a88c7a17ddb8dc5f1cc7801da604aae599eac28861b5b38821_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-cuda-rhel9@sha256:a6e60bde307c0d6fb5fa8c115d13169287ec851ef2f3c440da3df7a9089a8f63_arm64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-gcp-cuda-rhel9@sha256:b0f5035af6217c92086ae77c07f36742f31b2b36f5a24a70f801cd9ff181a264_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-rocm-rhel9@sha256:59b3ca83b219cadb030d5b4805e505ad6bfa19e1a0f2130f646b2ba7e0b8394c_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-aws-cuda-rhel9@sha256:c4e99fdf145fa920e4d91f291010fe0826306112c55f8470c67b060b6235e58f_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-azure-cuda-rhel9@sha256:bffbcba6080e3e3034581301575ce3211a8351ff560029426c6723ea06229430_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-azure-rocm-rhel9@sha256:e288f64fd5bfeb9f94ae40c346cf6a77ae09cb639440494d36db9be9962035d6_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-cuda-rhel9@sha256:080632b93a8171a88c7a17ddb8dc5f1cc7801da604aae599eac28861b5b38821_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-cuda-rhel9@sha256:a6e60bde307c0d6fb5fa8c115d13169287ec851ef2f3c440da3df7a9089a8f63_arm64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-gcp-cuda-rhel9@sha256:b0f5035af6217c92086ae77c07f36742f31b2b36f5a24a70f801cd9ff181a264_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-rocm-rhel9@sha256:59b3ca83b219cadb030d5b4805e505ad6bfa19e1a0f2130f646b2ba7e0b8394c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "net/url: Incorrect parsing of IPv6 host literals in net/url"
},
{
"cve": "CVE-2026-27893",
"cwe": {
"id": "CWE-501",
"name": "Trust Boundary Violation"
},
"discovery_date": "2026-03-27T00:01:43.935417+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2452055"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in vLLM, an inference and serving engine for large language models (LLMs). Two model implementation files hardcode `trust_remote_code=True` when loading sub-components. This bypasses the user\u0027s explicit `--trust-remote-code=False` security opt-out, allowing a remote attacker to achieve remote code execution through malicious model repositories.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "vllm: vLLM: Remote code execution due to hardcoded trust_remote_code setting",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This is an Important vulnerability in vLLM, as shipped in Red Hat AI Inference Server and Red Hat OpenShift AI. The flaw allows remote code execution due to vLLM hardcoding `trust_remote_code=True` when loading sub-components, which bypasses the user\u0027s explicit `--trust-remote-code=False` security opt-out. This can lead to exploitation through malicious model repositories.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-aws-cuda-rhel9@sha256:c4e99fdf145fa920e4d91f291010fe0826306112c55f8470c67b060b6235e58f_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-azure-cuda-rhel9@sha256:bffbcba6080e3e3034581301575ce3211a8351ff560029426c6723ea06229430_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-azure-rocm-rhel9@sha256:e288f64fd5bfeb9f94ae40c346cf6a77ae09cb639440494d36db9be9962035d6_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-cuda-rhel9@sha256:080632b93a8171a88c7a17ddb8dc5f1cc7801da604aae599eac28861b5b38821_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-cuda-rhel9@sha256:a6e60bde307c0d6fb5fa8c115d13169287ec851ef2f3c440da3df7a9089a8f63_arm64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-gcp-cuda-rhel9@sha256:b0f5035af6217c92086ae77c07f36742f31b2b36f5a24a70f801cd9ff181a264_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-rocm-rhel9@sha256:59b3ca83b219cadb030d5b4805e505ad6bfa19e1a0f2130f646b2ba7e0b8394c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-27893"
},
{
"category": "external",
"summary": "RHBZ#2452055",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2452055"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-27893",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27893"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-27893",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27893"
},
{
"category": "external",
"summary": "https://github.com/vllm-project/vllm/commit/00bd08edeee5dd4d4c13277c0114a464011acf72",
"url": "https://github.com/vllm-project/vllm/commit/00bd08edeee5dd4d4c13277c0114a464011acf72"
},
{
"category": "external",
"summary": "https://github.com/vllm-project/vllm/pull/36192",
"url": "https://github.com/vllm-project/vllm/pull/36192"
},
{
"category": "external",
"summary": "https://github.com/vllm-project/vllm/security/advisories/GHSA-7972-pg2x-xr59",
"url": "https://github.com/vllm-project/vllm/security/advisories/GHSA-7972-pg2x-xr59"
}
],
"release_date": "2026-03-26T23:56:53.579000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-23T13:34:50+00:00",
"details": "Before applying this update, ensure all previously released errata relevant to your system have been applied.",
"product_ids": [
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-aws-cuda-rhel9@sha256:c4e99fdf145fa920e4d91f291010fe0826306112c55f8470c67b060b6235e58f_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-azure-cuda-rhel9@sha256:bffbcba6080e3e3034581301575ce3211a8351ff560029426c6723ea06229430_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-azure-rocm-rhel9@sha256:e288f64fd5bfeb9f94ae40c346cf6a77ae09cb639440494d36db9be9962035d6_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-cuda-rhel9@sha256:080632b93a8171a88c7a17ddb8dc5f1cc7801da604aae599eac28861b5b38821_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-cuda-rhel9@sha256:a6e60bde307c0d6fb5fa8c115d13169287ec851ef2f3c440da3df7a9089a8f63_arm64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-gcp-cuda-rhel9@sha256:b0f5035af6217c92086ae77c07f36742f31b2b36f5a24a70f801cd9ff181a264_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-rocm-rhel9@sha256:59b3ca83b219cadb030d5b4805e505ad6bfa19e1a0f2130f646b2ba7e0b8394c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:10140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-aws-cuda-rhel9@sha256:c4e99fdf145fa920e4d91f291010fe0826306112c55f8470c67b060b6235e58f_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-azure-cuda-rhel9@sha256:bffbcba6080e3e3034581301575ce3211a8351ff560029426c6723ea06229430_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-azure-rocm-rhel9@sha256:e288f64fd5bfeb9f94ae40c346cf6a77ae09cb639440494d36db9be9962035d6_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-cuda-rhel9@sha256:080632b93a8171a88c7a17ddb8dc5f1cc7801da604aae599eac28861b5b38821_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-cuda-rhel9@sha256:a6e60bde307c0d6fb5fa8c115d13169287ec851ef2f3c440da3df7a9089a8f63_arm64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-gcp-cuda-rhel9@sha256:b0f5035af6217c92086ae77c07f36742f31b2b36f5a24a70f801cd9ff181a264_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-rocm-rhel9@sha256:59b3ca83b219cadb030d5b4805e505ad6bfa19e1a0f2130f646b2ba7e0b8394c_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-aws-cuda-rhel9@sha256:c4e99fdf145fa920e4d91f291010fe0826306112c55f8470c67b060b6235e58f_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-azure-cuda-rhel9@sha256:bffbcba6080e3e3034581301575ce3211a8351ff560029426c6723ea06229430_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-azure-rocm-rhel9@sha256:e288f64fd5bfeb9f94ae40c346cf6a77ae09cb639440494d36db9be9962035d6_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-cuda-rhel9@sha256:080632b93a8171a88c7a17ddb8dc5f1cc7801da604aae599eac28861b5b38821_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-cuda-rhel9@sha256:a6e60bde307c0d6fb5fa8c115d13169287ec851ef2f3c440da3df7a9089a8f63_arm64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-gcp-cuda-rhel9@sha256:b0f5035af6217c92086ae77c07f36742f31b2b36f5a24a70f801cd9ff181a264_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-rocm-rhel9@sha256:59b3ca83b219cadb030d5b4805e505ad6bfa19e1a0f2130f646b2ba7e0b8394c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "vllm: vLLM: Remote code execution due to hardcoded trust_remote_code setting"
},
{
"cve": "CVE-2026-32597",
"cwe": {
"id": "CWE-347",
"name": "Improper Verification of Cryptographic Signature"
},
"discovery_date": "2026-03-12T22:01:29.967713+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2447194"
}
],
"notes": [
{
"category": "description",
"text": "A missing verification step has been discovered in PyJWT. PyJWT does not validate the crit (Critical) Header Parameter defined in RFC 7515 \u00a74.1.11. When a JWS token contains a crit array listing extensions that PyJWT does not understand, the library accepts the token instead of rejecting it. This violates the MUST requirement in the RFC.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "pyjwt: PyJWT accepts unknown `crit` header extensions (RFC 7515 \u00a74.1.11 MUST violation)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-aws-cuda-rhel9@sha256:c4e99fdf145fa920e4d91f291010fe0826306112c55f8470c67b060b6235e58f_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-azure-cuda-rhel9@sha256:bffbcba6080e3e3034581301575ce3211a8351ff560029426c6723ea06229430_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-azure-rocm-rhel9@sha256:e288f64fd5bfeb9f94ae40c346cf6a77ae09cb639440494d36db9be9962035d6_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-cuda-rhel9@sha256:080632b93a8171a88c7a17ddb8dc5f1cc7801da604aae599eac28861b5b38821_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-cuda-rhel9@sha256:a6e60bde307c0d6fb5fa8c115d13169287ec851ef2f3c440da3df7a9089a8f63_arm64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-gcp-cuda-rhel9@sha256:b0f5035af6217c92086ae77c07f36742f31b2b36f5a24a70f801cd9ff181a264_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-rocm-rhel9@sha256:59b3ca83b219cadb030d5b4805e505ad6bfa19e1a0f2130f646b2ba7e0b8394c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-32597"
},
{
"category": "external",
"summary": "RHBZ#2447194",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447194"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-32597",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32597"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-32597",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32597"
},
{
"category": "external",
"summary": "https://github.com/jpadilla/pyjwt/security/advisories/GHSA-752w-5fwx-jx9f",
"url": "https://github.com/jpadilla/pyjwt/security/advisories/GHSA-752w-5fwx-jx9f"
}
],
"release_date": "2026-03-12T21:41:50.427000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-23T13:34:50+00:00",
"details": "Before applying this update, ensure all previously released errata relevant to your system have been applied.",
"product_ids": [
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-aws-cuda-rhel9@sha256:c4e99fdf145fa920e4d91f291010fe0826306112c55f8470c67b060b6235e58f_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-azure-cuda-rhel9@sha256:bffbcba6080e3e3034581301575ce3211a8351ff560029426c6723ea06229430_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-azure-rocm-rhel9@sha256:e288f64fd5bfeb9f94ae40c346cf6a77ae09cb639440494d36db9be9962035d6_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-cuda-rhel9@sha256:080632b93a8171a88c7a17ddb8dc5f1cc7801da604aae599eac28861b5b38821_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-cuda-rhel9@sha256:a6e60bde307c0d6fb5fa8c115d13169287ec851ef2f3c440da3df7a9089a8f63_arm64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-gcp-cuda-rhel9@sha256:b0f5035af6217c92086ae77c07f36742f31b2b36f5a24a70f801cd9ff181a264_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-rocm-rhel9@sha256:59b3ca83b219cadb030d5b4805e505ad6bfa19e1a0f2130f646b2ba7e0b8394c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:10140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-aws-cuda-rhel9@sha256:c4e99fdf145fa920e4d91f291010fe0826306112c55f8470c67b060b6235e58f_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-azure-cuda-rhel9@sha256:bffbcba6080e3e3034581301575ce3211a8351ff560029426c6723ea06229430_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-azure-rocm-rhel9@sha256:e288f64fd5bfeb9f94ae40c346cf6a77ae09cb639440494d36db9be9962035d6_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-cuda-rhel9@sha256:080632b93a8171a88c7a17ddb8dc5f1cc7801da604aae599eac28861b5b38821_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-cuda-rhel9@sha256:a6e60bde307c0d6fb5fa8c115d13169287ec851ef2f3c440da3df7a9089a8f63_arm64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-gcp-cuda-rhel9@sha256:b0f5035af6217c92086ae77c07f36742f31b2b36f5a24a70f801cd9ff181a264_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-rocm-rhel9@sha256:59b3ca83b219cadb030d5b4805e505ad6bfa19e1a0f2130f646b2ba7e0b8394c_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-aws-cuda-rhel9@sha256:c4e99fdf145fa920e4d91f291010fe0826306112c55f8470c67b060b6235e58f_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-azure-cuda-rhel9@sha256:bffbcba6080e3e3034581301575ce3211a8351ff560029426c6723ea06229430_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-azure-rocm-rhel9@sha256:e288f64fd5bfeb9f94ae40c346cf6a77ae09cb639440494d36db9be9962035d6_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-cuda-rhel9@sha256:080632b93a8171a88c7a17ddb8dc5f1cc7801da604aae599eac28861b5b38821_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-cuda-rhel9@sha256:a6e60bde307c0d6fb5fa8c115d13169287ec851ef2f3c440da3df7a9089a8f63_arm64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-gcp-cuda-rhel9@sha256:b0f5035af6217c92086ae77c07f36742f31b2b36f5a24a70f801cd9ff181a264_amd64",
"Red Hat Enterprise Linux AI 3.3:registry.redhat.io/rhelai3/bootc-rocm-rhel9@sha256:59b3ca83b219cadb030d5b4805e505ad6bfa19e1a0f2130f646b2ba7e0b8394c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "pyjwt: PyJWT accepts unknown `crit` header extensions (RFC 7515 \u00a74.1.11 MUST violation)"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.