RHSA-2026:8322
Vulnerability from csaf_redhat - Published: 2026-04-15 15:31 - Updated: 2026-04-20 19:08A flaw was found in handling multiplexed streams in the HTTP/2 protocol. A client can repeatedly make a request for a new multiplex stream and immediately send an RST_STREAM frame to cancel it. This creates extra work for the server setting up and tearing down the streams while not hitting any server-side limit for the maximum number of active streams per connection, resulting in a denial of service due to server resource consumption. Red Hat has rated the severity of this flaw as 'Important' as the US Cybersecurity and Infrastructure Security Agency (CISA) declared this vulnerability an active exploit. CVE-2023-39325 was assigned for the `Rapid Reset Attack` in the Go language packages.
The Go standard library function net/url.Parse insufficiently validated the host/authority component and accepted some invalid URLs by effectively treating garbage before an IP-literal as ignorable. The function should have rejected this as invalid.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Critical"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for rhc is now available for Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "rhc is a client tool and daemon that connects the system to Red Hat hosted services enabling system and subscription management.\n\nSecurity Fix(es):\n\n* golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) (CVE-2023-39325)\n\n* net/url: Incorrect parsing of IPv6 host literals in net/url (CVE-2026-25679)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:8322",
"url": "https://access.redhat.com/errata/RHSA-2026:8322"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#critical",
"url": "https://access.redhat.com/security/updates/classification/#critical"
},
{
"category": "external",
"summary": "2243296",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2243296"
},
{
"category": "external",
"summary": "2445356",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2445356"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_8322.json"
}
],
"title": "Red Hat Security Advisory: rhc security update",
"tracking": {
"current_release_date": "2026-04-20T19:08:54+00:00",
"generator": {
"date": "2026-04-20T19:08:54+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.5"
}
},
"id": "RHSA-2026:8322",
"initial_release_date": "2026-04-15T15:31:17+00:00",
"revision_history": [
{
"date": "2026-04-15T15:31:17+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-04-15T15:31:17+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-20T19:08:54+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product": {
"name": "Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_e4s:9.2::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "rhc-1:0.2.2-1.el9_2.2.src",
"product": {
"name": "rhc-1:0.2.2-1.el9_2.2.src",
"product_id": "rhc-1:0.2.2-1.el9_2.2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhc@0.2.2-1.el9_2.2?arch=src\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "rhc-1:0.2.2-1.el9_2.2.aarch64",
"product": {
"name": "rhc-1:0.2.2-1.el9_2.2.aarch64",
"product_id": "rhc-1:0.2.2-1.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhc@0.2.2-1.el9_2.2?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "rhc-debugsource-1:0.2.2-1.el9_2.2.aarch64",
"product": {
"name": "rhc-debugsource-1:0.2.2-1.el9_2.2.aarch64",
"product_id": "rhc-debugsource-1:0.2.2-1.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhc-debugsource@0.2.2-1.el9_2.2?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "rhc-debuginfo-1:0.2.2-1.el9_2.2.aarch64",
"product": {
"name": "rhc-debuginfo-1:0.2.2-1.el9_2.2.aarch64",
"product_id": "rhc-debuginfo-1:0.2.2-1.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhc-debuginfo@0.2.2-1.el9_2.2?arch=aarch64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "rhc-1:0.2.2-1.el9_2.2.ppc64le",
"product": {
"name": "rhc-1:0.2.2-1.el9_2.2.ppc64le",
"product_id": "rhc-1:0.2.2-1.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhc@0.2.2-1.el9_2.2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "rhc-debugsource-1:0.2.2-1.el9_2.2.ppc64le",
"product": {
"name": "rhc-debugsource-1:0.2.2-1.el9_2.2.ppc64le",
"product_id": "rhc-debugsource-1:0.2.2-1.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhc-debugsource@0.2.2-1.el9_2.2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "rhc-debuginfo-1:0.2.2-1.el9_2.2.ppc64le",
"product": {
"name": "rhc-debuginfo-1:0.2.2-1.el9_2.2.ppc64le",
"product_id": "rhc-debuginfo-1:0.2.2-1.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhc-debuginfo@0.2.2-1.el9_2.2?arch=ppc64le\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "rhc-1:0.2.2-1.el9_2.2.x86_64",
"product": {
"name": "rhc-1:0.2.2-1.el9_2.2.x86_64",
"product_id": "rhc-1:0.2.2-1.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhc@0.2.2-1.el9_2.2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "rhc-debugsource-1:0.2.2-1.el9_2.2.x86_64",
"product": {
"name": "rhc-debugsource-1:0.2.2-1.el9_2.2.x86_64",
"product_id": "rhc-debugsource-1:0.2.2-1.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhc-debugsource@0.2.2-1.el9_2.2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "rhc-debuginfo-1:0.2.2-1.el9_2.2.x86_64",
"product": {
"name": "rhc-debuginfo-1:0.2.2-1.el9_2.2.x86_64",
"product_id": "rhc-debuginfo-1:0.2.2-1.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhc-debuginfo@0.2.2-1.el9_2.2?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "rhc-1:0.2.2-1.el9_2.2.s390x",
"product": {
"name": "rhc-1:0.2.2-1.el9_2.2.s390x",
"product_id": "rhc-1:0.2.2-1.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhc@0.2.2-1.el9_2.2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "rhc-debugsource-1:0.2.2-1.el9_2.2.s390x",
"product": {
"name": "rhc-debugsource-1:0.2.2-1.el9_2.2.s390x",
"product_id": "rhc-debugsource-1:0.2.2-1.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhc-debugsource@0.2.2-1.el9_2.2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "rhc-debuginfo-1:0.2.2-1.el9_2.2.s390x",
"product": {
"name": "rhc-debuginfo-1:0.2.2-1.el9_2.2.s390x",
"product_id": "rhc-debuginfo-1:0.2.2-1.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhc-debuginfo@0.2.2-1.el9_2.2?arch=s390x\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "rhc-1:0.2.2-1.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:rhc-1:0.2.2-1.el9_2.2.aarch64"
},
"product_reference": "rhc-1:0.2.2-1.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhc-1:0.2.2-1.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:rhc-1:0.2.2-1.el9_2.2.ppc64le"
},
"product_reference": "rhc-1:0.2.2-1.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhc-1:0.2.2-1.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:rhc-1:0.2.2-1.el9_2.2.s390x"
},
"product_reference": "rhc-1:0.2.2-1.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhc-1:0.2.2-1.el9_2.2.src as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:rhc-1:0.2.2-1.el9_2.2.src"
},
"product_reference": "rhc-1:0.2.2-1.el9_2.2.src",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhc-1:0.2.2-1.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:rhc-1:0.2.2-1.el9_2.2.x86_64"
},
"product_reference": "rhc-1:0.2.2-1.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhc-debuginfo-1:0.2.2-1.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:rhc-debuginfo-1:0.2.2-1.el9_2.2.aarch64"
},
"product_reference": "rhc-debuginfo-1:0.2.2-1.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhc-debuginfo-1:0.2.2-1.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:rhc-debuginfo-1:0.2.2-1.el9_2.2.ppc64le"
},
"product_reference": "rhc-debuginfo-1:0.2.2-1.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhc-debuginfo-1:0.2.2-1.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:rhc-debuginfo-1:0.2.2-1.el9_2.2.s390x"
},
"product_reference": "rhc-debuginfo-1:0.2.2-1.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhc-debuginfo-1:0.2.2-1.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:rhc-debuginfo-1:0.2.2-1.el9_2.2.x86_64"
},
"product_reference": "rhc-debuginfo-1:0.2.2-1.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhc-debugsource-1:0.2.2-1.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:rhc-debugsource-1:0.2.2-1.el9_2.2.aarch64"
},
"product_reference": "rhc-debugsource-1:0.2.2-1.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhc-debugsource-1:0.2.2-1.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:rhc-debugsource-1:0.2.2-1.el9_2.2.ppc64le"
},
"product_reference": "rhc-debugsource-1:0.2.2-1.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhc-debugsource-1:0.2.2-1.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:rhc-debugsource-1:0.2.2-1.el9_2.2.s390x"
},
"product_reference": "rhc-debugsource-1:0.2.2-1.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhc-debugsource-1:0.2.2-1.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:rhc-debugsource-1:0.2.2-1.el9_2.2.x86_64"
},
"product_reference": "rhc-debugsource-1:0.2.2-1.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-39325",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2023-10-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2243296"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in handling multiplexed streams in the HTTP/2 protocol. A client can repeatedly make a request for a new multiplex stream and immediately send an RST_STREAM frame to cancel it. This creates extra work for the server setting up and tearing down the streams while not hitting any server-side limit for the maximum number of active streams per connection, resulting in a denial of service due to server resource consumption. Red Hat has rated the severity of this flaw as \u0027Important\u0027 as the US Cybersecurity and Infrastructure Security Agency (CISA) declared this vulnerability an active exploit.\r\n\r\nCVE-2023-39325 was assigned for the `Rapid Reset Attack` in the Go language packages.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This CVE is related to CVE-2023-44487.\n\nThe majority of RHEL utilities are not long-running applications; instead, they are command-line tools. These tools utilize Golang package as build-time dependency, which is why they are classified as having a \"Moderate\" level of impact.\n\nAs go-lang vendors its dependencies, a package may contain a library with a known vulnerability, solely because of lower tier libraries including it as a part of its dependencies, but the vulnerable code is not reachable at runtime. In such cases the issue is not exploitable. We classify these situations as \u201cNot affected\u201d or \u201cWill not fix,\u201d depending on the risk of breaking other unrelated packages.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.Z.E4S:rhc-1:0.2.2-1.el9_2.2.aarch64",
"AppStream-9.2.0.Z.E4S:rhc-1:0.2.2-1.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.E4S:rhc-1:0.2.2-1.el9_2.2.s390x",
"AppStream-9.2.0.Z.E4S:rhc-1:0.2.2-1.el9_2.2.src",
"AppStream-9.2.0.Z.E4S:rhc-1:0.2.2-1.el9_2.2.x86_64",
"AppStream-9.2.0.Z.E4S:rhc-debuginfo-1:0.2.2-1.el9_2.2.aarch64",
"AppStream-9.2.0.Z.E4S:rhc-debuginfo-1:0.2.2-1.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.E4S:rhc-debuginfo-1:0.2.2-1.el9_2.2.s390x",
"AppStream-9.2.0.Z.E4S:rhc-debuginfo-1:0.2.2-1.el9_2.2.x86_64",
"AppStream-9.2.0.Z.E4S:rhc-debugsource-1:0.2.2-1.el9_2.2.aarch64",
"AppStream-9.2.0.Z.E4S:rhc-debugsource-1:0.2.2-1.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.E4S:rhc-debugsource-1:0.2.2-1.el9_2.2.s390x",
"AppStream-9.2.0.Z.E4S:rhc-debugsource-1:0.2.2-1.el9_2.2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-39325"
},
{
"category": "external",
"summary": "RHBZ#2243296",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2243296"
},
{
"category": "external",
"summary": "RHSB-2023-003",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-39325",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-39325"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2023-44487",
"url": "https://access.redhat.com/security/cve/CVE-2023-44487"
},
{
"category": "external",
"summary": "https://go.dev/issue/63417",
"url": "https://go.dev/issue/63417"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2023-2102",
"url": "https://pkg.go.dev/vuln/GO-2023-2102"
},
{
"category": "external",
"summary": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487",
"url": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487"
}
],
"release_date": "2023-10-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-15T15:31:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.Z.E4S:rhc-1:0.2.2-1.el9_2.2.aarch64",
"AppStream-9.2.0.Z.E4S:rhc-1:0.2.2-1.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.E4S:rhc-1:0.2.2-1.el9_2.2.s390x",
"AppStream-9.2.0.Z.E4S:rhc-1:0.2.2-1.el9_2.2.src",
"AppStream-9.2.0.Z.E4S:rhc-1:0.2.2-1.el9_2.2.x86_64",
"AppStream-9.2.0.Z.E4S:rhc-debuginfo-1:0.2.2-1.el9_2.2.aarch64",
"AppStream-9.2.0.Z.E4S:rhc-debuginfo-1:0.2.2-1.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.E4S:rhc-debuginfo-1:0.2.2-1.el9_2.2.s390x",
"AppStream-9.2.0.Z.E4S:rhc-debuginfo-1:0.2.2-1.el9_2.2.x86_64",
"AppStream-9.2.0.Z.E4S:rhc-debugsource-1:0.2.2-1.el9_2.2.aarch64",
"AppStream-9.2.0.Z.E4S:rhc-debugsource-1:0.2.2-1.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.E4S:rhc-debugsource-1:0.2.2-1.el9_2.2.s390x",
"AppStream-9.2.0.Z.E4S:rhc-debugsource-1:0.2.2-1.el9_2.2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8322"
},
{
"category": "workaround",
"details": "The default stream concurrency limit in golang is 250 streams (requests) per HTTP/2 connection. This value may be adjusted in the golang.org/x/net/http2 package using the Server.MaxConcurrentStreams setting and the ConfigureServer function which are available in golang.org/x/net/http2.",
"product_ids": [
"AppStream-9.2.0.Z.E4S:rhc-1:0.2.2-1.el9_2.2.aarch64",
"AppStream-9.2.0.Z.E4S:rhc-1:0.2.2-1.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.E4S:rhc-1:0.2.2-1.el9_2.2.s390x",
"AppStream-9.2.0.Z.E4S:rhc-1:0.2.2-1.el9_2.2.src",
"AppStream-9.2.0.Z.E4S:rhc-1:0.2.2-1.el9_2.2.x86_64",
"AppStream-9.2.0.Z.E4S:rhc-debuginfo-1:0.2.2-1.el9_2.2.aarch64",
"AppStream-9.2.0.Z.E4S:rhc-debuginfo-1:0.2.2-1.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.E4S:rhc-debuginfo-1:0.2.2-1.el9_2.2.s390x",
"AppStream-9.2.0.Z.E4S:rhc-debuginfo-1:0.2.2-1.el9_2.2.x86_64",
"AppStream-9.2.0.Z.E4S:rhc-debugsource-1:0.2.2-1.el9_2.2.aarch64",
"AppStream-9.2.0.Z.E4S:rhc-debugsource-1:0.2.2-1.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.E4S:rhc-debugsource-1:0.2.2-1.el9_2.2.s390x",
"AppStream-9.2.0.Z.E4S:rhc-debugsource-1:0.2.2-1.el9_2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.Z.E4S:rhc-1:0.2.2-1.el9_2.2.aarch64",
"AppStream-9.2.0.Z.E4S:rhc-1:0.2.2-1.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.E4S:rhc-1:0.2.2-1.el9_2.2.s390x",
"AppStream-9.2.0.Z.E4S:rhc-1:0.2.2-1.el9_2.2.src",
"AppStream-9.2.0.Z.E4S:rhc-1:0.2.2-1.el9_2.2.x86_64",
"AppStream-9.2.0.Z.E4S:rhc-debuginfo-1:0.2.2-1.el9_2.2.aarch64",
"AppStream-9.2.0.Z.E4S:rhc-debuginfo-1:0.2.2-1.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.E4S:rhc-debuginfo-1:0.2.2-1.el9_2.2.s390x",
"AppStream-9.2.0.Z.E4S:rhc-debuginfo-1:0.2.2-1.el9_2.2.x86_64",
"AppStream-9.2.0.Z.E4S:rhc-debugsource-1:0.2.2-1.el9_2.2.aarch64",
"AppStream-9.2.0.Z.E4S:rhc-debugsource-1:0.2.2-1.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.E4S:rhc-debugsource-1:0.2.2-1.el9_2.2.s390x",
"AppStream-9.2.0.Z.E4S:rhc-debugsource-1:0.2.2-1.el9_2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)"
},
{
"cve": "CVE-2026-25679",
"cwe": {
"id": "CWE-1286",
"name": "Improper Validation of Syntactic Correctness of Input"
},
"discovery_date": "2026-03-06T22:02:11.567841+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2445356"
}
],
"notes": [
{
"category": "description",
"text": "The Go standard library function net/url.Parse insufficiently validated the host/authority component and accepted some invalid URLs by effectively treating garbage before an IP-literal as ignorable. The function should have rejected this as invalid.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "net/url: Incorrect parsing of IPv6 host literals in net/url",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.Z.E4S:rhc-1:0.2.2-1.el9_2.2.aarch64",
"AppStream-9.2.0.Z.E4S:rhc-1:0.2.2-1.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.E4S:rhc-1:0.2.2-1.el9_2.2.s390x",
"AppStream-9.2.0.Z.E4S:rhc-1:0.2.2-1.el9_2.2.src",
"AppStream-9.2.0.Z.E4S:rhc-1:0.2.2-1.el9_2.2.x86_64",
"AppStream-9.2.0.Z.E4S:rhc-debuginfo-1:0.2.2-1.el9_2.2.aarch64",
"AppStream-9.2.0.Z.E4S:rhc-debuginfo-1:0.2.2-1.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.E4S:rhc-debuginfo-1:0.2.2-1.el9_2.2.s390x",
"AppStream-9.2.0.Z.E4S:rhc-debuginfo-1:0.2.2-1.el9_2.2.x86_64",
"AppStream-9.2.0.Z.E4S:rhc-debugsource-1:0.2.2-1.el9_2.2.aarch64",
"AppStream-9.2.0.Z.E4S:rhc-debugsource-1:0.2.2-1.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.E4S:rhc-debugsource-1:0.2.2-1.el9_2.2.s390x",
"AppStream-9.2.0.Z.E4S:rhc-debugsource-1:0.2.2-1.el9_2.2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-25679"
},
{
"category": "external",
"summary": "RHBZ#2445356",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2445356"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-25679",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25679"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-25679",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25679"
},
{
"category": "external",
"summary": "https://go.dev/cl/752180",
"url": "https://go.dev/cl/752180"
},
{
"category": "external",
"summary": "https://go.dev/issue/77578",
"url": "https://go.dev/issue/77578"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk",
"url": "https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4601",
"url": "https://pkg.go.dev/vuln/GO-2026-4601"
}
],
"release_date": "2026-03-06T21:28:14.211000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-15T15:31:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.Z.E4S:rhc-1:0.2.2-1.el9_2.2.aarch64",
"AppStream-9.2.0.Z.E4S:rhc-1:0.2.2-1.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.E4S:rhc-1:0.2.2-1.el9_2.2.s390x",
"AppStream-9.2.0.Z.E4S:rhc-1:0.2.2-1.el9_2.2.src",
"AppStream-9.2.0.Z.E4S:rhc-1:0.2.2-1.el9_2.2.x86_64",
"AppStream-9.2.0.Z.E4S:rhc-debuginfo-1:0.2.2-1.el9_2.2.aarch64",
"AppStream-9.2.0.Z.E4S:rhc-debuginfo-1:0.2.2-1.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.E4S:rhc-debuginfo-1:0.2.2-1.el9_2.2.s390x",
"AppStream-9.2.0.Z.E4S:rhc-debuginfo-1:0.2.2-1.el9_2.2.x86_64",
"AppStream-9.2.0.Z.E4S:rhc-debugsource-1:0.2.2-1.el9_2.2.aarch64",
"AppStream-9.2.0.Z.E4S:rhc-debugsource-1:0.2.2-1.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.E4S:rhc-debugsource-1:0.2.2-1.el9_2.2.s390x",
"AppStream-9.2.0.Z.E4S:rhc-debugsource-1:0.2.2-1.el9_2.2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8322"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.2.0.Z.E4S:rhc-1:0.2.2-1.el9_2.2.aarch64",
"AppStream-9.2.0.Z.E4S:rhc-1:0.2.2-1.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.E4S:rhc-1:0.2.2-1.el9_2.2.s390x",
"AppStream-9.2.0.Z.E4S:rhc-1:0.2.2-1.el9_2.2.src",
"AppStream-9.2.0.Z.E4S:rhc-1:0.2.2-1.el9_2.2.x86_64",
"AppStream-9.2.0.Z.E4S:rhc-debuginfo-1:0.2.2-1.el9_2.2.aarch64",
"AppStream-9.2.0.Z.E4S:rhc-debuginfo-1:0.2.2-1.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.E4S:rhc-debuginfo-1:0.2.2-1.el9_2.2.s390x",
"AppStream-9.2.0.Z.E4S:rhc-debuginfo-1:0.2.2-1.el9_2.2.x86_64",
"AppStream-9.2.0.Z.E4S:rhc-debugsource-1:0.2.2-1.el9_2.2.aarch64",
"AppStream-9.2.0.Z.E4S:rhc-debugsource-1:0.2.2-1.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.E4S:rhc-debugsource-1:0.2.2-1.el9_2.2.s390x",
"AppStream-9.2.0.Z.E4S:rhc-debugsource-1:0.2.2-1.el9_2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.Z.E4S:rhc-1:0.2.2-1.el9_2.2.aarch64",
"AppStream-9.2.0.Z.E4S:rhc-1:0.2.2-1.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.E4S:rhc-1:0.2.2-1.el9_2.2.s390x",
"AppStream-9.2.0.Z.E4S:rhc-1:0.2.2-1.el9_2.2.src",
"AppStream-9.2.0.Z.E4S:rhc-1:0.2.2-1.el9_2.2.x86_64",
"AppStream-9.2.0.Z.E4S:rhc-debuginfo-1:0.2.2-1.el9_2.2.aarch64",
"AppStream-9.2.0.Z.E4S:rhc-debuginfo-1:0.2.2-1.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.E4S:rhc-debuginfo-1:0.2.2-1.el9_2.2.s390x",
"AppStream-9.2.0.Z.E4S:rhc-debuginfo-1:0.2.2-1.el9_2.2.x86_64",
"AppStream-9.2.0.Z.E4S:rhc-debugsource-1:0.2.2-1.el9_2.2.aarch64",
"AppStream-9.2.0.Z.E4S:rhc-debugsource-1:0.2.2-1.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.E4S:rhc-debugsource-1:0.2.2-1.el9_2.2.s390x",
"AppStream-9.2.0.Z.E4S:rhc-debugsource-1:0.2.2-1.el9_2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "net/url: Incorrect parsing of IPv6 host literals in net/url"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.